text
stringlengths
194
649k
Librarians are always struggling to convince someone of something: convincing voters to say ‘yes’ to a library bond; persuading a library director to invest in a text-messaging reference tool; trying to get students to use library resources instead of Google. One of the most effective ways to be successful is to learn the art of “making it their idea.” In his book, The Education of an Accidental CEO, David Novak (2009) illustrates a crucial idea in advertising a product: You can tell people to go out and buy something, but that doesn’t make them do it. But if you appeal to both the head and the heart in a compelling and relevant way, then people will come up with the idea to buy of their own accord (p. 44). Novak goes on to describe how Nike uses minimal language in its commercials, never telling viewers to buy their shoes. Instead, they fill the screen with images of professional athletes performing amazing feats in their products. The idea is to let the customer come to the conclusion that Nike shoes will help them accomplish their athletic goals. In fact, very few advertisements tell people explicitly to do anything. They present information that leads customers to come up with the idea of buying their product on their own. Convincing people by “making it their idea” isn’t unique to marketing. In Throwing the Elephant: Zen and the Art of Managing Up (Bing, 2003), there’s a chapter devoted to “convincing the elephant that it was the elephant’s idea” (followed by “Getting Drunk with the Elephant” and “Frightening the Elephant with Mice”). Though done with a little more tongue-in-cheek panache, this book highlights the usefulness of the concept in leadership and management. Why does this approach work so well? Business people might argue that “making it their idea” is an ego boost managers need in order to act on something. However, educators have long understood the value in letting people come to their own conclusions, and it has less to do with ego than it does with the way the brain learns. People feel a rush of pride when they come up with ideas, solutions and concepts for themselves and see the value in what they have just learned much more clearly than if they had simply been told a good idea. When it comes to seeing the value in libraries and their resources, we need to leverage a mode of teaching that allows students to experience information literacy concepts in this way. The Learning Cycle In The Learning Cycle, Ann Cavallo and Edmond Marek (1997) describe a teaching technique used in science education that presents students with deliberately confusing or confounding situations. With minimal instruction, students try to make sense of these situations based on prior knowledge, observation, and experimentation. At its core, the learning cycle method embodies the nature of science and helps students develop critical thinking skills. Cavallo (2008) describes an example of the learning cycle, illustrating how it works. In an activity called “The New Society,” a small subset of a class is sent outside while the instructor tells the remaining students that they are a new society with three simple rules: - They can only say the words ‘yes’ and ‘no.’ - They only respond to people of the same gender and ignore those of opposite gender. - Regardless of the question, they always respond ‘yes’ if the questioner is smiling and always respond ‘no’ if the questioner is not smiling. The students sent outside (called ‘the anthropologists’) are asked to find out as much information as they can about this new society that has recently been discovered on a remote island. As the anthropologists move about the classroom, they are confronted with confounding answers. They quickly discover the first rule through their initial observations. The second rule takes more time – often students will develop hypotheses and test them on students leading to the discovery of the second rule. The third rule is much more difficult to figure out. Students feel frustration, anxiety and impatience. Proclamations of “They’re lying!” and “They answer randomly!” are flung about until they finally figure out the third rule. Throughout this process, the teacher simply provides guiding questions when people get stuck, on occasion reminding them how scientists find things out by making hypotheses and testing them out. Two results of this lesson for students: utter joy or relief from solving a frustrating problem and experience working in a confusing environment but inventing a solution to a problem themselves (without the instructor providing the answer). The joy or relief is what builds a love of learning into the experience, and the act of inventing a solution is critical thinking in action. How People Learn While many of us have been told that active learning and critical thinking are vital for our information literacy programs, very few of us understand the ‘how’ and even fewer the ‘why.’ Active learning is important because it more closely models the way that humans learn. Experiments carried out by Piaget (1973) and other noted educational psychologists (Renner & Marek, 1988; Inhelder & Piaget, 1969) indicate that all learning begins with data collection (called assimilation in Renner & Marek, 1990). This assimilation can be the observation of a phenomenon or reading of new materials. In many cases, the new data is incongruous with the learner’s current view of the world, and they can’t make sense of it. The next step in learning is trying to make sense of the new information (called accommodation in Renner & Marek, 1990). Critical thinking skills are developed during this phase as learners make sense of the new information by inventing rules, testing hypotheses, and changing their world view in light of this new data. In this stage, they are no longer just memorizing information or learning a series of clicks; rather, they are actively inventing new ways of understanding the world and taking ownership of the knowledge they’re creating. The final step is called organization (Renner & Marek, 1990), and this is when they use their newly created knowledge and skills to solve other problems, and figuring out where else their new knowledge can be applied. The learning cycle instructional method – giving students a new situation, asking them to make sense of it, and serving merely as a guide in their process – models the way people learn, and as a result, generates authentic, meaningful learning experiences for students. Compared to lectures or demonstrations where students are told what the answers are and then perform exercises that verify that what they are told is correct, they are making the new knowledge out of their own ideas. Library Instruction as Science? Modeling instructional activities after the way people learn is vital for making learning experiences that ‘stick.’ Typical library instruction involves copious amounts of “click here, then click here, and once you’re there, click here.” There’s little discovery or invention of core information literacy concepts. Students are told how to use information resources, told how to use citation styles, and told the consequences of unethical use of information. How can we make discovery of information literacy concepts more… scientific? Can students invent information literacy concepts on their own, given a scenario and a librarian as a guide? Let’s take peer reviewed journals as an example. At its worst, library instruction on this topic is equivalent to “Check this box for peer reviewed articles in your results. It’s what your professors want.” This kind of instruction not only goes against the way people learn new ideas, but also undermines the importance of the peer review process by reducing it to “because your professor wants it.” Active learning can be used to get students to explore issues of peer reviewed journals and have them compare them to magazine or popular literature. While this introduces the element of discovery and active learning, it’s only discovering the difference between the two types of publications, not the importance of the peer review process. If a librarian in this class room tells them why peer review is important, even after this activity, it’s still telling, not students discovering. Instead, I develop learning cycles that reflect how people learn. In this instance, I give students a situation where they don’t have an answer but must work together to solve a problem. I tell students they have decided to start a magazine and they want to publish the best, newest research done in educational psychology (or whatever field they’re majoring in). Unlike TIME or Newsweek, their articles should be useful for researchers who are pushing the boundaries of knowledge in their field. They plan on sending out a call across the Internet asking for people to send in their best papers for the magazine. I then ask the students to come up with a method for judging how good a paper they receive is and let them go to it. As they come up with criteria (e.g., “It has to be undiscovered knowledge” and “It must be based on sound evidence”), I ask how they, as college students, will be able to tell what’s good and what’s not. Who is qualified to answer those questions? How will they, as the editors, use these people? As they work to create this new publication, they will be inventing peer review. Peer review will be an idea that they came up with themselves. They may call it something else, but the core purposes of peer review will be in their responses. As a library instructor, my goal is to guide them with questions that challenge their thoughts, and finally, give it the label of ‘peer reviewed’ once they’ve established the concept. This lesson models how the mind actually works. There Isn’t Time! Learning cycles, like the one described above, take lots more time. It would have taken at most two or three minutes to explain peer review and have students tell you why it is an important feature of scholarly research. However, if students don’t invent it, it’s much less likely to stick. The learning cycle on the other hand would take twenty or thirty minutes. Librarians don’t have the luxury of time! There are some solutions. In an article for the Texas Library Journal, Jeremy Donald suggests a model of library instruction that offloads most of the technical details to online tutorials and learning modules (see “Step 6” in Donald, 2010). This enables library instruction to devote needed time to the learning cycle. Donald’s model requires librarians to think about the instructional needs of student in a different way. Rather than think linearly about what skills and knowledge students need to have, think about the tasks they need to do in order of difficulty or complexity. What parts of the lesson will be most confusing and most important? Identify one or two concepts, and plan on spending at least half of your time on those topics, including time students explore new tools and ideas independently and running learning cycle-style lessons. The rest of the time is devoted to brief introductions and answering questions. This type of model not only creates the time needed to run meaningful, engaging lessons on key topics, it forces library instructors to identify what those core topics are, the first step in developing good learning cycle lesson plans. Developing Learning Cycles With that said, the first step in developing a learning cycle lesson plan is to identify those core concepts students should learn. For example, for a lesson on plagiarism, some of the topics that may come up are: - What is plagiarism? - What are the penalties for academic dishonesty? - How do you effectively use quotes or paraphrasing? - How do you cite articles using a specific citation style? Of these, I see the second (academic dishonesty policies) and the fourth (mechanics of citation) as topics that could easily be off-loaded to online tutorials or even printed brochures. There’s no need to spend time in class covering these topics, short of connecting students with resources to learn more about them and their importance. The other two are great topics for learning cycles. I usually approach these topics from a personal perspective: how did I come to understand these concepts myself? What’s important about them? How can I create situations or activities that will lead students to invent the concepts on their own? At its core, avoiding plagiarism means giving credit for someone else’s work. How can I get students to come to understand this concept without simply telling it to them? Before I tell students what the class is about, I ask them to take out a sheet of paper and be prepared to write down the first word or phrase that comes to mind after I say a secret word. When students are ready, I shout, “Plagiarism!” They scribble words and phrases down then I ask them to hold up their papers. Words associated with malicious cheating usually crop up: stealing, dishonest, and sometimes lazy. I then ask them to take on the role of summer school teacher with an imaginary group of low-performing students in an English class. They are told they’ve received a paper from a student written fairly poorly, but right in the middle, a sentence or two of pure academic gold. What happened? When they say “Plagiarism!” I ask them to describe the actual events and student actions that led up to this. I ask them to think about student motivation and behavior, and I prompt them with questions like, “What was going through the student’s mind when they pulled in these sentences into this document?” What results is astounding. Students describe quite innocent situations: perhaps the student didn’t know that copy-and-pasting information without quotes was wrong; maybe they couldn’t find an author on the website and assumed you didn’t need to cite anonymous sources; or perhaps it was malicious cheating. Usually students don’t view this situation as the latter. Instead, they’re forced to revise their own definitions of plagiarism based on the critical examination of the scenario they were presented with. Plagiarism is no longer cheating or stealing… so what is it? Again, these discussions take time, but they’re valuable experiences that students will be able to apply in more situations. In these scenarios, students are employing critical thinking skills – they are working through problems by discussing them with peers, proposing potential solutions, and evaluating their own and others’ responses. There’s more to a learning cycle than rote memorization of the concepts the instructor intends to teach; instead, it’s problem solving. Library instructors should develop a “less is more” philosophy. There is real value in spending time on learning cycles because it does more than just pay lip service to active learning and critical thinking – it helps students develop them. Faculty members and students alike may be anxious if they don’t get the step-by-step instructions they’re used to from the library session. Combating this expectation is our challenge. Donald (2010) also addresses buy-in and collaboration as a way of preparing faculty members for these kinds of drastic changes to the typical library session. Appropriately, Donald says, “They are likely to wait to hear your ideas before introducing their own, and they may re-state an idea of yours as one of their own. This is to be encouraged, as it signals their investment in the collaboration and its outcome” (2010, 129). How’s that for “making it their idea?” For a visual representation of Jeremy Donald’s instructional design model, see his slides from a recent Texas Library Association webinar, titled “Technology & Information Literacy Instruction: A Model for Active Learning Environments” at http://bit.ly/cpt6ON. Thanks to Michelle Millet, Ellie Collier, and Kim Leeder for their feedback on this post. Bing, S. (2002). Throwing the elephant: Zen and the art of managing up. New York: HarperBusiness. Cavallo, A. M. L. (2008). Experiencing the nature of science: An interactive, beginning-of-semester activity. Journal of College Science Teaching, 37(5), 12-15. Donald, J. (2010). Using technology to support faculty and enhance coursework at academic institutions. Texas Library Journal, 85(4), 129-131. Retrieved from http://www.txla.org/ce/Collaboration/Donald.pdf. Inhelder, B. & Piaget, J. (1969). The psychology of the child. New York: Basic Books, Inc. Marek, E. A. & Cavallo, A. M. L. (1997). The learning cycle: Elementary school science and beyond. Portsmouth, NH: Heinemann. Novak, D. (2009). The education of an accidental CEO: Lessons learned from the trailer park to the corner office. New York: Three Rivers Press. Piaget, J. (1973). Psychology of intelligence. Totowa, NJ: Littlefield, Adams and Co. Renner, J.W. & Marek, E.A. (1988). The learning cycle and elementary school science teaching. Portsmouth, NH: Heinemann Educational Books. Renner, J.W. & Marek, E.A. (1990). An educational theory base for science teaching. Journal of Research in Science Teaching, 27(3), 241-246. You might also be interested in: - What water? - From the Frying Pan Into the Fire (and Back Again): Adventures in Subject-Based, Credit Instruction - Stop the Snobbery! Why You’re Wrong About Community Colleges and Don’t Even Know It - Understanding library impacts on student learning - Ice Ice Baby: Are Librarian Stereotypes Freezing Us out of Instruction?
Rene and Kim It's not a routine procedure, but what Kim hasn't said is why this is needed. Yes in certain instances - histochemically speaking - some incubation's need to be done overnight but not at quite that high a temp. Immunohistochemically - I've done it but it took time to work out the best method to achieve When we've had to do these it was done in a waterbath for no more than 12 hours and the bath covered loosely either by a tent cover (it comes with the waterbath) or aluminum foil to hold the humidity in. The amount of buffer required for the slides will be pretty hefty, but it's more important to make sure you have a waterbath that can actually maintain the temperature and surrounding moisture so that the buffer won't evaporate. This is going to require some testing during the day to see how best to make this work. Kim if you are looking to do a large volume of slides make sure you use a pyrex dish that fits into the waterbath or one that can be supported in a bath - sort of like using a double boiler when you're melting chocolate (sorry for the less than scientific description)- so that you don't burn out the heating element. I also put in blank slides to best mimic the volume of work I'd be doing. The bath was set up first thing in the morning and both the temp and water levels would be monitored during the day this way we could best gauge and write up our protocol. I know that there is literature on doing this procedure by Dr. Elias, but I don't have it in front of me. I hope this helps, if there is anything else I can do please let me know. On 4/12/08, Rene J Buesa wrote: > Never heard of such a procedure. On the other hand, unless you are dealing with a HUGE amount of buffer, it will evaporate during such a prolonged period of time. > Check your reference, I think something is not right. > René J. > Kim O'Sullivan wrote: > Do You Yahoo!? > Tired of spam? Yahoo! Mail has the best spam protection around > Histonet mailing list Histonet mailing list
Onions from Spain Valencia, Spains third largest city, is blessed with a benign climate, abundant, dazzling sunlight and surrounded by hortas, extremely fertile, intensively developed and irrigated small market gardens, providing much of Europe with seasonal produce. Singularly associated with citrus fruits, oranges in particular, this Mediterranean port city also happens to be the historic and modern epicenter of Spains onion industry. Valencia provence itself has 5,930 hectares (about 14,653 acres) under cultivation producing 214,500 metric tons. Valencia and its surrounding region is home not only to onion farmers but to Spains largest onion warehouse operations, research facilities and onion exporters. Companies include Requena, Cebollas Tara, Riba-Roja de Turia and la Pobla de Vallbona. Spains 30-year-old onion trade association ACEC ( Asociacion Espanola de Cosecheros-Exportadores de Cebollas) is based in Valencia as well. Although Spain produces a bare 2 percent of the worlds onions, in Western Europe Spain is king, the key player on the continent, growing one million metric tons annually, generating $192 million (FAOSTAT fi gures for 2005). Almost the entire Spanish crop is sold fresh; only 3 percent is for industrial usage. Onion fields are found throughout the country, from the arid south to the lush green and mountainous northwest, to the high plains of the interior. The harvest begins in Andalucia in February and ends in the coolest areas in late October. To understand the roots of Spains onion industry it helps to have a detailed map of the country, where even the smallest villages are indexed. Why? Quite simply because so many of the onions, well known and otherwise, first originated in such places. The Recas? A small Grano-type onion was produced from a hamlet of that name located near Toledo; the reddish brown late Liebana from the magnifi cent Picos de Europa region is named after a beautiful valley there; similarly the sweet and spicy Liria is named after the town where fields of the onion variety were fi rst exploited; the pink Colorade de Figueras developed from the artist Salvadore Dalis hometown. And so it goes. Spanish onions are not exported to the U.S. today but there is one strong historical connection to the American onion market. The parent of todays sweet onions such as Vidalia and Granex came to U.S. shores 82 years ago when Valencia Grano 9452, as it was then named, was imported to Texas. Grano remains the most extensively planted onion in Spain with 14,224 hectares (34,280 acres) under cultivation. According to the ACEC, some new up and coming varieties include CLX 1850, Super Glaxia, Romagui and Len. For the internal market, Spanish onion growers grade onions by a system where the higher the number, the smaller the size of the onion (e.g. no. 2 is 100-115 mm in diameter; no. 7 from 30-45 mm). For export, Spanish producers can and do use the European system which is more direct, i.e. onions are graded and named simply by (e.g. 40-60 mm; 70-90 mm). The United Kingdom, followed by Germany, Belgium and France, are the biggest importers of Spanish onions. Only one third of Spains onions ever leave the country itself, with the rest consumed by its own citizens. The Spanish like their onions so much, in fact, that they have the highest per capita consumption in Europe, around 16 pounds. They find it necessary to import, primarily from France, the Netherlands and Germany, in that order. Its no surprise. The onion is fundamental to Spanish cuisine so its hard to think of what it would look like if onions were deleted. The foundation sauce for Spanish cooking, the sofrito, consists of the trinity: onion, pepper and tomato. Other ingredients can be added but no sofrito can be made without those three ingredients; certainly none without onions. But the sofrito is just the beginning. Onions are stuffed, boiled, baked and used, of course, as complementary ingredients in hundreds of Spanish recipes. Nowhere is the Spaniards great affection for onions more touted in the governmental tourist literature, an arm of the Ministry of the Economy. And a decade ago the Catalonian government ruled that the calcot from Valls become a protected brand. Production was limited to a particular geographical area, and the rules required that Calcot de Valls must come exclusively from the bulbs of the Late White Lleida onion and must adhere objective and subjective criteria, including, for example, the minimum and maximum than during the winter festival known as the calcotada, celebrated primarily in Tarragona provence, north of Valencia. Calcots, what the French call the poor mans asparagus, are a long-stemmed, large white onion. Planted in late autumn or early winter, the onions are taken from the ground a few months later. Stored in a dry area for a few months, they are replanted in August and September in trenches. As the days shorten, the onion shoots are lined with soil, giving them a blanched appearance. From the end of January to early spring, the calcots are harvested. Then, the Spanish do what they do so well they party. With the humblest of ingredients they make an elaborate and ritualized celebration. The calcots are grilled until theyre blackened and burnt (and tender sweet). Then, after the outer skin is removed, theyre served with a variety of spicy sauces, whose ingredients are closely held secrets. As Coleman Andrews sybaritically enthuses in his book, Catalan Cuisine, the glistening white end of the calcot is...lowered into the mouth with ones head thrown back jauntily and bitten off about where the green part starts. As might be imagined eating the calcots is messy work and everyone wears bibs and retires frequently to a nearby sink to rinse off the soot. It may be messy but it is very, very popular. In the town of Valls (population 20,000), the annual calcotada, held in late January, attracts 30,000 visitors who enjoy a slew of activities including a market, contests, dances, etc. But theyre, fi rst and foremost, in Valls to eat the calcots, which they do. More than 100,000 calcots are consumed during the Valls calcotada alone. The whole calcotada phenomenon has become so popular, in fact, that the Valls festival and others like it are length and diameter of Visitors who cant get to Valls will find a number of regional restaurants offering calcot menus during the winter months. At the LHostalet Inn and restaurant, with 72-hour notice, theyll offer a calcotada, and if thats insuffi cient, its possible to partake of a Calcotada package for 109 Euros (or around $133) per person. As the local saying goes, The calcot is much more than an onion. © 2007 Columbia Publishing >> Return to top © 2007 Columbia Publishing & Design
1National Research Center for Endocrinology of the Russian Academy of Medical Science, Moscow, 2Department of Endocrinology of Moscow Medical Academy, Moscow, 3Moscow Endocrinology Unit, Moscow, Russia OBJECTIVE: To evaluate the effects of subclinical hyperthyroidism of variable etiology on bone mineral density (BMD) and bone metabolism in postmenopausal women. DESIGN: T he study included data of 88 postmenopausal women classified into four groups depending on the etiology of subclinical hyperthyroidism: (1) 20 with toxic multinodular goiter without history of clinical hyperthyroidism; (2) 25 on levothyroxine suppressive therapy after thyroidectomy due to differentiated thyroid cancer; (3) 21 with Graves’ disease (GD) receiving antithyroid drugs; (4) 22 healthy women matched for age and duration of menopause. In all subjects biochemical markers of bone turnover and B MD were determined. RESULTS: B iochemical markers of bone turnover were significantly higher (p-value =0.001) in all patients with subclinical hyperthyroidism compared to the control group (group 4). T he women of group 1 had significantly lower B MD at all regions of the skeleton, whereas the women of group 3 had significantly lower B MD at T otal Hip (p-value = 0.013) and R adius T otal (p-value = 0.0003) compared to group 4. No significant differences in B MD between groups 2 and 4 were detected. CONCLUSION: The etiology of subclinical hyperthyroidism influences B MD in postmenopausal women. Endogenous subclinical hyperthyroidism might be considered as an additional risk factor for osteoporosis in postmenopausal women, especially for cortical bone, whereas exogenous subclinical hyperthyroidism has no effect on BMD. Bone mineral density, Bones, C-terminal telopeptide of type I collagen, Osteocalcin, Osteoporosis, Postmenopausal women, Subclinical hyperthyroidism, Thyrotropin The clinical consequences of overt hyperthyroidism on the skeleton were first suggested over 100 years ago (1891) when Von Recklinghausen reportedapatientwithhyperthyroidismandmultiple fractures.1 However, today with earlier recognition of thyroid disease and its effective treatment, severe bone loss is rarely seen.1 In recent years, with the development of sensitive thyrotropin (TSH) assays, it has been suggested that even subclinical hyperthyroidism may have effects on fracture risk.2,3 Extra-thyroidal thyrotropin receptors (TSHR) have been demonstrated in several tissues and cells, including human and rat osteosarcoma cell lines and primary cultures of human osteoblast-like (hOB) cells, though Tsai et al concluded that TSH effects had no physiological relevant effects on hOB cells.4-8 Subclinical hyperthyroidism, defined as free triiodothyronine (FT3) and free thyroxine (FT4) concentrations within the reference range and serum TSH level below the reference range,9 seems to be an appropriate model to examine the direct effect of TSH on bone in clinical practice. Several recent studies, designed with the aim of finding new risk factors for osteoporosis, have shown that post menopausal women with low TSH level (the etiology of subclinical hyperthyroidism was not specified) have lower bone mineral density(BMD)and higher fractureriskcom-pared to women with normal TSH.10-12 Thus, a secondary analysis of data collected as part of the Fracture Intervention Trial (FIT), which included 15,316 postmenopausal women, concluded that women with TSH <0.1mlU/l as well as TSH <0.5mlU/l had significantly lower BMD at the femoral neck and in total body as compared to women with normal TSH.10 Furthermore, a cross-sectional, hospital-based survey, in which 959 healthy postmenopausal women were enrolled, showed that women even with low normal TSH levels (0.5-1.1mU/l) had significantly lower BMD at the lumbar spine and femoral neck than those with high normal TSH levels (2.8-5.0).11 Additionally, a cross-sectional study in Seoul, Korea, which enrolled 413 postmenopausal women, found that femoral neck BMD was significantly reduced both in the subclinical hyperthyroid group and in the subclinical hypothyroid group as compared with the euthyroid group.12 However, a prospective cohort study of 458 women over age 65 participating in the multicenter Study of Osteoporotic Fractures, found no consistent evidence that low TSH was associated with low BMD or accelerated bone loss in older ambulatory women.13 According to a summary of the evidence for the U.S. Preventive Services Task Force and several other reviews, the issue as to whether subclinical hyperthyroidism has a clinically significant effect on BMD and fracture risk remains controversial.14-16 The aim of the present study was to determine BMD and bone metabolism in postmenopausal women with subclinical hyperthyroidism of various etiology. SUBJECTS AND METHODOLOGY Eighty-eight postmenopausal women (at least 5 years after menopause) were classified into four groups: (1) 20 women with toxic multinodular goiter (TMG) without history of clinical hyperthyroidism; (2) 25 women on Levothyroxine (LT4) suppressive therapy 125 (125-150) μg/day (Median (Me) Lower-upper quartiles (Q25-Q75)) during a mean period of 3 (1.5-6) years post thyroidectomy for differentiated thyroid cancer; (3) 21 women with Graves’ disease (GD) and overt hyperthyroidism in the anamnesis, receiving antithyroid agents during a mean period of 3 (2-7) years, having normal FT3 and FT4 levels for at least 6 months prior to the study as well as sus-tained serum TSH suppression long after antithyroid treatment; and (4) 22 healthy women without thyroid dysfunction at present or by history and matched for age and duration of menopause (controls). All women were studied as out patients during a one-year period. The presence of low TSH and normal FT3, FT4 levels was established by two measurements. All participants were interviewed and examined during the baseline visit. At that visit demographic and somatometric data as well as detailed data about physician-diagnosed medical conditions and past and current medication use were collected. All women were also asked about the presence of risk factors for osteoporosis such as prior fragility fractures, family history of osteoporosis, high caffeine intake, low calcium intake, smoking, physical activity in youth and at present, the number of full-term pregnancies and the duration of breast feeding. Biochemical parameters: calcium (Ca), phosphorous (P), creatinine (Cr), alkaline phosphatase (ALP), cholesterol, low density lipoprotein (LDL), high density lipoprotein (HDL), triglycerides (TG), cholesterol/HDL ratio in fasting serum as well as calcium/creatinine ratio in fasting urine specimen (U-Ca/U-Cre) were measured using standard laboratory methods on the biochemical analyzer Hitachi 912. FT3, FT4 and TSH were measured using commercially available kits (Vitros Eci, Ortho-Clinical Diagnostics Amersham, UK). TSH-receptor antibodies were detected with the h-TBII assay (“TRAK-Human DYNO-test” (BRAMS AG, Germany) in groups 1 and 3 so as to differentiate GD and TMG. Biochemical markers of bone metabolism: serum osteocalcin (OC) and C-terminal telopeptide of type I collagen (β-CTx) as well as parathyroid hormone (PTH) levels were measured using the electrochemiluminescence immunoas-say “ECLIA” on the Roche Elecsys 1010/2010 and Modular Analytics E170. BMD was measured by dual energy X-ray absorptiometry (DXA)(Prodigy,Lunar)atthelumbarspine (L1-L4), femoral neck, total hip and radius total. Statistical analysis: STATISTICA 6.0 Stat Soft was used in the analysis. The data with normal dis-tributions are expressed as means with 95% confidence limits of means, otherwise as medians with interquartile ranges. The level of significance was set at 5%. Comparisons of the variables among different groups were made with one-way ANOVA, and the multiple comparison tests were performed with post-hoc analyses (the Fisher LSD test) for data with normal distribution, otherwise with the Kruscal-Wal-lis ANOVA test, and the Mann-Whitney U-test with the Bonferroni correction. The Spearman test was used for the correlation analysis. There were no differences in the age, menopause duration, height, weight and body mass index (BMI) as well as prior fragility fracture, family history of osteoporosis, high caffeine intake, low calcium intake, smoking, physical activity in youth and at present, the number of full-term pregnancies and the duration of breast feeding among the four groups of studied women. The characteristics of the participants at baseline are presented in Table 1 . The FT3 and FT4 levels were within the reference range. There were no differences in FT3 (p-value=0.267) and PTH (p-value=0.258) levels among the groups. However, FT4 levels were significantly higher in group 2 versus group 4 (p-value <0.001), while FT4 levels in groups 1 and 3 were not different and were comparable to group 4 (p-value=0.718 and 0.420, respectively). No differences in TSH values were found among groups 1, 2 and 3 (p-value=0.614). TSH levels in groups 1, 2 and 3 were significantly lower than those in group 4 (Table 2). Amongthefourgroups,therewerenodifferences in biochemical parameters except for ALP levels, which were significantly higher (p-value=0.019) in patients with GD compared to the control group (Table 2). Biochemical markers of bone turnover were sig-nificantly higher in all three groups of patients with subclinical hyperthyroidism compared to group 4 (Table 2). OC level was 56.3% higher in group 1 (p-value <0.001), 28% higher in group 2 (p-value= 0.005) and 50.2% higher in group 3 (p-value <0.001) compared to the control group. CTx level was 84 % higher (p-value=0.002) in group 1, 36.2% higher (p-value=0,050) in group 2 and 85.5% higher (p-value <0.001) in group 3 compared to the control group. For all patients enrolled in this study TSH exhibited a significant negative correlation with OC (r=-0.38; p-value <0.001) and β-CTx (r=-0.36; p-value<0.001) levels (Figure 1). A significant positive correlation was detected between FT3 values and OC (r=0.28; p-value=0.007) and β-CTx (r=0.24; p-value=0.023) values (Figure 2) as well as between PTH and OC (r=0.28; p-value=0.009) and .-CTx (r=0.23; p-value=0.034) values. Figure 1. Negative correlations of serum TSH with Oscteocalcin and CTx levels for all patients enrolled in the study; Osteocalcin r(Spearmen)=-0.38; p-value <0.001, C-terminal telopeptide of type I collagen (CTx) r(Spearmen)=-0.36; p-value<0.001. Figure 2. Positive correlations of serum FT3 with Osteocalcin and CTx values for all patients enrolled in the study. Osteocalcin r(Spearmen) = 0.28; p-value=0.007, C-terminal telopeptide of type I collagen (CTx) r(Spearmen)=0.24; p-value=0.023. BMD values differed significantly at all parts of the skeleton among the four groups. Spine BMD (L1-L4) was 7.6% lower (p-value= 0.044) (Figure 3) and Neck BMD was 8.6% lower (p-value=0.034) in group 1 versus the control group (Figure 4). Total Hip BMD was 10.8% lower (p-value=0.01) in group 1 and 10.3% lower (p-value=0.013) in group 3 versus group 4 (Figure 4). Radius Total BMD was 11.1% lower (p-value= 0.006) in group 1 and 17.3% lower (p-value <0.001) in group 3 compared to the control group (Figure 5). The Post-hoc analysis also showed that BMD was significantly lower in group 1 (at L1L4 (p-value=0.023); at Neck (p-value=0.005); at Total Hip (p-value=0.006); at Radius Total (p-value <0.001)) as well as in group 3 (at L1-L4 (p-value= 0.033); at Neck (p-value=0.042); at Total Hip (p-value=0.008); at Radius Total (p-value <0.001) versus group 2 (Figures 3, 4, 5). There were no sig-nificant differences in BMD between groups 1 and 3 nor between groups 2 and 4. Figure 3. Comparative analysis of L1-L4 BMD. The one-way ANOVA test did not show significant differences among the four groups (p-value=0.053). However, Post-hoc analysis showed that *Spine BMD (L1-L4) was 7.6% lower (p-value= 0.044) in group 1 compared to the control group. Spine BMD (Post-hoc analysis) was significantly lower in group 1 (pvalue= 0.023) and group 3 (p-value=0.033) compared to group 2. No significant differences were detected between groups 1 and 3, and between groups 2 and 4. Figure 4. Comparative analysis of Neck and Total Hip BMD. Significant differences among the four groups (one-way ANOVA) both at Neck (p-value=0.028) and at Total Hip (p-value= 0.006) were detected. Neck BMD was 8.6% lower (p-value =0.034) in group 1, and Total Hip BMD was 10.8% lower (pvalue= 0.017) in group 1 and 10.3% lower (p=0.013) group 3 versus group 4. It was also found (Post-hoc analysis) that Neck BMD was significantly lower in group 1 (p-value=0.005) and group 3 (p-value=0.042) versus group 2. BMD at Total Hip was also significantly lower in group 1 (p-value=0.006) and group 3 (p-value=0.008) in comparison with group 2. There were no significant differences in BMD among groups 1 and 3, and groups 2 and 4. Figure 5. Comparative analysis of Radius Total BMD. Significant differences among the four groups (one-way ANOVA) (pvalue= 0.001) were detected. *Radius Total BMD was 11.1% lower (p-value=0.006) in group 1 and 17.3% lower (p-value= <0.001) in group 3 compared to the control group. Post-hoc analysis showed that BMD at Radius Total was lower in group 1 (p-value <0.001) as well as in group 3 (p-value=<0.001) versus group 2. Groups 1 and 3 did not significantly differ, nor did groups 2 and 4. Overt hyperthyroidism is associated with increased bone resorption, low bone mineral density and increased number of fractures in postmeno-pausal women.17,18 Whether endogenous or exogenous subclinical hyperthyroidism decreases BMD or increases fracture rate remains controversial.14,16,19,20 Studies examining the effects of exogenous subclinical hyperthyroidism on bone density have been inconsistent. The results of two meta-analyses (1994 and 1996) showed significant bone loss in postmenopausal women on LT4 suppressive therapy versus the control group.21,22 However, two recent systematic reviews of the literature showed that BMD changes in postmenopausal women on LT4 suppressive therapy remain unclear and require further evaluation.19,20 Results of bone density studies in subjects with endogenous subclinical hyperthyroidism are scarce. One case-control study showed a significant increase in bone turnover markers and a decrease in bone mass in postmenopausal women with endogenous subclinical hyperthyroidism due to TMG,23 whereas such an outcome was only suggestive in another paper which included both postmenopausal and premenopausal women.24 Two recent studies examined bone turnover25 and BMD26 in premenopausal women affected by GD and who had subclinical hyperthyroidism at the time of evaluation. The markers of bone metabolism were significantly higher in the group with suppressed TSH compared with the group with normal TSH,25 where as no differences in BMD were detected among patients with subclinical hyperthyroidism and the control group.26 Bone turnover and BMD were determined in 49 male patients with treated thyroid cancer on LT4 suppressive therapy (17 patients) and in newly diagnosed GD (32 patients).27 Bone markers were significantly higher in patients with GD, whereas no significant differences in BMD were found among the groups.27 The primary aim of the present study was to compare the bone metabolism and BMD in postmenopausal women in relation to the etiology of subclinical hyperthyroidism. The implemented design targeted the differences not only between subjects with subclinical hyperthyroidism and the control group, but also among the groups of patients with both exogenous and autoimmune and non autoimmune endogenous subclinical hyperthyroidism. The markers of bone metabolism levels were significantly higher in all patients with subclinical hyperthyroidism versus healthy postmenopausal women. Significant correlations of markers of bone turnover with TSH, FT3, and PTH, but not FT4, levels were also detected. Positive correlations of PTH and FT3 levels (which were within the reference range for all enrolled women) with markers of bone metabolism reflected their normal physiological influence on bone.28-32 At physiological levels, T4 is inactive because it possesses 100-fold lower affinity than T3 for binding to the thyroid hormone receptor (TR).31 It was thus expected that no correlation of FT4 with markers of bone metabolism was found. The negative correlation of TSH and the mark-ers of bone turnover might be considered as indirect evidence of an influence of TSH on bone along with FT3. Recently published data demonstrated a critical role for TSH in skeletal remodeling, which is independent of its effects on circulating thyroid hormones.4,7 Using mice in which the TSHR gene had been knockout, Abe et al found that BMD, in the presence of normal levels of thyroid hormone, depends on an intact response to TSH.4 According to these findings, TSH might be defined as a negative regulator of skeletal remodeling, which exerts influence through its receptor on both osteoblast and osteoclast precursors.4,7,33 Besides, a recent study in elderly humans enrolled in the Rotterdam Study showed that the TSHR ASP727GLU allele, which results in an increased cAMP response of the recep-tor to TSH, is associated with higher BMD and bone mineral content (BMC).34 These results possibly offer an explanation for the increase in the markers of bone metabolism levels in patients with low TSH. However, in our study only women with endogenous subclinical hyperthyroidism had significantly lower BMD versus the control group, whereas there were no significant differences in BMD between patients with exogenous subclinical hyperthyroidism and the control group. Therefore, it is likely that not only low TSH level but also the etiology of subclinical hyperthyroidism affect BMD. It is evident, however, that the women with GD had high thyroid hormone values for a certain period in the past, whereas the patients from groups 1 and 2 did not report overt hyperthyroidism at any time. One may expect that this period of hyperthyroidism in the GD group might have adversely affected bone remodeling. Reconstruction of the bone remodeling sequence in uncontrolled hyperthyroid patients indicates a net loss of about 10-15% of mineralized bone per bone remodeling cycle.35 Completion of a full remodeling cycle normally lasts about 6 months.32 Usually, about 90% of “bone remodeling units” on bone surfaces is dormant, whereas the rate of turnover of the whole skeleton is about 10% per year.36 Consequently, thyroid hormone levels need to remain high for an average of 12 months to cause significant bone loss (2% per year). Therefore, severe bone loss due to overt hyperthyroidism is now uncommonly seen. Patients included in group 3 had normal FT3 and FT4 levels and were under the observation of endocrinologists for a mean period of 3 years (2-7 years) prior to entering the study. Thus, we considered them as patients with endogenous autoimmune subclinical hyperthyroidism. Indeed, women with endogenous subclinical hyperthyroidism (groups 1 and 3) had a similar decrease in BMD,predominantly indistal and proximal cortical bone, though group 1 did not have a history of overt hyperthyroidism in the past. Women with exogenous subclinical hyperthyroidism did not differ from the control group. To explain this finding, other TSH effects should be considered. It has been found that TSH exerts influence not only on the bone precursors but on the mature bone cells as well. In a recent study, iodothyronine deiodinase activity, which is essential for conversion of FT4 to FT3 and is regulated by a TSH receptor-cAMP mediated mechanism,37 was detected in human osteoblast-like osteosarcoma (SaOS-2) cells as well as in normal human osteoblast (NHOst) cells.6 All the characteristics of the deiodinating activity were compatible with Type 2 iodothyronine deiodinase (D2).6 D2 activity was stimulated by TSH in both cells’ cultures.6 Hence, this study suggested that TSH receptors in bone cells are responsible for the local T3 production by D2. The daily secretion of the normal thyroid gland is about 100 nmol of T4, 5 nmol of T3 and less than 5 nmol of reverse T3.32 Most of the plasma pool of T3 is derived from peripheral metabolism of T4.31 Thus, the low TSH level may lead to the decrease of local T3 production in all patients with subclinical hyperthyroidism, but relatively higher T3 production might be expected in patients with endogenous subclinical hyperthyroidism, which is not observed in patients after total thyroidectomy. Therefore, inspite of significant lyhigher FT4 level in patients with exogenous subclinical hyperthyroidism, no differences in BMD were found compared with the control group. However, it is necessary to emphasize that FT3 levels were in the reference range and were not significantly different among the various groups of patients. Due to lack of clinical symptoms, it is impossible to justify the exact duration of TSH suppression in group 1. In conclusion, the etiology of subclinical hyperthyroidism possibly affects BMD in postmenopausal women. Postmenopausal women with endogenous subclinical hyperthyroidism have significantly lower BMD, mainly at the distal and proximal cortical bone,versus healthy postmenopausal women. Therefore, endogenous subclinical hyperthyroidism (both of autoimmune and non autoimmune etiology) might be considered as an additional risk factor for oseoporosis in postmenopausal women. On the other hand, exogenous subclinical hyperthyroidism has no effect on BMD. Postmenopausal women with subclinical hyperthyroidism have a higher bone turnover rate in comparison with the control group, though they do not differ in biochemical parameters of calcium and phosphorous metabolism. 1. Murphy E, Williams GR, 2004 The thyroid and the skeleton. J Clin Endocrinol 61: 285-298. 2. Klee GG, Hay ID, 1988 Sensitive thyrotropin assays: analytic and clinical performance criteria. J Mayo Clin Proc 63: 1123-1132. 3. Bauer DC, Nevitt MC, Ettinger B, Stone KL, 2001 Risk for fracture in women with low serum levels of thyroid-stimulating hormone. J Ann Intern Med 134: 561-568. 4. Abe E, Marians RC, Yu W, et al, 2003 TSH is a negative regulator of skeletal remodeling. Cell 115: 151-162. 5. Inoue M, Tawata M, Yokomori N, Endo T, Onaya T, 1998 Expression of thyrotropin receptor on clonal osteoblast-like rat osteosarcoma cells. J Thyroid 8: 1059-1064. 6. Morimura T, Tsunekawa K, Kasahara T, et al, 2005 Expression of type 2 iodothyronine deiodinase in human osteoblast is stimulated by thyrotropin. J Endocrinology 146: 2077-2084. 7. Norvack DV, 2003 TSH the bone suppressing hormone. J Cell 115: 129-130. 8. Tsai JA, Janson A, Bucht E, et al, 2004 Weak evidence of thyrotropin receptors in primary cultures of human osteoblast-like cells. J Calcif Tissue Int 74: 486-491. 9. Surks MI, Ortiz E, Daniels GH, et al, 2004 Subclinical thyroid disease: scientific review and guidelines for diagnosis and management. JAMA 291: 228-238. 10. Jamal SA, Leiter RE, Bayoumi AM, Bauer DC, Cummings SR, 2005 Clinical utility of laboratory testing in women with osteoporosis. J. Osteoporos Int 16: 534-540. 11. Kim DJ, Khang YH, Koh JM, Shong YK, Kim CS, 2006 Low normal TSH levels are associated with low bone mineral density in healthy postmenopausal women. J Clin Endocrinol (Oxf) 64: 86-90. 12. Lee WY, Oh KW, Rhee EJ, et al, 2006 Relationship between subclinical thyroid dysfunction and femoral neck bone mineral density in women. J Arch Med Res 37: 511-516. 13. Bauer DC, Nevitt MC, Ettinger B, Stone K, 1997 Low thyrotropin levels are not associated with bone loss in older women: a prospective study. J Clin Endocrinol Metab 82: 2931-2936. 14. Biondi B, Palmieri EA, Klain M, Schlumberger M, Filetti S Lombardi G, 2005 Subclinical hyperthyroidism: clinical features and treatment options. Eur J Endocrinol 152: 1-9. 15. Helfand M, 2004 Screening for subclinical thyroid dysfunction in nonpregnant adults: a summary of the evidence for the US Preventive Services Task Force. J Ann Intern Med 140: 128-141. 16. Papi G, Pearce EN, Braverman LE, Betterle C, Roti E, 2005 A clinical and therapeutic approach to thyrotoxicosis with thyroid-stimulating hormone suppression only. Am J Med 118: 349-361. 17. Vestergaard P, Mosekilde L, 2003 Hyperthyroidism, Bone Mineral, and Fracture Risk – a meta-analysis. Thyroid 13: 585-593. 18. Akalin A, Colakt O, Alatast O, Efe B, 2002 Bone remodeling markers and serum cytokines in patients with hyperthyroidism. J Clin Endocrinology 57: 125-129. 19. Quan ML, Pasieka JL, Rorstad O, 2002 Bone mineral density in well-differentiated thyroid cancer patients treated with suppressive thyroxine: a systematic overview of the literature J Surg Oncol 79: 62-70. 20. Schneider R, Reiners C, 2003 The effect of levothyroxine therapy on bone mineral density: a systematic review of the literature. Exp Clin Endocrinol Diabetes 111: 455-470. 21. Faber J, Galloe AM, 1994 Changes in bone mass during prolonged subclinical hyperthyroidism due to L-thyroxine treatment: a meta-analysis. Eur J Endocrinol 130: 350-356. 22. Uzzan B, Campos J, Cucherat M, Nony P, Boissel JP, 1996 Effects on bone mass of long term treatment with thyroid hormones: a meta-analysis. J Clin Endocrinol Metab 81: 4278-4289. 23. Tauchmanova L, Nuzzo V, Del Puente, et al, 2004 Reduced bone mass detected by bone quantitative ultrasonometry and DEXA in pre-and postmenopausal women with endogenous subclinical hyperthyroidism, Maturitas, 48: 299-306. 24. Foldes J, Tarjan G, Szathmari M, Varga F, Krasznai I, Horvath C, 1993, Bone mineral density in patients with endogenous subclinical hyperthyroidism: is this thyroid status a risk factor for osteoporosis? J Clin Endocrinol 39: 521-527. 25. Kumeda Y, Inaba M, Tahara H, et al, 2000 Persistent increase in bone turnover in Graves’ patients with sub-clinical hyperthyroidism. J Clin Endocrinol Metab 85: 4157-4161. 26. Ugur-Altun B, Altun A, Arikan E, Guldiken S, Tugrul A, 2003 Relationships existing between the serum cyto-kine levels and bone mineral density in women in the premenopausal period affected by Graves’ disease with subclinical hyperthyroidism. Endocr Res 29: 389-398. 27. Jodar E, Martinez-Diaz-Guerra G, Hawkins AF, 2001 Bone mineral density in male patients with L-Thyroxine suppressive therapy and Graves disease. Calcif Tissue Int 69: 84-87. 28. Pereira RC, Jorgetti V, Canalis E, 1999 Triiodothyronine induces collagenase-3 and gelatinase B expression in murine osteoblasts. Am J Physiol 277: E496-E504. 29. Salto C, Kindblom JM, Johansson C, et al, 2001 Ablation of TRα and a concomitant overexpression of α1 yields a mixed hypo and hyperthyroid phenotype in mice. J Mol Endocrinol 15: 2115-2128. 30. Siddiqi A, Burrin JM, Wood DF, Monson JP, 1998 Tri-iodothyronin regulates the production of interleukin-6 and interleukin-8 in human bone marrow stromal and osteoblast-like cells. J Endocrinology 157: 453-461. 31. Bianco AC, Salvatore D, Gereben B, Berry MJ, Larsen PR, 2002 Biochemistry, cellular and molecular biology, and physiological roles of the iodothyronin selenodeiodinases. J Endocr Rev 23: 38-89. 32. Greenspan FS, Gardner DG 2004 Basic and clinical endocrinology. Seventh Edition. Lange Medical Books, McGraw-Hill; pp, 216-232. 33. Sun L, Davies TF, Blair HC, Abe E, Zaidi M, 2006 TSH and bone loss. Ann NY Acad Sci 1068: 309-318. 34. Deure VWM, Uitterlinden AG, Pols HAP, Peeters RP, Visser TJ, 2005 The TSH receptor ASP727GLU polymorphism is associated with higher bone mineral density and bone mineral content. J Thyroid 15: s20-s21. 35. Bassett JH, Williams GR, 2003 The molecular actions of thyroid hormone in bone. Trends Endocrinol Metab 14: 356-364. 36. Manolagas SC, 2000 Birth and death of bone cells: basic regulatory mechanisms and implications for the patho-genesis and treatment of osteoporosis. Endocr Rev 21: 115-137. 37. Muracami M, Araki O, Hosoi Y, et al, 2001 Expression and regulation of type II iodothyronine deiodinase in human thyroid gland. J Endocrinology 142: 2961-2967. Address for correspondence: Zhanna Belaya, National Research Center for Endocrinology RAMS, Dmitriya Uljanova, 11, Moscow, Russia 117036, Tel.: 7(495)1244302, Fax: 7(495)5000092, e-mail: email@example.com; firstname.lastname@example.org Received 07-11-06, Revised 11-12-06, Accepted 15-12-06
Research Interest Groups The Research team has convened several interest groups designed to stimulate new research ideas and to foster sharing of ideas among faculty and staff with shared interests. Current groups, which generally meet at least monthly, include: Healthy Aging Research Team JSPH created the Healthy Aging Research Team (HART) to advance healthy aging research and inform education, policy and clinical practice related to population health. HART brings together JSPH’s extensive experience in research on aging and population health, with distinctive qualification in the critically important domains of access, quality of care, and quality of life. HART is interdisciplinary and is composed of professionals with extensive experience in aging research, education, policy and clinical practice. The specific capabilities for HART include: - Measuring the clinical, economic, and humanistic outcomes in aging populations - Establishing metrics to enhance quality and safety across the aging care continuum - Examining decision-making paradigms in palliative and end of life care - Disseminating knowledge of best practices regarding healthy aging to key stakeholders including policy makers, clinicians, researchers, and consumers - Investigating cultural relevance and health literacy in aging populations - Developing and evaluating interventions designed to improve healthy aging and minimize the impact of chronic disease - Addressing community built environment policies and programs to support healthy aging - Promoting patient engagement, chronic care self-management, and adherence The group seeks to identify opportunities through research to improve the quality and cost-effectiveness of care for people with cancer. Areas of interest include: the cancer patient's needs from and perceptions of care; improving access to cancer screening and prevention services; measuring and improving care outcomes; and assessing costs of screening and treatment. Global Climate Change & Health Despite increased recognition that the global climate is changing, limited attention has been paid to implications for population health. This interest group is reviewing the existing literature in an attempt to identify new research opportunities. One of the group's first initiatives was pilot testing of a physician questionnaire seeking to identify the extent to which physicians are aware of global climate change and the theoretical and empirical evidence regarding health impact. The group also is exploring potential data sources and research designs for producing further evidence regarding the links between climate and adverse health outcomes.
My name is Peter and I'm Brazilian. Basically, I try to survive each year by being as sympathetic and insightful as I can. I'm a huge fan of Star Wars, LotR, Dragon Age, Mass Effect, history and a bit of math, besides literature, Football and geography. I also mod Neverwinter Nights 1 and am currently working on the ToaFR saga, besides a few side projects. No blog entries have been posted here. Boring yes, but as confucius says - if you have nothing good to say, why say anything at all? Check back later, perhaps something exciting will pop-up and be worth blogging about, like season 3 of the teletubbies. Speak your mind, rant about games, mods and the development scene, it's simple and who knows maybe someone will read it and agree. It will feel right!
US 7363854 B2 Provided are a method and system for imprinting a pattern formed on surfaces of an imprint mask onto a double-sided substrate. A method includes deforming the surfaces of the first and second imprint stamps to produce respective first and second deformed surfaces, each having an arc therein. A Pressure is applied to bring the deformed first and second surfaces into intimate contact with the first and second substrate surfaces, respectively. The applied pressure substantially flattens the deformed surfaces. And to separate the two surfaces, the applied pressure is released. 1. A method for providing patterns formed on first and second continuous surfaces of respective first and second imprint stamps onto first and second surfaces of a substrate, the method comprising: (a) coupling at least one of the first and the second imprint stamps to a non-planar supporting structure, deforming at least one of the first and second continuous surfaces of the respective first and second imprint stamps to produce a continuous deformed surface; (b) aligning the continuous deformed surface with a corresponding one of the first and second substrate surfaces; (c) applying external pressure to flatten the non-planar supporting structure, conforming the continuous deformed surface into intimate contact with the corresponding one of the first and second substrate surfaces for transferring the pattern from the continuous deformed surface to the corresponding one of the first and second substrate surfaces; and (d) releasing the continuous deformed surface from the corresponding one of the first and second substrate surfaces. 2. The method of 3. The method of using a vacuum pressure and at least one of a hydraulic pressure and a pneumatic pressure, wherein when the hydraulic pressure or the pneumatic pressure is released the continuous deformed surface remains in intimate contact with the corresponding one of the first and second substrate surfaces until the vacuum pressure is released. 4. The method of 5. The method of aligning vertices of arcs of first and second continuous deformed surfaces opposite to each other, when both the first and second continuous surfaces of the respective first and second imprint stamps are deformed to create the arcs. 6. The method of 7. The method of heating at least one of the first and second continuous surfaces of the respective first and second imprint stamps and the first and second substrate surfaces. 8. The method of 9. An apparatus for providing patterns formed on first and second continuous surfaces of respective first and second imprint stamps onto first and second sides of a substrate, the apparatus comprising: a non-planar supporting structure configured to be coupled to at least one of the first and the second imprint stamps for deforming at least one of the first and second continuous surfaces to create a continuous deformed surface; an alignment device for aligning the continuous deformed surface with a corresponding one of the first and second sides of the substrate; a clamping device configured to apply external pressure to flatten the non-planar supporting structure so that the pattern is transferred to the corresponding one of the first and second sides of the substrate by conforming the continuous deformed surface into intimate contact with the corresponding one of the first and second sides of the substrate; and a releasing device configured to release the applied external pressure to initiate separation of the continuous deformed surface from the substrate. 10. The apparatus of 11. The apparatus of an exposing device that exposes the substrate to ultra-violet light. 12. The apparatus of a heating device that heats at least one of the first and second sides of the substrate and the first and second continuous surfaces of the first and second imprint stamps. 13. The apparatus of 14. The apparatus of 15. The method of forming alignment features on the first and second continuous surfaces of the respective first and second imprint masks, such that the first and the second continuous surfaces can be aligned to each other or to the substrate. 16. The method of (1) coupling the substrate to a substrate carrier; and (2) providing a mechanism on the substrate carrier to couple to the non-planar supporting structures when external pressure is applied. 17. The apparatus of 18. The apparatus of 19. The apparatus of 20. The apparatus of 21. The apparatus of 22. The apparatus of This application is a continuation-in-part of U.S. application Ser. No. 11/012,598, filed Dec. 16, 2004, which is hereby incorporated by reference in its entirety. The present invention relates to imprint lithography. A lithographic apparatus is a machine that applies a desired pattern onto a target portion of a substrate. Lithographic apparatus are conventionally used, for example, in the manufacture of integrated circuits (ICs), flat panel displays and other devices involving fine structures. It is desirable to reduce the size of features in a lithographic pattern because this allows for a greater density of features on a given substrate area. In photolithography, the increased resolution can be achieved by using light of shorter wavelength. However, there are problems associated with such reductions. Current systems are starting to adopt optical sources with wavelengths in the 193 nm regime, but even at this level, diffraction limitations become a barrier. At lower wavelengths, the transparency of materials is very poor. Optical lithography machines capable of enhanced resolutions require complex optics and rare materials and are consequently very expensive. An alternative for printing sub-100 nm features, known as imprint lithography, comprises transferring a pattern to a substrate by imprinting a pattern into an imprintable medium using a physical mold or template. The imprintable medium can be the substrate or a material coated on to a surface of the substrate. The imprintable medium can be functional or can be used as a “mask” to transfer a pattern to an underlying surface. The imprintable medium can, for example, be provided as a resist deposited on a substrate, such as a semiconductor material, to which the pattern defined by the template is to be transferred. Imprint lithography is thus essentially a molding process on a micrometer or nanometer scale in which the topography of a template defines the patterns created on a substrate. Patterns can be layered as with optical lithography processes so that in principle imprint lithography could be used for such applications as IC manufacture. The resolution of imprint lithography is limited only by the resolution of the template fabrication process, for example, imprint lithography has been used to produce features in the sub-50 nm range with significantly improved resolution and line edge roughness compared to that achievable with conventional optical lithography processes. In addition, imprint processes do not require expensive optics, advanced illumination sources, or specialized resist materials typically required by optical lithography processes. Current imprint lithography processes can have a number of drawbacks particularly with regard to achieving overlay accuracy and high throughput. However, significant improvements in resolution and line edge roughness attainable are from imprint lithography. A problem which can arise during imprint lithography is that gas bubbles, also known as air inclusions, can be trapped underneath an imprint template during the imprint process. These trapped gas bubbles do not migrate out from beneath the imprint template, but instead stay there for the duration of the imprint process. When the imprint template is removed from the imprintable material (which can be a UV curable resin), an area of the imprinted pattern will be incomplete or otherwise damaged at the location of the gas bubble. With the traditional used UV curable and thermally deformable resins, separating the stamp from the resin, after imprinting, can be particularly problematic. That is, it is difficult to separate the resin and the stamp in a way that is not impeded by the stamp sticking to the resin, particularly when a vacuum has been used to aid the impress process. Additionally, newer applications for Imprint Stamping require patterning on two sides of the substrate, further complicating the problems noted above. What is needed, therefore, is a system and method to alleviate the challenge of separating a stamp from the resin after an imprint stamp is used to imprint a pattern into the resin. What is also needed is a system and method enhance the speed of imprint stamping on two sides of the substrate. Consistent with the principles of the present invention, as embodied and broadly described herein, the present invention includes a method for imprinting patterns formed on opposing surfaces of first and second imprint stamps onto first and second sides of a substrate, respectively. The method includes deforming the surfaces of the first and second imprint stamps to produce respective first and second deformed surfaces, each having an arc therein. A pressure is applied to bring the deformed first and second surfaces into intimate contact with the first and second substrate surfaces, respectively. The applied pressure substantially flattens the deformed surfaces. And to separate the two surfaces from the respective surfaces of the substrate, the applied pressure is released. The imprint apparatus of the present invention may print on both sides of a substrate, simultaneously. The apparatus can employ, for example, two stamps, which are aligned to provide registration between top and bottom patterns. The substrate is introduced between the two stamps and is aligned to them. The apparatus has subsystems which provide positioning and alignment of Stamp A, Stamp B, and the substrate. Substrate handling is provided. Temperature and pressure monitoring system are provided. X, Y, Z and Tilt adjustments are provided for stamps and substrate. The imprint apparatus may also be used to print one sides of a substrate first and then print a second side of the substrate. The stamps have induced bows in their surface to facilitate peel-off and stamp release from the substrate. In one embodiment of the present invention, the imprint apparatus is used for producing patterned media for magnetic data storage. Tracks and Magnetic Domain patterns are aligned and printed on both sides of the data storage platens. One or more embodiments of the present invention are applicable to any imprint lithography process in which a patterned template is imprinted into an imprintable medium in a flowable state, and, for example, can be applied to hot and UV imprint lithography as described above. In another embodiment of the present invention, a system is provided that comprises a substrate, a carrier, and first and second imprint stamps. The substrate has first and second patterning surfaces and a shaped edge. The carrier has a holding portion that holds the shaped edge of the substrate. The holding surface has a shape that is complementary to the shaped edge of the substrate, such that the patterning surfaces remain untouched by the carrier. The first and second imprint stamps form patterns on respective ones of the first and second patterning surfaces. Further embodiments, features, and advantages of the present inventions, as well as the structure and operation of the various embodiments of the present invention, are described in detail below with reference to the accompanying drawings. The accompanying drawings, which are incorporated herein and form a part of the specification, illustrate one or more embodiments of the present invention and, together with the description, further serve to explain the principles of the invention and to enable a person skilled in the pertinent art to make and use the invention. The following detailed description of the present invention refers to the accompanying drawings that illustrate exemplary embodiments consistent with this invention. Other embodiments are possible, and modifications may be made to the embodiments within the spirit and scope of the invention. Therefore, the following detailed description is not meant to limit the invention. Rather, the scope of the invention is defined by the appended claims. It would be apparent to one skilled in the art that the present invention, as described below, may be implemented in many different embodiments of hardware and/or the entities illustrated in the drawings. Thus, the operation and behavior of the present invention will be described with the understanding that modifications and variations of the embodiments are possible, given the level of detail presented herein. There are two principal approaches to imprint lithography which will be termed generally as hot imprint lithography and UV imprint lithography. There is also a third type of “printing” lithography known as soft lithography. Examples of these are illustrated in The template used in soft lithography can be easily deformed and can therefore not be suited to high-resolution applications, e.g., on a nanometer scale, since the deformation of the template can adversely affect the imprinted pattern. Furthermore, when fabricating multiple layer structures, in which the same region will be overlaid multiple times, soft imprint lithography may not provide overlay accuracy on a nanometer scale. Hot imprint lithography (or hot embossing) is also known as nanoimprint lithography (NIL) when used on a nanometer scale. The process uses harder templates made from, for example, silicon or nickel, which are more resistant to wear and deformation. This is described, for example, in U.S. Pat. No. 6,482,742 and illustrated in In a typical hot imprint process a solid template 14 is imprinted into a thermosetting or a thermoplastic polymer resin 15, which has been cast on the surface of a substrate 12. The resin can, for example, be spin coated and baked onto the substrate surface or more typically (as in the example illustrated) onto a planarization and transfer layer 12′. It shall be understood that the term “hard” when describing an imprint template includes materials that can generally be considered between “hard” and “soft” materials, such as for example “hard” rubber. The suitability of a particular material for use as an imprint template is determined by its application requirements. When a thermosetting polymer resin is used the resin is heated to a temperature such that, upon contact with the template, the resin is sufficiently flowable to flow into the pattern features defined on the template. The temperature of the resin is then increased to thermally cure (e.g., crosslink) the resin so that it solidifies and irreversibly adopts the desired pattern. The template can then be removed and the patterned resin cooled. Examples of thermoplastic polymer resins used in hot imprint lithography processes are poly (methyl methacrylate), polystyrene, poly (benzyl methacrylate) or poly (cyclohexyl methacrylate). The thermoplastic resin is heated so that it is in a freely flowable state immediately prior to imprinting with the template. It is typically necessary to heat thermoplastic resins to temperatures considerably above the glass transition temperature of the resin. The template is pressed into the flowable resin and sufficient pressure is applied to ensure the resin flows into all the pattern features defined on the template. The resin is then cooled to below its glass transition temperature with the template in place whereupon the resin irreversibly adopts the desired pattern. The pattern will consist of the features in relief from a residual layer of the resin that can then be removed by an appropriate etch process to leave only the pattern features. Upon removal of the template from the solidified resin, a two-step etching process is performed as illustrated in After the template has been removed, a residual layer 22 of the solidified resin is left on the planarization and transfer layer, shaped in the desired pattern. The first etch is isotropic and removes parts of the residual layer, resulting in a poor aspect ratio of features where L1 is the height of the features 23, as shown in Hot imprint lithography suffers from a disadvantage in that not only is the pattern transfer be performed at a higher temperature, but also relatively large temperature differentials might be required in order to ensure the resin is adequately solidified before the template is removed. Temperature differentials between about 35 and about 100° C. are known from literature. Differential thermal expansion between, for example, the substrate and template, can then lead to distortion in the transferred pattern. The problem is exacerbated by the relatively high pressures used for the imprinting step, due the viscous nature of the imprintable materials, which can induce mechanical deformation in the substrate, again distorting the pattern. UV imprint lithography on the other hand does not involve such high temperatures and temperature changes. Nor does it require such viscous imprintable materials. Rather UV imprint lithography involves the use of a transparent template and a UV-curable liquid, typically a monomer such as an acrylate or methacrylate for example. In general any photopolymerisable material could be used, such as a mixture of monomers and an initiator. The curable liquid can also, for example, include a dimethyl siloxane derivative. Such materials are much less viscous than the thermosetting and thermoplastic resins used in hot imprint lithography and consequently move much faster to fill template pattern features. Low temperature and low pressure operation also favors higher throughput capabilities. An example of a UV imprint process is illustrated in Although this type of imprint lithography mainly uses UV curable materials, and is thus generically referred to as UV imprint lithography, other wavelengths of light can be used to cure appropriately selected materials (e.g., activate a polymerization or cross-linking reaction). In general any radiation capable of initiating such a chemical reaction can be used if an appropriate imprintable material is available. Alternative “activating light” can, for example, include visible light, infrared light, x-ray radiation, and electron beam radiation. In the general description above, and below, references to UV imprint lithography and use of UV light are not intended to exclude these and other activating light possibilities. As an alternative to imprint systems using a planar template that is maintained substantially parallel to the substrate surface, roller imprint systems have been developed. Both hot and UV roller imprint systems have been proposed in which the template is formed on a roller, but otherwise the imprint process is very similar to imprinting using a planar template. Unless the context requires otherwise, references to an imprint template include references to roller templates. There is a particular development of UV imprint technology known as step and flash imprint lithography (SFIL), which can be used to pattern a substrate in small steps in a similar manner to optical steppers conventionally used in IC manufacture. This involves printing small areas of the substrate at a time by imprinting a template into a UV curable resin, ‘flashing’ UV light through the template to cure the resin beneath the template, removing the template, stepping to an adjacent region of the substrate and repeating the operation. The small field size of such step and repeat processes minimizes pattern distortions CD variations so that SFIL is particularly suited to manufacture of IC and other devices requiring high overlay accuracy. Although in principle the UV curable resin can be applied to the entire substrate surface, for example, by spin coating, this is problematic due to the volatile nature of UV curable resins. One approach to addressing this problem is the so-called ‘drop on demand’ process in which the resin is dispensed onto a target portion of the substrate in droplets immediately prior to imprinting with the template. The liquid dispensing is controlled so that a certain volume of liquid is deposited on a particular target portion of the substrate. The liquid can be dispensed in a variety of patterns and the combination of carefully controlling liquid volume and placement of the pattern can be employed to confine patterning to the target area. Dispensing the resin on demand as mentioned is not a trivial matter. The size and spacing of the droplets are carefully controlled to ensure there is sufficient resin to fill template features, while at the same time minimizing excess resin which can be rolled to an undesirably thick or uneven residual layer since as soon as neighboring drops touch fluid the resin will have nowhere to flow. The problems associated with overly thick or uneven residual layer are discussed below. The residual layer left after stamping is useful in protecting the underlying substrate, but as mentioned above it is also the source of a number of problems particularly when high resolution and/or overlay accuracy is desired. The first ‘breakthrough’ etch is isotropic (e.g., non-selective), and will thus to some extent erode the features imprinted as well as the residual layer. This is exacerbated if the residual layer is overly thick and/or uneven. This problem can, for example, lead to variation in the thickness of lines ultimately formed in the underlying substrate (i.e., variation in the critical dimension). The uniformity of the thickness of a line that is etched in the transfer layer in the second anisotropic etch is dependant upon the aspect ratio and integrity of the shape of the feature left in the resin. If the residual resin layer is uneven, then the non-selective first etch can leave some of these features with “rounded” tops so that they are not sufficiently well defined to ensure good uniformity of line thickness in the second and any subsequent etch process. In principle, the above problem can be reduced by ensuring the residual layer is as thin as possible but this can require application of undesirably large pressures (e.g., increasing substrate deformation) and relatively long imprinting times (e.g., reducing throughput). The template is a significant component of the imprint lithography system. As noted above, the resolution of the features on the template surface is a limiting factor on the attainable resolution of features printed on the substrate. The templates used for hot and UV lithography are generally formed in a two-stage process. Initially, the desired pattern is written using, for example, electron beam writing, to give a high-resolution pattern in resist. The resist pattern is then transferred into a thin layer of chrome which forms the mask for the final, anisotropic etch step to transfer the pattern into the base material of the template. Other techniques, such as, for example, but not limited to, ion-beam lithography, X-ray lithography, extreme UV lithography, epitaxial growth, thin film deposition, chemical etching, plasma etching, ion etching, or ion milling could be used. Generally, a technique capable of very high resolution will be desired as the template is effectively a 1× mask with the resolution of the transferred pattern being limited by the resolution of the pattern on the template. The release characteristics of the template can also be an important consideration. The template can, for example, be treated with a surface treatment material to form a thin release layer on the template having a low surface energy (a thin release layer can also be deposited on the substrate). Although reference is made above to depositing UV curable liquids onto a substrate, the liquids could also be deposited on the template and in general the same techniques and considerations will apply. Another important consideration in the development of imprint lithography is the mechanical durability of the template. The template is subjected to large forces during stamping of the resist, and in the case of hot lithography, it is also subjected to extremes of pressure and temperature. This will cause wearing of the template, and can adversely affect the shape of the pattern imprinted upon the substrate. In hot imprint lithography there are potential advantages in using a template of the same or similar material to the substrate to be patterned in order to minimize differential thermal expansion between the two. In UV imprint lithography the template is at least partially transparent to the activation light, and accordingly quartz templates are used. Although specific reference can be made in this text to the use of imprint lithography in the manufacture of ICs, it should be understood that imprint apparatus and methods described can have other applications, such as the manufacture of integrated optical systems, guidance and detection patterns for magnetic domain memories, hard disc magnetic media, flat panel displays, thin-film magnetic heads, etc. While in the description above particular reference has been made to the use of imprint lithography to transfer a template pattern to a substrate via an imprintable resin effectively acting as a resist, in some circumstances the imprintable material can itself be a functional material, for example, having a functionally such as conductivity, optical linear or non linear response amongst others. For example, the functional material can form a conductive layer, a semiconductive layer, a dielectric layer or a layer having another desirable mechanical, electrical or optical property. Some organic substances can also be appropriate functional materials. Such applications can be within the scope of an embodiment of the present invention. Exemplary Transport of Substrate for Double Sided Patterning Exemplary Double Sided Patterning of Substrate In an exemplary embodiment of the present invention, a curvature or bow is created in the imprint stamp that allows the stamp to be separated from the resin (substrate) with an unzipping action. Once separated from the stamp, the substrate can be unloaded from the apparatus in an undamaged state. The curvature or bow is instrumental in providing a clean separation of the stamp and substrate, particularly on larger substrates. Uses and manufacturing of nano-plate imprint stamps are described in U.S. patent application entitled METHOD AND SYSTEM FOR MAKING A NANO-PLATE FOR IMPRINT LITHOGRAPHY, application Ser. No. 11/012,489, filed Dec. 16, 2004 and U.S. patent application entitled METHOD AND SYSTEM FOR MAKING A COMPUTER HARD DRIVE PLATEN USING A NANO-PLATE, application Ser. No. 11/012,474, filed Dec. 16, 2004, both of which are assigned to the assignee of the present invention and are incorporated herein by reference. The imprint stamps 802 a and 802 b respectively include patterns 803 a and 803 b that are to be printed onto respective sides 804 a/804 b of the substrate 804. Each of the imprint stamps 802 a and 802 b is clamped in such a way as to create a bow in the stamp profile. In the embodiment of In one example, stamps 802 a and 802 b can be clamped flat onto substrate 804 and the bowing can be produced by gas pressure (e.g., air or nitrogen) being exerted behind a plate of each of the stamps 802 a and 802 b to release stamps 802 a and 802 b from substrate 804. In one embodiment, the bow introduced in stamp 802 a is substantially equal to the bow introduced in stamp 802 b. In another embodiment, the amount of bowing can be different in each stamp. In the exemplary embodiment of In another example, alignment can be performed based on alignment marks 818 a-d, where alignment is made between alignment marks 818 a and 818 b and between 818 c and 818 d. As a final check and to provide a means of more finely tuning ongoing alignments, a viewing system can then be used to view the alignment markers 814 and the bore 812 during the alignment process. Effectively, the bows formed in each of the stamps 802 a and 802 b, are substantially flattened out by a clamping pressure. Further clamping pressure can be applied using the vacuum seals 814. The vacuum seals are provided to create a vacuum cavity between the sides 804 a and 804 b of substrate 804 and the imprint stamps 802 a and 802 b, respectively. The pressure and temperature of the stamping process is controlled to provide high quality pattern transfer. The entire apparatus is enclosed in a chamber which provides temperature control. The temperature of the apparatus including the substrate is controlled to a temperature defined by the requirements of the process conditions of the applied resin. Transfer of the patterns 803 a and 803 b into the respective sides 804 a and 804 b can be further facilitated by optionally flood exposing, for example, a UV-cure type resin with UV light 904 through each of the imprint stamps 802 a and 802 b and into the surfaces 804 a and 804 b of the substrate 804, respectively. The UV exposure 904 cross-links the resin coated substrate 804 and helps to solidify the resin. When softened through heating, the patterns 803 a and 803 b from the imprint stamps 802 a and 802 b respectively, can be physically pressed into the softened sides 804 a and 804 b of the resin 804 by applying the force/pressure 902. Using a thermal resin, no U-V exposure is required to cure the resin. Both the stamps 802 a and 802 b, and the substrate 804 are typically heated and temperature controlled in the case of thermal imprinting. In another embodiment, stamps 802 a and 802 b have central apertures in them. A ball or curvature is introduced in these stamps 802 a/802 b to facilitate separation between stamps 802 a/802 b and substrate 804. In a still further embodiment, stamps 802 a/802 b can be, but are not limited to, square or disk shaped. The separation progresses to the center portion 810 of the substrate 804 in a carefully controlled manner as the pressure is fully released. There is an unzipping, or peeling back action, as opposed to a straight pull off, to separate the sides 804 a and 804 b from the imprint stamps 802 a and 802 b, respectively. This action is essential to the keeping of nanometer sized imprinted patterns transferred to the substrate 804 in place and undamaged. Once separated from the imprint stamp 802 a and 802 b, the substrate sides 804 a and 804 b can be unloaded from the apparatus 800. In one example, release agent material can be formed on the stamps or resin surface to further aid the release of the stamps from the resin. In one example, the patterning of the first and second sides of the substrate is performed substantially simultaneously. While various embodiments of the present invention have been described above, it should be understood that they have been presented by way of example only, and not limitation. It will be apparent to persons skilled in the relevant art that various changes in form and detail can be made therein without departing from the spirit and scope of the invention. Thus, the breadth and scope of the present invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents. It is to be appreciated that the Detailed Description section, and not the Summary and Abstract sections, is intended to be used to interpret the claims. The Summary and Abstract sections can set forth one or more, but not all exemplary embodiments of the present invention as contemplated by the inventor(s), and thus, are not intended to limit the present invention and the appended claims in any way.
I did something today that I haven’t done in several years: a vacuum distillation. That used to be a larger part of every chemist’s life, but advances in chromatography have eaten into a lot of the older techniques for purifying compounds. Recrystallization is another obvious example of a lost art, one that I’ve steadily heard characterized as such for the last twenty years. Well back before my time, people purified their liquids through distillation and their solids by recrystallizing them, and that was that. Both of those can still be the best way to go, depending on your compounds. When you come across these methods in the older literature, you always have to ask yourself if you should stick with them, or if a chromatography would do the job more easily. Today, though, it was a modern procedure I was following, so distillation it was. For the non-chemists in the audience, here's how you do it. You rig a glass apparatus onto the top of your round-bottom flask of gunk - there's one at the left. This "still head" has a short neck coming up, a bend that accommodates a thermometer, then a cold-water circulating condenser built in right before a tube to deliver the drops of distilled product. Along that region there's another fitting to hook the vacuum pump up. Pulling a vacuum on the system lowers the boiling point of the liquids inside it - one of the reasons you have to adjust recipes at high altitude, actually. (If you lower the pressure enough, you can get water to boil at room temperature). Without that lowering, many compounds would have to be heated up so much to distill them that they'd start to decompose. Heating things to that point isn't much fun, in any case. Far better to pump things down and take them over at a more reasonable temperature. The usual technique is to pump things down first, just to get any bumping and bubbling out of the way as leftover low-boiling solvents and dissolved gases clear out. Then you gradually increase the temperature on the distillation pot until things start to boil. You can see the condensation form on the inside of the still head as things get going, then drops start to condense and drip off the end of the thermometer back into the pot. A bit more heating and things make it over to the condenser, roll down the collection tube, and into the receiver flask. Of course, you may have more than one thing in that pot. The stuff that's boiling out will eventually all come over, and as you heat things up some more the next higher-boiling component will then start to boil and the process repeats. That's why they make adapters that can fit several receiver flasks - these things will turn to accomodate different fractions, one after the other. The common lab name for these is a "cow" (Germans call them "spiders"). When you're finished, you generally have one or more flasks full of clear liquid on the far end of things, and the distillation pot generally looks just awful. All the high-boiling impurities have concentrated, and the resulting mix has been thoroughly cooked. It's a dramatic illustration of what you've accomplished - dark brown sludge separated out from pure product. Distillation makes you feel as if you've earned your lunch break.
Ardašīr, Middle Persian spelling ʾrthštr ( = Parthian ʾrthštr), pronounced Artašīr, later Ardašīr, is derived from Old Iranian *Ṛtaxšira, a two-stem hypocoristic name (*ṛta-xš-ira) to a full name *Ṛtaxšθra (R. Schmitt, “Artaxerxes, Ardašīr und Verwandte,” in Incontri Linguistici 5, 1979, pp. 61-72 and below under Artaxerxes). Family and early career. Sources on Ardašīr’s birth and early years vary on many points. According to one account given by Ṭabarī (I, p. 814) he stemmed from a noble family of Persis and was born at Ṭīrūda, a village in the district of Ḵīr and subdistrict of Eṣṭaḵr. His grandfather Sāsān (q.v.), whose name was to be given to the dynasty, is described as custodian of the temple of the Fire of Anāhitā (Bayt nār Nāhīḏ) at Eṣṭaḵr and his grandmother, Rāmbehešt, as a descendant of the princely family named Bāzrangī. His father was Pāpak (Bābag, q.v.), a son of Sāsān, and his successor to the “governorship of the people.” A second version may be adduced from the inscription of Šāpūr I on the Kaʿba-ye Zardošt (ŠKZ), which names Sāsān as a lord (hwtʾy) but not as Pāpak’s father (Mid. Persian, line 25). A third version appears in the Middle Persian romance generally known as the Kār-nāmag ī Ardašīr (Book of the deeds of Ardašīr, tr. Th. Nöldeke, Geschichte des Artachšīr i Pāpakān [ = Bezzenbergers Beiträge 4, 1878, pp. 22ff.]), repeated in Ferdowsī’s Šāh-nāma (Moscow, VII, pp. 116ff.) and echoed by Agathias (2.27). According to this, the local ruler Pāpak gave his daughter in marriage to Sāsān after learning of Sāsān’s descent from Dārā, i.e. the Achaemenid king Darius III, and Ardašīr was the child of their union. Thereafter, however, Sāsān disappears from the romance and Pāpak is treated as Ardašīr’s father. The discrepancy of the sources is variously explained. Some accept Ṭabarī’s version, dismissing the third as a legend, or suggest a possible adoption, consistent with Zoroastrian practice, of Sāsān’s son Ardašīr by Pāpak. Others surmise that, as in the case of Achaemenes, Sāsān may have been an ancestor and patronym of the Sasanian dynasty (see Nöldeke, Geschichte der Perser, pp. 1ff.; Herzfeld, Paikuli I, pp. 35f., 240ff.; R. N. Frye, Camb. Hist. Iran III, 1983, pp. 116ff.; M. L. Chaumont, RHR 153, 1958, pp. 154ff., and JA 247, 1959, pp. 175ff.). Equal obscurity surrounds Ardašīr’s early career. According to Ṭabarī (in Nöldeke, ibid., pp. 4f.; see also Baḷʿamī, Tārīḵ, pp. 877ff., and the anonymous Nehāyat al-erab, cited and tr. in G. Widengren, “The Establishment of the Sasanian Dynasty in the Light of New Evidence,” in La Persia nel Medioevo, Rome, 1971, pp. 767ff.), Pāpak obtained permission from Gōzihr, the king of Eṣṭaḵr to place his son in the care of Tīrī, the commandant of the castle of Dārābgerd; when Tīrī died, Ardašīr took over his post, but then defiantly began to extend his own sway, and in the process killed several local princes, and even urged his father to overthrow Gōzihr. Pāpak did so and upon the refusal of the Parthian Great King to make Šāpūr the new king of Eṣṭaḵr, declared open rebellion. The leading role of Ardašīr in the rebellion against the central authority could be a later interpretation; it is quite likely, on the other hand, that Pāpak gained partial control of Fārs because he is known from Ardašīr’s coins (see below). The rebellion began with the overthrow of the king of Eṣṭaḵr, after which the realm was consolidated and its independence from the Parthian monarch was proclaimed. It may be inferred that one of these events took place in 205-206 A.D., because that year is implied as the start of an era (the Sasanian era?) in a Middle Persian-Parthian inscription at Bīšāpūr which is dated to “the year 58, forty years of the [royal] fire of Ardašīr, twenty-four years of the fire of Šāpūr” (see R. Ghirshman and A. Christensen in RAA 10, 1936, pp. 123ff.; O. Hansen, ZDMG 92, 1936, pp. 441ff.; W. B. Henning, BSOAS 9, 1939, pp. 825f.). The chronological implication of this text is much discussed (see esp. W. B. Henning and S. H. Taqizadeh, Asia Major 6, 1957, pp. 106-21, and most recently R. Altheim-Stiehl, AMI, N.F. 11, 1978, pp. 113ff., and more fully in Boreas 5, 1982, pp. 153ff.). The supposition that the date indicated Pāpak’s rebellion seems all the more probable because subsequent Sasanian time-reckoning was not based on the epochal year 205-206, but either on the start of each king’s reign or on the Seleucid era, and Ardašīr himself initiated his own era (Ḥamza, p. 23) with his overthrow of the Parthians in 224. The reign of the Parthian monarch Vologeses IV (192-207) was disturbed by the invasion of Mesopotamia by the Roman emperor Septimius Severus, and the attention of the paramount Iranian power was naturally directed to the west providing a good opportunity for the local rulers in the southwestern and central regions to initiate revolts. Pāpak was supported by his sons, the eldest of whom, Šāpūr, became king in his father’s life time (his coins are known), but after they both were dead, Ardašīr assumed power and gave the movement a new impetus (see for details and sources S. H. Taqizadeh, in BSOAS 9, pp. 125ff.; V. G. Lukonin, Kulʾtura Sasanidskogo Irana, Moscow, 1969, chap. 2; Widengren, op. cit., pp. 711ff.). By 224, Ardašīr had extended his sway over Persis and beyond into Elymais (Ḵūzestān) and Kermān, forcing to submission many local kings and vassals of the Parthians (Ṭabarī, I, p. 815; Baḷʿamī, pp. 881ff.). The extent of his original realm cannot be determined precisely. During this first phase he was already flouting Parthian authority through administrative actions such as the foundation of new towns and probably the issue of coins (see details in Lukonin, op. cit.). The story of an exchange of letters between Ardašīr and the reigning Arsacid, Artabanus (Ardavān) V (told by Ṭabarī, I, pp. 817f.) and some other Oriental sources, e.g., Baḷʿamī, pp. 880f.) may be regarded as a literary or historiographical dramatization of the fact that Ardašīr was claiming the throne of all Iran. His prospect of success would have been less good if his pretensions had not concurred with a widespread mood of discontent with the Parthian régime and willingness to look favorably on the rebellion. His policy declarations and propaganda (cf. the letters to local kings cited in Ḥamza, p. 45), as well as his military victories, probably induced many individuals to stake their lot on the movement’s success (see also Ferdowsī, VII, pp. 130f.). Overthrow of the Parthian empire (224), and subsequent expansion of Ardašīr’s realm. The decisive battle between the Parthians and the Sasanians was fought in the plain of Hormazǰān in Media on 28 April 224 (Nöldeke, Geschichte der Perser, p. 411). The year is confirmed by the evidence of the inscription of Šāpūr at Bīšāpūr (cf. Altheim-Stiehl in a forthcoming work on the Chronicle of Arbela, ed. by P. Kawerau). A detailed account of the battle was probably composed for the official history of the Sasanians, and if so, is likely to have been Ṭabarī’s ultimate source. An illustration of this account was carved by Ardašīr in a bas-relief at Fīrūzābād (see Ṭabarī, I, p. 818, Baḷʿamī, pp. 882ff.; Ṯaʿālebī, pp. 478ff.; Dīnavarī, p. 44; Ferdowsī, VII, pp. 134f.; Chronicle of Arbela, in A. Mingana, ed., Sources syriaques I, Leipzig, 1908, p. 29.8ff.; Acta Martyrum et Sanctorum Syriaca, ed. P. Bedjan, II, Paris, 1891, p. 128. On the bas-relief, see below). While still on the battlefield, Ardašīr assumed the title Šāhānšāh (king of kings), and this marked his accession, and indeed, in the light of the most plausible interpretation of the bilingual inscription at Bīšāpūr, the “official” opening year of the Sasanian régime began in 223-224 A.D., i.e. the Sasanian calendar year starting with 27 September 223 and ending with 25 September 224 (R. Altheim-Stiehl, AMI, N.F. 11, 1978, pp. 113ff., and Boreas 5, 1982, pp. 152ff.). In other sources an official coronation of Ardašīr at Ctesiphon in 226 is mentioned in the context of an expedition to annex former Parthian territories in northwestern Iran and Upper Mesopotamia (see Taqizadeh and Henning, op. cit., and Lukonin, op. cit., for references and discussion). In the campaign in the northwest of the Parthian empire, Ardašīr failed in an attempt to capture Hatra about 226-227 (Dio Cassius 80.3.2), just as two Roman emperors—Trajan (Dio Cassius 68.17ff.) and Septimius Severus (Dio Cassius 76.9ff.; Herodian 3.9)—had failed before him. He was also repulsed (in 227-228?) by the Arsacids of the collateral line reigning in Armenia, who were to give the Sasanians trouble for a long time (Dio Cassius 80.3.2-3). On the other hand Ardašīr was apparently able, in the following years, to take over the east of the Parthian empire and obtain the submission of numerous Parthian vassals, local magnates, and noble families (Lukonin, op. cit., chap. 2). The precise extent of the Sasanian empire can not be ascertained. It appears that the rulers of the Kūšān and of Turan in the east paid homage to Ardašīr and that the oasis of Marv (and presumably also Ḵᵛārazm) fell into his hand (Ṭabarī, I, p. 819; Yaʿqūbī, I, p. 179; Dīnavarī, p. 44; Nehāya, in Widengren, op. cit., p. 770. On the campaign see E. Herzfeld, Paikuli I, Berlin, 1924, pp. 37ff.; Widengren, op. cit., pp. 752ff.). In the southwest, the Sasanians succeeded in conquering the north Arabian coast (Baḥrayn) (Ṭabarī, I, p. 820; Dīnavarī, pp. 44f.; Nehāya,in Widengren, op. cit., p. 771; cf. R. N. Frye, “Bahrain under the Sasanians,” in Dilmun, ed. D. T. Potts, Berlin, 1983, pp. 167ff.). In the northwest, the old Roman-Parthian frontier probably at first marked the limit of Sasanian influence (Wiesehöfer, Klio 64, 1982, pp. 440ff. with literature). There can be no doubt that Ardašīr’s view of foreign relations was shaped by his ambition to resume “Achaemenid” policy and repeat its successes. As J. Wolsksi (in Aufstieg und Niedergang der römischen Welt, ed. H. Temporini and W. Haase, II/9, pt. 1, Berlin, 1976, pp. 195ff.) has rightly observed, the Sasanians were not the first to pursue a consciously Iranian policy and propagate a related political ideology (see below); the Arsacids had done the same before them. In both war and propaganda, however, Ardašīr and his heirs achieved better results. Ardašīr appears to have discerned that an irredentist and offensive policy would have no chance of success without prior stabilization of conditions within the empire. The Parthian central government’s dependence on local magnates and tribal leaders, and the autonomy acquired by the aristocratic and tribal interests, had for two centuries curbed foreign policy and repeatedly enabled dangerous adversaries, above all the Romans, to exploit internal troubles (Ḥamza, p. 45; Ṭabarī, I, p. 814; Ebn Qotayba, Ketāb al-maʿāref, ed. Wüstenfeld, Göttingen, 1850, p. 321; Ebn Meskawayh, Taǰāreb al-omam I, ed. Caetani, Leiden and London, 1909, p. 77. Cf. The Letter of Tansar, tr. Boyce, Rome, 1968, p. 29). Only through elimination of most of the local kings and establishment of a new centralized and bureaucratically organized system (Ṯaʿālebī, Ḡorar, p. 480) would it be possible to change the existing military balance and territorial configuration. Both the army and the administration would have to be reformed to ensure success (Christensen, Iran Sass., pp. 97ff., 107ff., 130ff., 207ff.). Although the Sasanians had only a superficial and imprecise knowledge of their “ancestors” (see E. Yarshater, “Were the Sasanians Heirs to the Achaemenids?” in La Persia nel Medioevo, Rome, 1971, pp. 517ff.) there is plenty of evidence in the Middle Persian and Perso-Arabic literature to show that the aggressive confrontation with Rome was meant to restore a once glorious position in the west, aims that were also taken seriously by the Romans. Thus, Ṭabarī (I, p. 814) reports a declaration by Ardašīr that he had risen “to avenge the blood of his cousin Dārā b. Dārā whom Alexander had fought and two of Alexander’s hirelings had murdered” (Nöldeke, Geschichte der Perser, p. 3. Cf. The Letter of Tansar, tr. Boyce, p. 29). This claim to the imperial lineage and territory of the Achaemenids is also evidenced by Roman historians who report that the Sasanian ruler demanded retrocession of all the former Achaemenid domains in the west (Herodian 6.2.2; Dio Cassius 80.3.4; Zonaras 12.15). The Sasanian claims were probably not so precisely formulated and historically based as Herodian, in particular, suggests; but these reports show that the objective of Sasanian foreign policy was well understood by their Roman adversaries, although they failed to see the change of regime in Iran as revolutionary (Christensen, op. cit., p. 97), for the Parthians had also aired similar pretensions at times when their military position was strong (Tacitus, Annals 6.31). It is noteworthy that the Sasanian evocation of the traditional view of Alexander as the great wrecker of Iran was matched by a contemporary Roman emphasis on the idea of imitatio Alexandri. The emperor Caracalla described himself as a second Alexander (Dio Cassius 78.7.1ff.; Herodian 4.8.1f.), and Alexander Severus cherished the same notion (Dio Cassius 79.17.3; Herodian 5.7.3; Historia Augusta, Alexander Severus 5l.4). The available information about the fighting in the west comes almost exclusively from Latin and Greek sources (mainly Herodian 6.2ff.). Sasanian troops invaded the Roman-ruled part of Upper Mesopotamia in 230 A.D. and laid siege to Nisibis, one of the territory’s two main fortresses (the other being Carrhae), but were unable to capture it. Raids by Sasanian cavalry squadrons penetrated into Syria and Cappadocia (Herodian 6.2.1; Zonaras 12.15; Syncellus 1.674 ed. Dinorf). When negotiations, which the Romans had proposed, broke down, Alexander Severus reluctantly decided to march in person against Ardašīr. After conscripting troops and reinforcing them with experienced veteran units (vexillationes) from garrisons in the Danube region, he proceeded overland to Syria. From his headquarters at Antioch he appears to have made another unsuccessful attempt in the winter of 231-232 to settle the conflict by diplomatic means (Herodian 6.4.4; Zonaras 12.15). A mutiny in the army had to be crushed before any advances to the war fronts could be undertaken. The war ended unrewardingly for the Romans, whose early victories were outweighed by later defeats (Herodian 6.5f.); but the result of this first trial of strength was not exactly advantageous to Ardašīr either, because the Sasanian army suffered severe losses and was for the most part so exhausted that the troops had to be discharged (Herodian 6.4.4ff., 7.1). The lack of any mention of this war in the Perso-Arabic literature suggests that the whole venture in fact ended ingloriously for Ardašīr. Conversely, in some of the Roman writings, the war’s outcome in maintenance of the status quo is made to look like a great success for the emperor. Alexander Severus staged a triumph for himself after his return to Rome (Aurelius Victor, Caes. 24.2; Eutropius 8.23; Festus 22; Hieronymus, Chron. 215; Orosius 7.18; Jordanis, Rom. 36; Historia Augusta, Alex. Sev. 55.1, 56.1ff. all discussed in A. Rösger, “Die Darstellung des Perserfeldzugs des Severus Alexander in der Historia Augusta,” Bonner Historia-Augusta-Colloquium 1975/76, Bonn, 1978, pp. 167ff.) No formal peace treaty was signed, but in the following years Rome’s eastern frontier was not disturbed by any new Sasanian attacks. Perhaps more important for the Romans was the defection to them of Hatra and the incorporation of its fortress in the Roman frontier defense system (A. Maricq, “Les dernières années de Hatra,” Syria 34, 1957, pp. 228ff.; H. J. W. Drijvers, “Hatra, Palmyra und Edessa,” in Temporini and Haase, eds., op. cit., II/8, pp. 799ff. esp. p. 825). The people of Hatra knew that their relative autonomy in the later Parthian period had been made possible by the weakness of the Arsacid central government and was now in peril from the declared political designs of the Sasanians. The foreign policy of Iran’s new rulers was set on westward expansion and perhaps also intended to distract from the coercion within the country, whereas the Parthian and likewise the Roman policy in recent years had been to leave things as they were. Certainly Hatra’s concerns would have to be subordinated to the Sasanian objective, and probably its special political or economic interests would be disregarded altogether (literature in Maricq, op. cit.; Wiesehöfer, art. cit.). Disorder in the Roman empire after the murder of Alexander Severus in 235 evidently encouraged Ardašīr to launch new attacks on Rome’s eastern frontier: The most important were a raid on Dura in April 239 (Supplementum Epigraphicum Graecum [ = SEG], VII, 743 b), a thrust into Upper Mesopotamia about 237-238 when Carrhae and Nisibis were captured (Syncellus I, 681 [Dindorf]; Zonaris 12.18) and an expedition against Hatra. It appears that Hatra resisted a very long siege and did not fall until sometime between April and September 240 (Mosig-Walburg, Boreas 3, 1980, pp. 117ff. Cf. also Chaumont, “A propos de la chute de Hatra et du couronnement de Shapur Ier,” Acta Antiqua Scient. Acad. Hungarica 27, 1979 , pp. 207ff.). The city appears to have been chosen as a base for operations against the Roman Mesopotamia (Dio Cassius 80.3.2). The capture of Hatra was presumably the cause of the Persian war of Gordianus III (cf. Historia Augusta, Gordianus 23.5 with the date given in the Cologne Mānī Codex [ = CMC], 18, 2-5. Important maps (BV 11 and BV 12 of the Tübinger Atlas des Vorderen Orient, by E. Kettenhofen). Because of the difficult state of the sources, Ardašīr’s last years and the date of his death are subjects of scholarly controversies. His son Šāpūr was probably crowned as co-monarch on 12 April 240 (A. Henrichs and L. Koenen, “Der Kölner Mani-Kodex;” Zeitschrift für Papyrologie und Epigraphik 5, 1970, p. 129; 19, 1975, p. 21 (CMC 18, 5-8). Probably assignable to this time is the rock relief in northwestern Iran at Pīr Čāvūš near Salmās, which appears to be a representation of the co-monarchy (see below). The question whether Šāpūr was designated (and crowned) as sole monarch during Ardašīr’s lifetime depends on the interpretation of a particular coin type (Mosig-Walburg, in Boreas 3, 1980, pp. 117ff.). It can now be accepted, on the evidence of the Cologne Mānī Codex (164, 1ff.) that Ardašīr lived until the early part, perhaps February, of the year 242 (Henrichs-Koenen, Zeitschrift für Papyrologie und Epigraphik 48, 1982, pp. 4ff., 44). Administration. The Sasanian empire in Ardašīr’s reign resembled the later Parthian state in many ways, though differences were already apparent. In the ŠKZ inscription (Middle Persian, line 28), Ardašīr’s name as the Great King is mentioned together with the names of four “kings” who governed the provinces of Aprēnak, Marv, Kermān, and Sagestān with some measure of semi-independence from the central authority. There were also “kingdoms” (Makurān, Tūrestān, Kūšānšahr) whose rulers had had to accept vassal status (Lukonin, op. cit., chap. 2 and in Camb. Hist. Iran III/2, 1983, pp. 681ff.; M. L. Chaumont, in Acta Iranica 4, 1975, pp. 89ff.). Next came provinces comparable with the Achaemenid satrapies. In addition to royal lands, there were large areas under the administration of local chiefs and noble families, and thus not immediately subject to royal control. Taxes could of course only be obtained from these areas through indirect channels (F. Altheim and R. Stiehl, Ein asiatischer Staat, Wiesbaden, 1954, pp. 3ff.). Even at this early time, Sasanian policies had to be shaped with due regard to the relationships between the monarch, the royal family, and the landowning magnates (including members of the old Parthian aristocracy). Although a process of centralization was set on foot, and the number of local kings was greatly reduced, during Ardašīr’s reign, his empire was still run on much the same lines as the later Parthian empire (see Lukonin, in Camb. Hist. Iran III/2, 1983, pp. 681ff.). The order of precedence of the dignitaries and offices at Ardašīr’s court is given in the ŠKZ inscription (Middle Persian, lines 28ff.) as follows. First are four kings holding governorships with right of succession inheritable by the youngest son, namely Sadāraf (Satārōp ?) king of Aprēnak (Nīšāpūr); Ardašīr king of Marv; Ardašīr king of Kermān; Ardašīr king of the Sacae (of Sagestān). Next are three queens, namely Dēnak grandmother of Ardašīr; Rōdak mother of Ardašīr; Dēnak wife of Ardašīr. Then come Ardašīr the bidaxš (viceroy); Pāpak the hazāruft (prime minister? or guard commander ?); and five members of the great noble families, namely Dēhēn of the family of Warāz, Sāsān of the family of Sūrēn, Sāsān the lord of Andīgān, and Pērōz and Gōk of the family of Kārin, together with Apursām (Abarsām) “Ardašīr-Farr” whose function is not clear, but was perhaps that of the chief counselor to the monarch. After these come fifteen more named dignitaries including the spāhbed (head of the army) and the dibīruft (head of the chancery) (Lukonin, ibid., pp. 681ff.). Other officials which already existed in this early stage were: the aywēnbed (master of ceremonies), the framādār with his secretaries, and the religious functionaries hērbads, mōbads and mōgs (Lukonin, ibid., pp. 73f.; Christensen, Iran Sass. pp. 97ff.; Ph. Gignoux, “Die religiöse Administration in sasanidischer Zeit: Ein Überblick,” in H. Koch and D. N. MacKenzie, eds., Kunst, Kultur und Geschichte der Achamenidenzeit und ihr Fortleben, Berlin, 1983, pp. 254ff.; cf. also Boyce, The Letter of Tansar, pp. 1ff. ). Higher offices of wuzurg framādār, mōbadān mōbad and hērbadān hērbad were not Ardašīr’s foundations (against Christensen, ibid., pp. 118ff., see Gignoux, op. cit., pp. 255ff.; cf. Boyce, Zoroastrians, London, 2nd ed., 1984, p. 122). Urban foundations. Iranian monarchs could only establish, reestablish, or rename cities and towns on sites lying within the royal lands (dastkart). Ṭabarī (I, p. 820) credits Ardašīr with the following urban foundations: (1) Ardašīr-Ḵorra( = Gūr, Fīrūzābād); (2) Rām-Ardašīr; (3) Rēv-Ardašīr ( = Rīšahr); (4) Hormozd-Ardašīr ( = Sūq al-Ahwāz) in Ḵūzestān; (5) Vēh-Ardašīr opposite Ctesiphon; (6) Astarābād-Ardašīr ( = Karḵ-e Meyšān) in Lower Mesopotamia; (7) Psʾ (and variants) Ardašīr on the Arab side of the Persian Gulf; (8) Nūḏ-Ardašīr near Mosul. Further foundations are mentioned by Ḥamza (pp. 46f.), Dīnavarī (p. 47), and other authors. The materials are discussed in D. Metzler, Ziele and Formen königlicher Innenpolitik im vorislamischen Iran, Munster, 1977, pp. 184ff., but the dating back to Ardašīr I’s reign must be considered dubious. Several more towns are known with names compounded with Ardašīr, but some were definitely founded by Šāpūr I and named in honor of his father, while some may have been founded by, or named after, other bearers of the name Ardašīr (Nöldeke, Geschichte der Perser, p. 20 n. 4). Each of these towns was made the center of a rural district under a šahrab (ŠKZ, p. 34 of the Middle Persian text); and the tax revenues from the town and district went straight to the monarch (Lukonin, in Camb. Hist. Iran III/2, pp. 723ff.). It was for this reason that increase of number of royal urban foundations and attached districts was a goal of Sasanian internal and fiscal policy from Ardašīr I onward. Even so, the dichotomy between lands under direct royal control and lands in the possession of the nobility and only indirectly subject to the central government continued to be a basic feature of the agrarian economy until the tax reforms of Kavāḏ I and Ḵosrow I Anōšīravān (for possible models of this reform mentioned by Ṭabarī, I, p. 897, see N. V. Pigulevskaya, “K voprosu o podatnoĭ reforme Khosrova Anushirvana,” VDI, 1937, pp. 143ff. accepted and supported by Altheim and Stiehl, op. cit., pp. 129ff.; cf. also Lukonin, op. cit., pp. 745f.; N. Garsoïan, in Camb. Hist. Iran III/2, 1983, pp. 587f.). Coinage. As a broad generalization, it may be said that the coins minted for Ardašīr I are of three distinct types (R. Göbl, Sasanidische Numismatik, Braunschweig, 1968; idem, in Comb. Hist. Iran III/2, 1983, pp. 322ff.; V. G. Lukonin, in Acta Iranica 8, 1968, pp. 106ff.; Mosig-Walburg, Die frühen sasanidischen Könige als Vertreter und Forderer der zarathustrischen Religion, Frankfurt, 1982, pp. 25ff.). Type I shows Ardašīr in full face or profile on the obverse, and his father Pāpak facing to the left in Parthian style on the reverse. The legends are ʾrthštrMLKʾ “Ardašīr the king” and bgy pʾpky MLKʾ “the Lord, Pāpak the king.” Type II, the commonest, shows Ardašīr facing to the right and variously capped or crowned on the obverse, and a fire altar on the reverse. The legends read: mzdysn bgyʾrthštrMLKʾnMLKʾʾyrʾnMNW čtry MNyzdʾn “the Mazda-worshiping Lord, Ardašīr, king of kings of Iran, whose origin is from the gods.” They show the Zoroastrian beliefs of Ardašīr. Type III shows Ardašīr and Šāpūr facing each other on the obverse, and again a fire altar on the reverse. The legends on this third type are šhpwhry MLKʾ ʾryʾn MNW čtry MN yzdʾn “Sapur, king of Iran, who is descended from the gods,” and NWRʾ ZY ʾrthštr “the fire of Ardašīr.” The emblem on the reverse of Type II, showing a fire altar of a design found in Persis, and the legend NWRʾ ZY ʾrthštr (fire of Ardašīr) refer to the royal fire which was kindled at the start of each king’s reign (A. Christensen, RAA 10, 1936, p. 127). As regards the fire altar, the part supported by a pillar has been seen as resembling the throne platform of the Achaemenids (I. Pfeiler, “Der Thron der Achaimeniden als Herrschaftssymbol auf sasanidischen Münzen,” Schweizer Münzblätter 23, 1973, pp. 107ff.; cf. J. Duchesne-Guillemin, in La Persia nel Medioevo, Rome, 1971, p. 377). The ribbons may perhaps be interpreted as ends of an unfastened and outspread diadem, the traditional Iranian symbol of sovereignty. Thus the reverse of these coins reflects Ardašīr’s concern to present himself not only as the rightful successor to the Achaemenids, but also as a pious Zoroastrian. In the matter of headdresses and crowns, Ardašīr at first adhered to Parthian conventions and took over a type of crown dating from Mithridates II (Göbl, Sasanidische Numismatik, Type II). In later years, however, his principal crown was of a type (Göbl’s Type III) which permitted arranging part of the hair into a globe over the cranium and a shock projecting from the nape of the neck; the headpiece (often with cheek-guards) and the globe are covered with thin silk gauze from which ribbons dangle to the rear. Also found are variants in which Ardašīr wears a crenellated crown or a tall, round cap with an eagle held in place by a tape. While Göbl thinks that all these types symbolize Ohrmazd’s or Anāhīd’s investiture of Ardašīr with the kingship (“Investitur im sasanidischen Iran und ihre numismatische Bezeugung,” WZKM 56, 1960, pp. 36ff.), Mosig-Walburg maintains (op. cit., p. 31) that only the first of these designs denotes a special relationship of Ardašīr to Ohrmazd and that the second is a “victory crown” (otherwise Lukonin, Iran v III veke, Moscow, 1979, p. 117). The coin-type III, which shows Ardašīr with his son Šāpūr, can be associated with the introduction of Šāpūr as the successor (Chaumont, “Corégence et avènement de Shāpuhr Ier,” in Ph. Gignoux and A. Tafazzoli, eds., Mémorial J. de Menasce, Louvain, 1974, p. 135). In the matter of coin denominations and weights, the Sasanians at first strictly followed the existing traditions, though Ardašīr introduced a new half-drachma. Moreover some gold pieces minted for him have been found. Apparently only three mints were at work in his reign, the former mints in semi-autonomous parts of the empire having been closed down (Göbl, Sasanidische Numismatik, pp. 25ff. and in Camb. Hist. Iran III/1, pp. 328ff). Religious policy. In Ardašīr’s reign, Zoroastrianism was already the religion which the Sasanian king supported and personally professed. It has been suggested that under Ardašīr, the supporters of ātaš-kadags “fire temples” were favored but those honoring temples with cult statues (uzdēs-kadag) were persecuted (Boyce, The Letter of Tansar, p. 47, and “Iconoclasm among Zoroastrians,” in J. Neusner, ed., Christianity, Judaism and other Greco-Roman Cults. Studies for M. Smith at Sixty IV, Leiden, 1975, pp. 93ff.), but this view is strongly disputed (G. Gnoli, Zoroaster’s Time and Homeland, Naples, 1980, pp. 221ff.). Although no member of the priesthood figures in the list of the dignitaries at his court, it seems likely that the first steps to organize a Zoroastrian state church were taken in his reign and that traditions from Achaemenid, Hellenistic, and Parthian times were applied and developed in this connection. On his coins and in his inscription at Naqš-e Rostam (ANRm-a), Ardašīr describes himself as “Mazda-worshiping” and “descended from the gods.” His religious belief is also proclaimed pictorially through the fire-temple emblem on the reverse of his coins. (Christensen, Iran Sass., pp. 116ff., 141ff.). The investiture reliefs depicting Ardašīr’s divine appointment at Fīrūzābād, Naqš-e Raǰab, and Naqš-e Rostam give further evidence of the first Sasanian monarch’s close attachment to Ohrmazd. In Middle Persian lore, the incidence of Ohrmazd’s choice on Ardašīr is concretized in the mental image of the Xwarrah, “(God-given) fortune,” which may be compared with the Greek Tyche and the Roman Fortuna (cf. A. Sh. Shahbazi, “Farnah Symbolised,” AMI 13, 1980, pp. 119ff.; Calmeyer, in Jahrbuch des Deutschen Archäologischen Instituts 94, 1979, pp. 347ff.). Ardašīr, having been invested with the Xwarrah, is the rightful ruler; and investiture with the Xwarrah is always prerequisite for legitimate rulership. Ardašīr is also credited with the erection and endowment of fire-temples and with a helpful interest in Zoroastrian literature (Ṭabarī, I, p. 817; Dēnkard, p. 412.11-17). A special fire-temple, the “fire of Ardašīr,” which he founded at the start of his reign, is named in the inscription of Šāpūr at Bīšāpūr. Masʿūdī (Morūǰ II p. 162) gives a traditional version of Ardašīr’s words concerning the church-state relationship: “Know that the religion and the monarchy are two brothers neither of which can exist without the other. The religion sustains the monarchy, and the monarchy protects the religion. That which lacks sustenance and support must perish, and that which has no protector will pass away” (see Mosig-Walburg, loc. cit.). Ardašīr’s policy toward other religions made his reign, on the whole, a hard time for the non-Zoroastrian communities. The Jews and others had enjoyed considerably mote tolerance and autonomy under the Parthians. Ardašīr, and later also Šāpūr in the early years of his reign, sought to incorporate and control the Jewish population more effectively and to deprive them of their communal jurisdiction in religious and legal matters (which were hardly separable). The underlying motive was probably to propagate Zoroastrianism and enlarge the Zoroastrian community by procuring conversion of non-Zoroastrians. The Syriac-speaking Christian communities enjoyed more tolerant or at any rate milder treatment, and their numbers grew substantially up to the middle of the 3rd century. Mani did not publicly come forth until after Ardašīr’s death, perhaps in the correct expectation that Šāpūr would be more receptive than his father (see J. Neusner, in Camb. Hist. Iran III/2, 1983, pp. 909ff.; J. P. Asmussen, ibid., pp. 924ff.; Chaumont, RHR 165, 1964, pp. 165ff.; Henrichs-Koenen, op. cit., pp. 1ff., esp. p. 5). Royal ideology and propaganda. Ardašīr’s efforts to present himself as a god-related and devout Mazda-worshiper, and as the possessor of the divinely given Xwarrah, his claim to legitimacy as a worthy scion of the Iranian (mythical) kings, his successful propaganda against the rightfulness of the Parthians and their proper place in the sequence of Iranian history, prove the importance of the Achaemenid legacy to the minds of the early Sasanians though they presumably did not know much about actual Achaemenid conditions and figures. This interest was enhanced by the location of the temple of Anāhīd at Eṣṭaḵr, the choice of major Achaemenid sites such as Naqš-e Rostam for the carving of reliefs and inscriptions and the erection of fire-temples, the inclusion of members of the Achaemenid dynasty in the legendary Sasanian genealogies (conserved in the Arabo-Persian literature, the mentions of Ardašīr’s ambition to “avenge his ancestors” in the Arabo-Persian literature and of his claims to former Achaemenid territories in the histories of Herodian and Dio Cassius. The question whether such plans and claims were really formulated by Ardašīr as literary sources claim (on the Testament (ʿahd) of Ardašīr see M. Grignaschi, JA 254, 1966, pp. 1ff.) or ascribed to him, as the empire’s founder, in later times can not be answered with certainty for lack of evidence though the latter seems more probable. The same applies to the endeavor of the Sasanians to remove the Parthian link from the chain of Achaemenid-Sasanian legend and to depict the Parthian kings as alien “chiefs of tribes” in a time of Iranian weakness (Gnoli, Zoroaster’s Time and Homeland, pp. 166ff.; M. Grignaschi, in La Persia nel Medioevo, pp. 143ff.; A. Sh. Shahbazi, BSOAS 40, 1977, pp. 25ff.). To all appearances, Ardašīr actually owed a great deal to the Parthian legacy (Yarshater, op. cit.). On surer ground, scholars are now examining Achaemenid relics in Sasanian administration, art, religion, coinage (resumed minting of gold), and epigraphic texts and formulas. Bibliography : Given in the text. Originally Published: December 15, 1986 Last Updated: August 11, 2011 This article is available in print. Vol. II, Fasc. 4, pp. 371-376
- freely available Molecules 2013, 18(3), 2754-2762; doi:10.3390/molecules18032754 Published: 1 March 2013 Abstract: Fraxinellone, a well-known and significant naturally occurring compound isolated from Meliaceae and Rutaceae spp. has been widely used as a drug for the treatment of tumors. On the other hand, fraxinellone exhibited a variety of insecticidal activities including feeding-deterrent activity, inhibition of growth, and larvicidal activity. The present study focused on the antifeedant and larvicidal activities of fraxinellone against the larvae of Lepidoptera, including Mythimna separata, Agrotis ypsilon, Plutella xylostella, and one kind of sanitary pest, Culux pipiens pallens. Meanwhile, the ovicidal activities and the effects of fraxinellone on the larval development of M. separata were also observed. The LC50 values of fraxinellone against 3rd instar larvae of M. separata, 2nd instar larvae of P. xylostella and 4th instar larvae of C. pipiens pallens were 15.95/6.43/3.60 × 10−2 mg mL−1, and its AFC50 values against 5th instar larvae of M. separata, 2nd instar larvae of P. xylostella and 2nd instar larvae of A. ypsilon were 10.73/7.93/12.58 mg mL−1, respectively. Compared with the control group, fraxinellone obviously inhibited the pupation rate and the growth of M. separata. Once M. separata was treated with fraxinellone at concentrations of 5.0, 10.0, and 20.0 mg mL−1, respectively, the stages from the larvae to adulthood and the egg hatching duration were prolonged to 1/2/3, and 4/3/4 days, respectively. Additionally, fraxinellone strongly inhibited the development rate and the egg hatch proportion of M. separata. Plant secondary metabolites result from the interaction between plants and environment (living and non-living) during the long period of evolution in plants and play an important role in protecting plants from herbivores. Higher plants contribute significantly to this success as sources for highly active agents, e.g., pyrethroids, nicotine, avermectins and rotenone, etc., widely used in pest management. More than 2,400 plant species have been found to control crop pests. Currently, the discovery of new insecticidal compounds from plant secondary metabolites and subsequently using them as the lead-compounds for further modification has been one of the important approaches for the research and development of new pesticides [1,2]. Fraxinellone (Figure 1), a well-known and significant naturally occurring degraded limonoid, has been successfully isolated and identified from many species of plants in the Meliaceae and Rutaceae families, including Dictamnus angustifolius [3,4], Fagaropsis glabra , Melia azadarach [6,7], Raulinoa echinata [8,9], and D. dasycarpus [10,11]. For example, the extracts of Azadirachta indica (neem), A. excelsa (sentang), Melia volkensii, M. azedarach (Chinaberry) and Trichilia americana, (all belonging to the family Meliaceae) proved to be strong growth inhibitors, contact toxins and significant feeding deterrents towards two noctuid caterpillars, Trichoplusia ni and Pseudaletia unipuncta . In China, the dried root bark of D. dasycarpus Turcz., family Rutaceae, exhibited antifertility, antiplatelet aggregation and vascular relaxing activities [13,14], and has been widely used for the treatment of cough, rheumatism, skin diseases, and so on . Furthermore, fraxinellone, besides its use for the preparation of potent anticancer drugs, has also received much research attention for its interesting insecticidal and fungicidal activities . In 1997, Okamura et al., reported the total synthesis of fraxinellone . More recently, Xu and co-workers have synthesized fraxinellone-based ester/hydrazone derivatives, and found some compounds exhibited more pronounced insecticidal activity as compared with toosendanin [18,19]. Lepidoptera are the most diverse pest insect order. There is hardly a cultivated plant that is not attacked by at least one lepidopteran pest. Insect antifeedant activities of fraxinellone have been exploited against Spodoptera littoralis , S. exigua and armyworm Mythimna separata (all belonging to Lepidoptera: Noctuidae) [20,21]. Liu et al. found that it displayed significant feeding deterrence activity against two stored-product insects such as Tribolium castaneum Herbst (Coleoptera: Tenebrionidae) and Sitophilus zeamais Motsch (Coleoptera: Curculionidae). Against adults and larvae of T. castaneum and adults of S. zeamais, the EC50 values of fraxinellone were 36.4, 29.1, and 71.2 ppm, respectively. Similarly, the growth rates and food consumption of adults and larvae of T. castaneum, Asian corn borer, Ostrinia furnacalis (Lepidoptera: Crambidae) and tobacco budworm, Heliothis virescens (Lepidoptera: Noctuidae) were also obviously inhibited by fraxinellone. After treatment with fraxinellone, the poisoned insects exhibited typical stomach poisoned symptoms (e.g., vomiting and diarrhea), and fraxinellone showed delayed insecticidal activity against M. separata. Histopathology research demonstrated that the organelles of M. separata midgut were obviously changed after fraxinellone treatment . Encouraged by the above-mentioned interesting results, herein we wanted to further study the antifeedant activities and toxicity of fraxinellone against the larvae of lepidoptera, such as M. separata, Agrotis ypsilon (Lepidoptera: Noctuidae), and Plutella xylostella (Lepidoptera: Plutellidae) and one kind of sanitary pest Culuxpipiens pallens (Diptera: Culicidae). Meanwhile, the ovicidal activities and the influence of fraxinellone on the larval development of M. separata were also investigated. 2. Results and Discussion 2.1. Antifeeding and Insecticidal Activities Antifeedants are described as substances that reduce feeding by an insect and are found among all of the major classes of secondary metabolites: alkaloids, phenolics and terpenoids, with the latter comprising the most potent and diverse forms of antifeedants. In this research, fraxinellone exhibited obvious feeding deterrent activity against most kinds of Lepidopteran larvae (Table 1), such as M. separata, A. ypsilon, and P. xylostella,. Besides that, fraxinellone also possessed toxicity against the larvae of P. xylostella, M. separata and C. pipiens pallens. |Table 1. Feeding deterrent and toxic effects of fraxinellone against different pests.| |Larvae||AFC50 a (mg mL−1) (95% confidence interval values)||Toxicity curve||Correlation efficient (r)||LC50 b (mg mL−1) (95% confidence interval values)||Toxicity curve||Correlation efficient (r)| |M. separata||5th-instar||10.73 (8.7571–13.1406)||y = 2.5268 + 2.4000x||0.9756||/||/||/| |3rd-instar||/||/||/||15.95 (13.459–17.492)||y = 4.4509 + 3.2375x||0.9878| |P. xylostella (2nd-instar)||7.93 (5.9175–10.6201)||y = 3.1543 + 2.0528x||0.9817||6.43 (4.7050–8.7876)||y = 3.6399 + 1.6829x||0.9901| |A. ypsilon (2nd-instar)||12.58 (7.6630–20.6561)||y = 3.3786 + 1.4743x||0.9816||/||/||/| |C. pipiens pallens (4th-instar)||/||/||/||3.60 × 10−2 (3.0–4.3) × 10−2||y = −1.4386 + 4.1389x||0.9347| a After treatment for 24 h. b After treatment for 48 h, whereas to C. pipiens pallens for 24 h. “/” means not tested. 2.2. Egg Hatching Inhibition of M. separata Fraxinellone exhibited strong egg hatching inhibition ability. For example, after treatment with fraxinellone (Table 2 and Figure 2), the hatching durations of M. separata were all delayed to 3–4 days, and a few hatched eggs grew up to become 2nd instar larvae. The effects of different concentrations of fraxinellone solutions on egg hatching inhibition were inconspicuous. For example, after treatment for 8 days (Figure 2), the hatching rate of the control group was 95.65%, whereas the hatching rates of the treated groups were only 26.79%, 38.20% and 30.82% at the concentrations of 5.0, 10.0 and 20.0 mg mL−1, respectively. Otherwise, the final hatching ratio were nearly the half of the original quantities of egg, and the egg hatching rates of the treated groups were all decreased by more than 50% when compared with that of the control group. Meanwhile, part of the hatched larvae in the treated groups could not move away from the eggshells, and they ultimately died. Some eggs exhibited embryonic developmental evidence, but they could not hatch before death. |Table 2. Effect of fraxinellone on egg hatching rates and hatched-larvae development of M. separate.| |Treatment Concentration (mg mL−1)||The number of egg||The number of 2nd instar larva||Hatch duration (day) a||Egg hatching rate (%)||Hatch inhibition rate (%)||Development rate (%) b| a There were no hatched larvae appeared after the date. b All the hatched larvae grew up to 2nd instar. As we all know, the eggshell is the first barrier which protects the embryo from xenobiotics. During the egg hatching, yolk protein acts as a nutritional reserve of amino acids, lipids, hydrocarbons, and vitamins, etc. for the embryo, and the synthesis of yolk proteins is regulated by endogenic hormones . Therefore, we deduced that the mechanism of egg hatching inhibition may be the result of destroyed eggshells, changed yolk protein content or reduced ratios of endogenic hormones. At present, related research is being carried out in our group to confirm the above-mentioned hypotheses. 2.3. Effect on Larval Development of M. separata As depicted in Table 3, after treatment with fraxinellone for 2 h, the 5th instar larvae of M. separata only fed on a few of the treated wheat leaves, and the antifeeding rates were all larger than 60%. The development durations from 5th to 6th instar of M. separata were prolonged 1, 2 and 3 days at the concentrations of 5.0, 10.0 and 20.0 mg mL−1, respectively. Meanwhile, fraxinellone inhibited the growth of the larvae, e.g., the development inhibition ratios at 10.0 and 20.0 mg mL−1 were more than 30%. The pupation ratio and eclosion ratio all declined with increased concentrations of fraxinellone. Additionally, fraxinellone produced the emergence of abnormal pupae, i.e., at 10.0 and 20.0 mg mL−1, the percentages of abnormal pupae were 12.5 and 30.0%, respectively (Figure 3). |Table 3. Effect of fraxinellone on M. separata feeding and larval development.| |Treated Concentration (mg mL−1)||Mean larval weight (mg)||Antifeeding rate (%)||Mean pupal weight (mg)||Development duration a (days)||72 h mortality (%)||Corrected abnormal mortality (%)||Development inhibition rate (%)| |Control||35.4||/||186.4||7.50 ± 0.24||0||/||/| |5.0||36.1||66.6||186.1||8.85 ± 0.48||0||50.00||12.19| |10.0||34.6||61.3||211.2||9.75 ± 0.78||16.7||66.63||36.59| |20.0||36.4||80.6||195.5||10.15 ± 0.63||23.3||70.88||30.07| a The larvae of control group grew up to the 6th instar. Isolated from the Meliaceae and Rutaceae families, most limonoids, e.g., azadirachtin and toosendanin, possess antifeedant, toxic or growth control properties against different species of insects. For example, the leaf extracts of Argentine Melia azedarch L. and meliternatin, isolated from Melicope subunifoliolata (Rutaceae) , showed larvicidal and feeding deterrent activity against Aedes aegypti. As a degraded limonoid isolated from D. dasycarpus, the poisoned larvae of lepidoptera showed typical stomach-poisoned symptoms , and fraxinellone reduced the growth rates and food consumption of T. castaneum, Ostrinia furnacalis , tobacco budworm, Heliothis virescens and M. separata . It is well-known that digestive enzymes and detoxification enzymes of midgut are involved in the detoxifation or metabolism of xenobiotics . In our previous paper, we reported that celangulin V (CA-V) had higher induction against two components of cytochrome P450, and inhibited GST activity in treated larvae of M. separata . Similarly, Mukanganyama et al. found that 2,4-dihydroxy-7-methoxy-1,4-benzoxazin-3-one (DIMBOA) decreased GST activity in vitro and in vivo by 33% and 30%, respectively. Liu et al. found the larval midguts of H. virescens significantly possessed lower α-amylase and non-specific protease activities and higher cytochromes P450 activities after treatment with fraxinellone for 24 h . Based upon the above interesting results, it is suggested that the strong feeding deterrent activity and development inhibiting action of fraxinellone against M. separata larvae may be due to its inhibition of digestive and detoxification enzymes. The follow-up research is now being carried out in our lab. 3.1. Insects and Chemicals The larvae of Eastern armyworm, M. separata, diamond back moth, P. xylostella, black cutworm, A. ypsilon and Culux pipiens pallens were obtained from the Institute of Pesticide Science, Northwest A&F University (NWAFU). The lepidoptera larvae were reared on wheat leaves or turnip seedlings under the laboratory conditions (T = 22 °C, R.H. = 60–80%), and never contacted with insecticides. Fraxinellone (>98%) was provided by the Pharmaceutical Design & Synthesis Lab (College of Science, NWAFU) . 3.2. Larvicidal and Antifeeding Test The bioassays of fraxinellone against the lepidoptera larvae were carried out by the traditional stomach poison method . Newly molted larvae of M. separata (3rd and 5th instar), A. ypsilon (2nd instar), and P. xylostella (2nd instar) were selected. The larvae were firstly starved for 24 h. Fresh wheat leaf disks (0.5 × 0.5 cm) were treated with 1 μL diluted samples in acetone, and the larvae fed with them individually. Meanwhile, the control groups were fed with leaf disks treated with acetone alone. After treatment for 24 h, the residual areas of leaves were measured on plotting paper, and the AFC50 values were calculated from the antifeeding ratios and the corresponding concentrations . The mortalities of Lepidopteran larvae were recorded until 48 h after treatment. The concentrations of fraxinellone tested against 3rd and 5th instar larvae of M. separata were 5.0, 7.5, 10.0, 15.0, and 20.0 mg mL−1, respectively. Against the 2nd instar larvae of P. xylostella and A. ypsilon, the concentrations were 0.625, 1.25, 2.5, 5.0, 10.0, and 20.0 mg mL−1, respectively. The insecticidal activity of fraxinellone against mosquito larvae was tested according the method of Cheng et al. , and the final concentrations were 20.0, 40.0, 60.0, 80.0, and 200.0 μg·mL−1, respectively. After treatment for 24 h, once the mosquito larvae could not swim on the surface of liquid when a stimulus was given, they were deemed dead. 3.3. Ovicidal Test Newly laid plump egg masses of M. separata were collected. The egg quantities in every egg mass were recorded, and then they were dipped into acetone solutions of fraxinellone for 3 s at concentrations of 5.0, 10.0, and 20.0 mg mL−1, respectively. Filter papers were used to absorb the excess liquid immediately. Then, the treated egg masses were transferred into Petri dishes (60 mm) with absorbent papers on the bottom. Fresh wheat leaves were used to keep the humidity. Every group of tests was repeated three times and the control one was only treated with acetone. Finally, all of them were moved to a rearing-room and observed every day up to about 10 days until all the eggs hatched and 2nd instar larvae emerged. The eggs were maintained in Petri dishes at 22 °C, R.H. = 60–80%. The hatch proportion of eggs (HP), the inhibition rate of egg hatching (HIR) and the development rate (DR) were calculated by the formulae: HP (%) = the number of 1st instar larvae × 100/the number of total egg HIR (%) = (A−B)/A DR (%) = the number of 2nd instar larvae × 100/the number of 1st instar larvae Where A is the HP of control, B is the HP of the treated larvae. 3.4. Development Tests Newly molted 5th instar larvae of M. separata were starved for 24 h. After measuring their initial weight, the larvae were individually put into Petri dishes, where fresh leaf disks (0.5 cm × 0.5 cm) were treated with different concentrations of fraxinellone solutions at 5.0, 10.0, and 20.0 mg mL−1, respectively, and the procedure fowwoed was the same as for the antifeeding activity assay. After treatment for 2 h, the residual areas of wheat leaves were measured by plotting paper, and the untreated fresh leaves were added to all dishes until all the alive insects pupated and eclosed (T = 22 °C). All the pests were then classified as follows: (1) zero grade, died within 72 h after treatment; (2) 1st grade, died in larval period after 72 h; (3) 2nd grade, died in prepupal period, or abnormal pupae appeared; (4) 3rd grade, adult emergence. Corrected abnormal mortality (%) = (abnormal mortality of treated group − abnormal mortality of control)/(1 − abnormal mortality of control) × 100 Index of developmeng (%) = ∑ (every number of grade × related number of pest)/(the highest grade number × total number of pest) × 100 Development inhibition rate (%) = (Index of control − Index of treatment)/Index of control × 100 3.5. Statistical Analysis The quantities of egg hatching and larvae growing were recorded day by day. The LC50 and AFC50 values against the four insects were calculated using EXCEL software or the DPS system. In conclusion, fraxinellone, a degraded limonoid isolated from D. dasycarpus, exhibited strong feeding-deterrent and toxic effects against Lepidopteran larvae, including M. separata, A. ypsilon and P. xylostella. It also possessed high toxicity against Culux pipiens pallens. Besides that, after treatment with fraxinellone, the egg hatching duration and developmental period of M. separata were clearly prolonged. This will lay the foundation for the development of fraxinellone as a botanical insecticidal agent in organic food production. This research was supported by the National Natural Science Foundation of China (No. 31000862) and the National 973 Project (No. 2010CB126105) from the Ministry of Science and Technology, China. - Dayan, F.E.; Cantrell, C.L.; Duke, S.O. Natural products in crop protection. Bioorg. Med. Chem. 2009, 17, 4022–4034, doi:10.1016/j.bmc.2009.01.046. - Xu, H.; Wang, J.J.; Sun, H.J.; Lv, M.; Tian, X.; Yao, X.J.; Zhang, X. Semisynthesis and quantitative structure-activity relationship (QSAR) study of novel aromatic esters of 4'-demethyl-4-deoxypodophyllotoxin as insecticidal agents. J. Agric. Food Chem. 2009, 57, 7919–7923, doi:10.1021/jf9020812. - Akhmedzhanova, V.I.; Bessonova, I.A.; Yunusov, S.Y. The roots of Dictamnus angustifolius. Chem. Nat. Compd. 1978, 14, 404–406, doi:10.1007/BF00565245. - Hu, C.Q.; Han, J.W.; Zhao, J.G.; Song, G.Q.; Li, Y.H. Limonoids from Dictamnus angustifolius. J. Integr. Plant Biol. 1989, 31, 453–458. - Boustie, J.; Moulis, C.; Gleye, J.; Fouraste, I.; Servin, P.; Bon, M. A degraded limonoid from Fagaropsis glabra. Phytochemistry 1990, 29, 1699–1701. - Nakatani, M.; Huang, R.C.; Okamura, H.; Iwagawa, T.; Tadera, K. Degraded limonoids from Melia azedarach. Phytochemistry 1998, 49, 1773–1776. - Fukuyama, Y.; Nakaoka, M.; Yamamoto, T.; Takahashi, H.; Minami, H. Degraded and oxotane-bearing limonoids from the roots of Melia azedarach. Chem. Pharm. Bull. 2006, 54, 1219–1222, doi:10.1248/cpb.54.1219. - Biavatti, M.W.; Vieira, P.C.; da Silva, M.F.G.F.; Fernandes, J.B.; Albuquerque, S. Limonoids from the endemic Brazilian species Raulinoa echinata. Z. Naturforsch. C. 2001, 56, 570–574. - Biavatti, M.W.; Westerlon, R.; Vieira, P.C.; da Silva, M.F.G.F.; Fernandes, J.B.; Penaflor, M.F.G.V.; Bueno, O.C.; Ellena, J. Leaf-cutting ants toxicity of limonexic acid and degraded limonoids from Raulinon echinata. X-ray structure of epoxyfraxinellone. J. Braz. Chem. Soc. 2005, 16, 1443–1447. - Liu, Z.L.; Xu, Y.J.; Wu, J.; Goh, S.H.; Ho, S.H. Feeding deterrents from Dictamnus dasycarpus Turcz against two stored-product insects. J. Agric. Food Chem. 2002, 50, 1447–1450. - Yoon, J.S.; Sung, S.H.; Kim, Y.C. Neuroprotective limonoids of root bark of Dictamnus dasycarpus. J. Nat. Prod. 2008, 71, 208–211, doi:10.1021/np070588o. - Akhtar, Y.; Yeoung, Y.R.; Isman, M.B. Comparative bioactivity of selected extracts from Meliaceae and some commercial botanical insecticides against two noctuid caterpillars, Trichoplusia ni and Pseudaletia unipuncta. Phytochem. Rev. 2008, 7, 77–88, doi:10.1007/s11101-006-9048-7. - Yu, S.M.; Ko, F.N.; Su, M.J.; Wu, T.S.; Wang, M.L.; Huang, T.F.; Teng, C.M. Vasorelaxing effect in rat thoracic aorta caused by fraxinellone and dictamine isolated from the Chinese herb Dictamnus dasycarpus Turcz: comparison with cromakalim and Ca2+ channel blockers. Naunyn Schmiedebergs Arch. Parmacol. 1992, 345, 349–355. - Wu, T.S.; Wang, M.L.; Shyru, H.J.; Chan, Y.Y.; Kuo, S.C.; Teng, C.M. Chemical constituents and bioactive principle from the root bark of Dictamnus dasycarpus. Chin. Pharm. J. 1994, 46, 447–455. - Jiangsu New Medical College. Encyclopedia of Chinese Medicinal Substances; Shanghai People’s Publisher: Shanghai, China, 1986; pp. 737–739. - Yang, R.Z.; Tang, C.S. Plants used for pest control in China: a literature review. Econ. Bot. 1988, 42, 376–406, doi:10.1007/BF02860162. - Okamura, H.; Yamauchi, K.; Miyawaki, K.; Iwagawa, T.; Nakatani, M. Synthesis and biological activities of degraded limonoids, (±)-fraxinellonone and its related compounds. Tetrahedron Lett. 1997, 38, 263–266, doi:10.1016/S0040-4039(96)02277-0. - Guo, Y.; Yan, Y.; Yu, X.; Wang, Y.; Xu, H. Synthesis and insecticidal activity of some novel fraxinellone-based esters. J. Agric. Food Chem. 2012, 60, 7016–7021. - Guo, Y.; Yan, Y.; Yang, C.; Yu, X.; Zhi, X.; Xu, H. Regioselective synthesis of fraxinellone-based hydrazone derivatives as insecticidal agents. Bioorg. Med. Chem. Lett. 2012, 22, 5384–5387. - Wei, F.Y.; Yuan, C.L. Isolation and identification of pesticidal activity components in Dictamnus dasycarpus Turcz. Acta Agric. Boreali Occidentalis Sinica. 2006, 15, 93–95. - Yuan, C.L.; Wang, X.L.; Yang, D.S. Antimicrobial and pesticidal activity of fraxinellone from Dictamnus dasycarpu. Chem. J. Internet. 2006, 8, 5. - Liu, Z.L.; Ho, S.H.; Goh, S.H. Effect of fraxinellone on growth and digestive physiology of Asian corn borer, Ostrinia furnacalis. Pestic. Biochem. Physiol. 2008, 91, 122–127, doi:10.1016/j.pestbp.2008.03.003. - Liu, Z.L.; Ho, S.H.; Goh, S.H. Modes of action of fraxinellone against the tobacco budworm, Heliothis virescens. Insect Sci. 2009, 16, 147–155, doi:10.1111/j.1744-7917.2009.00266.x. - Lü, M.; Wu, W.J.; Liu, H.X. Effects of fraxinellone on the midgut ultrastructural changes of Mythimna separata Walker. Pestic. Biochem. Physiol. 2010, 98, 263–268, doi:10.1016/j.pestbp.2010.06.017. - Parthasarathy, R.; Sun, Z.Y.; Bai, H.; Palli, S.R. Juvenile hormone regulation of vitellogenin synthesis in the red flour beetle, Tribolium castaneum. Insect Biochem. Mole. Boil. 2010, 40, 405–414, doi:10.1016/j.ibmb.2010.03.006. - Coria, C.; Almiron, W.; Valladares, G.; Carpinella, C.; Luduena, F.; Defago, M.; Palacios, S. Larvicide and oviposition deterrent effects of fruit and leaf extracts from Melia azedarch L. on Aedes aegypti (L.) (Diptera: Culicidae). Bioresour. Technol. 2008, 99, 3066–3070. - Hung, H.S.; Wang, J.; Sim, K.Y.; Ee, G.C.L.; Imiyabir, Z.; Yap, K.F.; Shaari, K.; Hock, G.S. Meliternatin: A feeding deterrent and larvicidal polyoxygenated flavones from Melicope subunifoliolata. Phytochemistry 2003, 62, 1121–1124. - Yuan, C.L.; Li, Z.X. The insecticidal activity of a new botanical insectide, fraxinellone. Plant Protect. 2005, 31, 86–87. - Ortego, F.; Lopez-Olguin, J.; Euiz, M.; Castanera, P. Effects of toxic and deterrent terpenoids on digestive protease and detoxication enzyme activities of Colorado potato beetle larvae. Pestic. Biochem. Physiol. 1999, 63, 76–84, doi:10.1006/pest.1998.2386. - Lü, M.; Wu, W.J.; Liu, H.X. Effect of celangulin V on detoxification enzymes in Mythimna separata and Agrotis ypsilon. Pestic. Biochem. Physiol. 2008, 90, 114–118, doi:10.1016/j.pestbp.2007.10.001. - Mukanganyama, S.; Figueroa, C.C.; Hasler, J.A.; Niemeyer, H.M. The effect of DIMBOA on detoxification enzymes of the aphid Rhopalosiphum padi (Homoptera: Aphididae). J. Insect Physiol. 2003, 49, 223–229, doi:10.1016/S0022-1910(02)00269-X. - Yu, X.Y.; Gao, C.F.; Zhang, X. Bioactivity of extracts from the fruit of Sabina vulgaris Ant. Acta Univ. Agric. Boreali Occidentalus 1999, 27, 96–100. - Cheng, S.S.; Chang, H.T.; Chang, S.T.; Tsai, K.H.; Chen, W.J. Bioactivity of selected plant essential oils against the yellow fever mosquito Aedes aegypti larvae. Bioresour. Technol. 2003, 89, 99–102, doi:10.1016/S0960-8524(03)00008-7. - Sample Availability: Sample of the compound fraxinellone is available from the authors. © 2013 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).
|Join Nairaland / Login / Trending / Recent / New| Stats: 1272898 members, 1746621 topics. Date: Sunday, 23 November 2014 at 04:37 AM |I Married My Girlfriend Because She Got Pregnant by donone(m): 2:41pm On Nov 09, 2005| I got married because my girlfriend got pregnant. What do you think? I sometimes ask myself, "did I get into this wedding for the right reasons?" But sometimes I feel it was a right decision to take especially because I was my wife's first sexual contact and we actually have some memorable times together. |Re: I Married My Girlfriend Because She Got Pregnant by vexxy(f): 3:01pm On Nov 09, 2005| I don't understand, donone. Do you believe in your marriage or not? Memorable times and being your wife's first are not valid reasons to get married. Impregnating her is also not a valid reason to get married. All of these factors can lead to the demise of the union. You may come to resent her at some point. It's important to discuss these feelings with her and/or with a marriage counselor before it gets to late. A doubting spouse can become both an unhappy and a cheating spouse. It's better to deal with these feelings now than later. I hope it works out no matter the course taken. |Re: I Married My Girlfriend Because She Got Pregnant by Seun(m): 3:08pm On Nov 09, 2005| I think it's good that your marriage has turned out ok despite the shaky start. 'Normal' courtship leading to marriage is over-rated, because no matter how long you date your partner will not show her true colors until you get married, anyway. (It has been reported that some groups of people who got their husbands/wives picked by their parents seem to have happier marriages than those who choose their partners through 'love' and long trial period ...) Now that you are married, I think the important thing is to make up your mind to make it work. That's all. Whether you are married by pregnancy or parents or love or God, the important thing is your will to make it an enjoyable ride for yourself and your wife. Lucky husband! If it was not working you wouldn't have posted the way you did! |Re: I Married My Girlfriend Because She Got Pregnant by vexxy(f): 3:35pm On Nov 09, 2005| Decide to make it work, good, Seun! Be sure to take the appropriate steps to ensure a happy healthy marriage. |Re: I Married My Girlfriend Because She Got Pregnant by EddyTells(m): 4:04pm On Nov 09, 2005| too late for questions, You got her pregnant, you stay with her. Period |Re: I Married My Girlfriend Because She Got Pregnant by vexxy(f): 4:50pm On Nov 09, 2005| The only problem with that line of thought is he could grow to resent her feeling forced to marry. You should marry because both parties are willing, not because of obligation. It's never to late to put your thoughts on the table and deal with them. |Re: I Married My Girlfriend Because She Got Pregnant by kikelomo(f): 5:41pm On Nov 09, 2005| Yeah, u don't sound pretty sure of yourself. well since u r already married, there is no need to cry over spilled milk, permit the use of my adage, just make the best of it. i'm sure u guys would grow to love each other that is if u don't already. Think positive! |Re: I Married My Girlfriend Because She Got Pregnant by Desola(f): 5:48pm On Nov 09, 2005| I agree with lady vexy on this one |Re: I Married My Girlfriend Because She Got Pregnant by donone(m): 6:11pm On Nov 09, 2005| thanks guys all of a sudden i cant wait to See my unborn kids running around me watching TV with my angel drinking milk shake and telling her how lucky i became to marry her i guess my feeling are probably cos i feel i got married a lil early for a guy. thanks anyway |Re: I Married My Girlfriend Because She Got Pregnant by vexxy(f): 6:41pm On Nov 09, 2005| Aww, I'm happy to hear that. Don't worry about the age factor. Many people get married young or old, it doesn't matter. What matters is how much you want to make it work and what you're willing to do to keep it afloat. Congratulations to you and your wife. I hope it all works out for the best. |Re: I Married My Girlfriend Because She Got Pregnant by salako: 8:17pm On Nov 09, 2005| I think guys should behave to women as they would like guys to behave to their mothers/sisters/daughters. I also think you married your wife because she said yes. She didn't have to marry you, so stop thinking about yourself and appreciate her decision. Or do you not respect her? |Re: I Married My Girlfriend Because She Got Pregnant by sexton(m): 9:43pm On Nov 09, 2005| Well Donone I don't know how old you are but I want to believe you just becoming a man(sometimes ages doesn't matter). I want you to get this two things about becoming a man 1. Becoming a man is hard 2. Becoming a man is easy it depends on how you see it. You made the decision already all you wanted is confirmation but the only one who can confirm it is God. So MAN I wish you all the best. |Re: I Married My Girlfriend Because She Got Pregnant by ocho(f): 11:49pm On Nov 09, 2005| @ donone .You didn't mention you were having marital problems so i'd guess things are going well and that's a good thing. you're just having doubts which is normal for any human who did what u did but if you truly love your wife(which you didn't say you didn't, so i'd take it you do) you would have still married her anyways, regardless of whether she got pregnant or not. So enjoy your marriage and look forward to raising the child with so much love! Best of luck! |Re: I Married My Girlfriend Because She Got Pregnant by Oracle(m): 3:25am On Nov 10, 2005| Well thatz um not too cool but i believe u love her dont u? she's ur girlfriend but men marriage is a lifetime commitment this is no longer a situation where u can just leave the girl u have to be there for her always so man u better make that marriage work out for u |Re: I Married My Girlfriend Because She Got Pregnant by amayna(f): 4:16am On Nov 10, 2005| I was just wondering.... Were you forced by her parents or anybody to marry her, i.e., was it a shotgun wedding? Also, Did u marry her because you felt guilty?...Maybe you felt that it was ur fault that u got pregnant, we all know you have half the blame, but did u feel that because you were her first u'd ruined her and that nobody would marry her after u were done with it?... Did u ever think about abortion? Did you ever think, in your WILDEST dreams, that MAYBE you would marry her, i.e. before at all you found out that she was pregnant? I just ask these questions because if you say yes to any of the above,excluding the last one, u hve SOME issues to resolve. You married her for the wrong reasons and it CAN work, its just that u have to TRY... One more thing, HOW OLD WERE YOU WHEN U GOT MARRIED?... |Re: I Married My Girlfriend Because She Got Pregnant by mckaycee(m): 11:19am On Nov 10, 2005| I am just happy that you didn't let your girl down when it mattered most. I think she loves you so much to agree to be your wife no matter the situation. Now Big Boy, make the best out of this marriage by being a good husband and daddy to-be. TO BE A MAN NO DEY EASY O! A big CONGRATS to you. |Re: I Married My Girlfriend Because She Got Pregnant by donone(m): 7:27pm On Nov 10, 2005| nop wasn't forced at all i felt why would i wanna abort my own child when am not in school and its not someoneelse that's pregnant for me i also felt i could support a family and took my decision that all but i love her a lot am a 22yrs old chartered account working in one of the biggest financial institutions in the country so i felt that was the best decision to take at that time i.e. to grow old together with my hubby. so i dint forget my love for her has geometrically increased in the last 2 days thank to you guys wish you guys all the best |Re: I Married My Girlfriend Because She Got Pregnant by pophoney(m): 10:49pm On Nov 10, 2005| I got married at age 22 also and it has been five years now. We were in love (and still in love). She got pregnant for me and I was happy that am going to be a father (millions cannot). the pregnancy made the wedding ceremony to be done at the time it was. But you see, even if she was not pregnant at the time she was, She will definately be the one I will marry. Am happy with her and bless with two lovely kids. I will forever be grateful to God for marrying at the time I did. Am happy to hear your love grows geometrically. |Re: I Married My Girlfriend Because She Got Pregnant by EddyTells(m): 1:31pm On Nov 11, 2005| good one man! |Re: I Married My Girlfriend Because She Got Pregnant by joshjosh(m): 2:09pm On Nov 11, 2005| marraige works and it is very good but you have to work at it very well. marraige is like a farm. you are likely to get out of it what you sowed into it. i wish you God's blessings dear brother but please help yourself and do the act of loving as you are supposed to do. not just as the society and people requires. you have a long way to live, support and enjoy yourselves if u can please read a lovely book " the joy of a commited relationship" by gary smalley i bet it will bless you greatly |Re: I Married My Girlfriend Because She Got Pregnant by fabian(f): 4:46pm On Nov 11, 2005| seun, what do you mean by, "no matter how long you date your partner will not show her true colors until you get married, anyway" Please explain biko! |Re: I Married My Girlfriend Because She Got Pregnant by Rhodalyn(f): 6:33pm On Nov 13, 2005| i think u're a man of principle n dats very nice cuz we don't always get what we want sometimes |Re: I Married My Girlfriend Because She Got Pregnant by fabian(f): 1:19pm On Nov 14, 2005| Seun I am waiting............. |Re: I Married My Girlfriend Because She Got Pregnant by alheri(f): 1:23pm On Nov 14, 2005| @fab. my sista, infact dont mind this our seun sometimes........................ @seun. we go impeach u oh! u better answer. |Re: I Married My Girlfriend Because She Got Pregnant by fabian(f): 1:41pm On Nov 14, 2005| True, maybe we should overthrow him! |Re: I Married My Girlfriend Because She Got Pregnant by Seun(m): 1:45pm On Nov 14, 2005| It is a well known fact that courting couples do not reveal their true characters to each other until the dotted line is signed, or the woman gets pregnant. When you are dating someone, the fear of rejection causes you to be on edge and project your best image lest he/she leaves you. Once you are married, you feel secure and you become your normal, more obnoxious self. I think that is why some people find it impossible to get attracted to their close friends of the opposite sex. Because they know the truth about the friend and this makes him/her unexciting. Meanwhile, the boy/girl you hardly know causes butterflies to fly in your stomach and you are ready to climb seven mountains for him/her. Talk about self-deception! |Re: I Married My Girlfriend Because She Got Pregnant by fabian(f): 1:53pm On Nov 14, 2005| But your truth holds true for both parties, male and female, yet you make it seem like women are the queens of deception and men are the saints Mind you not everyone pretends. nobody's perfect, but its not plausible for one to show only his/her good side through out the courtship. that seems lame to me. infact I would not go with a 'seemingly perfect' man! |Re: I Married My Girlfriend Because She Got Pregnant by ondogi: 2:17pm On Nov 16, 2005| Utter rubbish you just allowed yourself to be hoodwinked into slavery. so what if she was pregnant, na she go be the first? How can you marry at the age of 22, what were you thinking. It is highly unfortunate but you just lost your precious youth and freedom, now you are in serious boundage. Imagine you did not even enjoy your youth, have fun and be adventurous. At that tender young age, your life is already over. I know they (the congregation) will call me names but am the only one saying the truth. You made a very big mistake marrying that girl, believe me you will always regret it, no matter what anybody here say to console you. |Re: I Married My Girlfriend Because She Got Pregnant by Seun(m): 4:23pm On Nov 16, 2005| Ondogi: Of course, if he listens to people like you, he will always regret it. People who think that youth is all about jumping from one bosom to another instead of settling down. Either he stops associating with people like you, or he goes for a divorce with no assurance of finding one later on. I think the option of choosing friends wisely is more prudent. |Re: I Married My Girlfriend Because She Got Pregnant by ondogi: 12:25am On Nov 18, 2005| its people like you, he should beware of. people who will never say the truth, you push othr folks into trouble meanwhile you avoid it. tell me are you married, if not why? and if you are @ what age? let us hear what you got to say |Re: I Married My Girlfriend Because She Got Pregnant by ondogi: 9:29pm On Nov 21, 2005| I am still awaiting your reply to the questions i asked. Kindly reply as soon as possible. |Re: I Married My Girlfriend Because She Got Pregnant by snazzydawn(f): 10:38pm On Nov 21, 2005| @Donone,you are truly a noble man.You did the honourable thing though late,but well,you did it.I wish you happiness. |Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health | religion celebs tv-movies music-radio literature webmasters programming techmarket Nairaland - Copyright © 2005 - 2014 Oluwaseun Osewa. All rights reserved. See Nairalist and How To Advertise. 70
By Scott Fullwiler, Associate Professor of Economics at Wartburg College The old saying that bad press is better than no press is definitely true in this case. Without the advent of the blogosphere, our work would likely never even be noticed by the likes of Paul Krugman, so the fact that he’s writing about us (here and here) this weekend at least means we’re doing better than that, even if his assessment of us is far less than glowing. At the same time, and particularly given that Krugman is so widely read, it’s imperative to at the very least set the record straight on where MMT and Krugman differ. I should note before I start that others have done very good critiques already that overlap mine in several places (see here, here, here, and here). Krugman makes three incorrect assumptions about what MMT policy proposals actually are while also demonstrating a lack of understanding of our modern monetary system (as is generally verified by volumes of empirical research on the monetary system by both MMT’ers and non-MMTer’s). These are the following: Assumption A: The size of the monetary base directly (or indirectly, for that matter) affects inflation if we’re not in a “liquidity trap” Assumption B: MMT’s preferred fiscal policy approach or strategy—Abba Lerner’s functional finance—is Non-Ricardian Assumption C: Bond markets alone set interest rates on the national debt of a sovereign currency issuer operating under flexible exchange rates Assumptions A and C are central to the Neo-Liberal macroeconomic model. Assumption B is a common misconception about MMT and a common perception of Neo-Liberals about the nature and macroeconomic effects of fiscal policy (i.e., Neo-Liberals often believe that activist fiscal policy is Non-Ricardian). While MMT’ers argue that all three assumptions are false, one does not need to necessarily agree. The point is that to critique MMT on the basis of assumptions that are inconsistent with MMT is to actually not critique MMT at all. It is a straw man. I explain these assumptions and how they relate to Krugman’s two posts as I go through the text of both. Krugman begins: Right now, deficits don’t matter — a point borne out by all the evidence. But there’s a school of thought — the modern monetary theory people — who say that deficits never matter, as long as you have your own currency. Of course, Krugman grants in his follow-up (below) that MMT’ers don’t say this at all, perhaps due to the many responses to this post pointing out his error, as this is simply a straw man that makes Assumption B—more on this below. I wish I could agree with that view — and it’s not a fight I especially want, since the clear and present policy danger is from the deficit peacocks of the right. But for the record, it’s just not right. Again, MMT’ers don’t say it is, either. The key thing to remember is that current conditions — lots of excess capacity in the economy, and a liquidity trap in which short-term government debt carries a roughly zero interest rate — won’t always prevail. As long as those conditions DO prevail, it doesn’t matter how much the Fed increases the monetary base, and it therefore doesn’t matter how much of the deficit is monetized. But this too shall pass, and when it does, things will be very different. Krugman here is using the basic Economics 101 view of a liquidity trap, where interest rates and spending are unresponsive to continued increases in the monetary base. Paul Davidson has explained numerous times that this mainstream conception of a liquidity trap is not at all what Keynes was after, though I won’t go into that specifically here. The MMT point here, instead, is that changes in the monetary base NEVER matter per se, at least not in terms of causing anything. Recall what the monetary base is—the outstanding quantity of currency (physical “money” held by the households and businesses, or in bank vaults) and reserve balances held by banks in reserve accounts at the Fed. Increases in currency are portfolio shifts, generally out of deposits or savings accounts. These are not controlled by the Fed—the Fed enables banks to trade reserve balances for currency as banks anticipate their customers’ withdrawals. There is no such thing in the real world as the Fed dropping currency from a helicopter—that would be an increase in private sector income, not a shift in their wealth from savings accounts to physical currency (see here for more on this point). At any rate, the key point is that an increase in currency is a trade made by banks of currency for reserve balances. This occurs in response to the private sector’s desired currency holdings out of existing wealth and relative to existing income, and to the extent they are related to an increased desire to spend, the latter is certainly not caused by the fact that the Fed accommodates the desired portfolio shift. Regarding reserve balances, the Economics 101 story is that banks use excess reserve balances to create loans. The reality is that a loan is created when a credit worthy borrower desires a loan at a bank’s stated interest rate (that is set consistent with the bank’s anticipated costs of liabilities and the anticipated credit risk of the borrower), and this loan creates a deposit for the borrower. No prior reserve balances necessary. If the bank is short its required reserves after creating the loan/deposit, it will borrow reserve balances in the wholesale markets; in the aggregate, the Fed will ensure sufficient reserve balances to meet requirements are available at its target rate, since that’s what it means to set a target rate. Should the borrower withdraw the deposit (as when a household takes out a mortgage and immediately uses the proceeds from the loan to buy a house), if the bank is short reserve balances to settle this payment it will automatically receive an overdraft to its reserve account and that it will clear by the end of business; again, the Fed ensures that sufficient aggregate balances are circulating that the target rate is achieved. For any individual bank, what matters is the cost of the liabilities the bank anticipates it will ultimately be left with as an offset to the newly created loan along with the capital charge associated with the loan. For this, it is the Fed’s target rate that can matter, but never the aggregate quantity of reserve balances circulating. As an aside, it should be obvious that this all works exactly the same if a bank purchases, say, a bond from the private sector. The bank simply acquires the asset and credits the seller’s account with deposits. If this raises reserve requirements, then the bank acquires them in wholesale markets if necessary. If the seller banks at a different bank, then the bank may need to borrow in wholesale markets to cover an overdraft as it settles the bond purchase with the seller’s bank. As with currency, an increase in reserve balances will occur in response to economic activity as reserve requirements increase after a loan has created a deposit (assuming the deposit ultimately remains a deposit and isn’t converted into a money market account or time deposit). More reserve balances don’t help banks make more loans; in the aggregate this will only reduce the overnight rate below the Fed’s target unless the Fed pays interest on reserve balances at its target rate as it has since late 2008. This has been understood for decades by many heterodox economists operating under various titles such as MMT, neo-Chartalist, endogenous money, horizontalists, and Circuitistes. Particularly since 2008, an increasing number of mainstream monetary economists have started to figure this out, though it has yet to make its way to any of the undergraduate or graduate textbooks. Returning to the main issue, Krugman here has invoked Assumption A—that the monetary base would matter if the economy wasn’t in a liquidity trap. The MMT response, as I’ve explained here, is that the size of the monetary base never matters per se. The currency component of the monetary base is entirely set in response to economic conditions, whereas reserve balances do not help banks “do” anything they couldn’t otherwise. Indeed, banks in Canada “do” exactly what banks in the US “do” even though the banking system in Canada has operated with 0 reserve balances for many years already. So suppose that we eventually go back to a situation in which interest rates are positive, so that monetary base and T-bills are once again imperfect substitutes; Again, Krugman’s Assumption A is false. Further, his assertion that the monetary base and T-bills eventually will be “imperfect substitutes” demonstrates his lack of understanding of monetary operations. The reason why reserve balances and T-bills are substitutes right now is because they both earn the same return—reserve balances earn the target rate, that is. (Note that the currency components of the monetary base earns nothing, and thus is not now and will not be in the case of any positive rate on T-bills a substitute for the latter.) If the Fed someday in the future does raise its target rate, the question is whether or not it will continue to pay interest on reserve balances at its target rate. If so, then reserve balances and Tbills will be substitutes, at least for banks (since non-banks don’t have reserve accounts and thus can’t hold reserve balances). If not, then the Fed will be forced to drain all the excess reserve balances not consistent with achieving its target rate by selling its own assets, reverse repos, or issuing its own time deposits. True, reserve balances and T-Bills will no longer be substitutes, but “why” this is so and “how” the Fed will respond to this are far more important than asserting that this will occur. That is, whether or not reserve balances and T-bills are substitutes is entirely dependent on how the Fed chooses to achieve its target rate. Note further that if the Fed chooses to simply pay interest on the excess reserve balances at its target rate, leaving this part of the monetary base at its current size even when the economy leaves the so-called liquidity trap, this will not matter since banks can’t do anything with reserve balances besides settle payments and meet reserve requirements, and the Fed always supplies enough reserve balances in the aggregate to do these things anyway. also, we’re close enough to full employment that rapid economic expansion will once again lead to inflation. Remember this point, since it’s key to Krugman’s Assumption B below. The last time we were in that situation, the monetary base was around $800 billion. As above, Krugman’s Assumption A is wrong and demonstrates a lack of understanding of monetary operations. Whether the monetary base is $800 billion and the national debt held by private investors is $9 trillion, or the two are reversed such that it is the monetary base that is $9 trilllion, is of no consequence. It’s merely a choice of monetary policymakers about how to achieve the target rate. In the former case, the Fed has set the target rate above the rate it pays on reserve balances and has drained all excess reserve balances not consistent with its positive interest rate target; in the latter case, the Fed has kept the target rate and the rate paid on reserve balances equal such that T-bills and reserve balances are “perfect substitutes” still for banks. Suppose, now, that we were to find ourselves back in that situation with the government still running deficits of more than $1 trillion a year, say around $100 billion a month. Here we see, for the first time, Krugman’s Assumption B: Functional Finance is Non-Ricardian. To define terms, “functional finance” refers to a fiscal policy strategy that uses deficits to manage the macroeconomy (for purposes here, the precise mechanisms by which this is done are not important; there’s a lot of MMT research on that point for those that are interested). The core point is that it is not the size of the deficit that matters, but rather the effects of the deficit. As such, MMT’ers only support large deficits to the extent that they do not push the economy beyond full capacity utilization and thereby create demand-pull inflation. Consequently, Krugman’s assumption here that the government is running $100 billion deficits/month must also assume that this deficit is consistent with full capacity utilization, and no more utilization than that, otherwise it is a larger deficit than any MMT’er would ever support. More on Assumption B below. Ricardian fiscal policy is a Neo-Liberal economics term that refers to a policy strategy that brings the path of the government’s primary budget balance (the total deficit less interest on the national debt) in line with the government’s so-called intertemporal budget constraint. Where this is not the case, the path of the government’s primary budget balance ultimately brings rising inflation—even hyperinflation—or default to avoid this outcome due to exponential increases in debt service. This is referred to as Non-Ricardian fiscal policy. All sorts of fiscal policy strategies can be Non-Ricardian—running large, fixed deficits regardless of the state of the economy; maintaining a primary deficit at its current size even as debt service rises exponentially; and so forth. MMT’ers generally don’t have much use for the intertemporal budget constraint (as I explain here—largely because it requires Assumption C to be true; MMT’ers reject Assumption C for a sovereign currency issuer under flexible exchange rates, as I also explain below). Nonetheless, and interestingly, Wynne Godley and Marc Lavoie demonstrate that a functional finance-consistent fiscal policy strategy is in fact Ricardian. This is true regardless how large the interest rate on the national debt becomes relative to the growth rate of the national debt since an increase in debt service that pushes the economy beyond full capacity utilization and thereby raises inflation is necessarily—in order to remain consistent with the functional finance strategy—offset by a decline in the primary deficit (see pages 12-23). It’s important to clarify that while functional finance is Ricardian, it is not so “on purpose”; that is, the policy strategy is to sustain full capacity utilization—no more and no less stimulus than necessary to reach this point (again, MMT’ers have little use for the intertemporal budget constraint given the latter’s reliance on Assumption C). That the functional finance strategy is in fact Ricardian is a side effect—and, again, a very interesting one at that—not something that is pursued directly. And now suppose that for whatever reason, we’re suddenly faced with a strike of bond buyers — nobody is willing to buy U.S. debt except at exorbitant rates. This is Assumption C: Interest rates on the national debt are set by “market forces.” Krugman tries to push this heroic assumption without anyone noticing by inserting “for whatever reason” into the sentence, as if somehow he can just wave his hands and make it so. Indeed, “whatever reason” is the crux of the matter, and in this two word phrase he has assumed MMT’s vast literature on the monetary system away in order to make his argument against MMT. It’s like proving theory X is wrong by simply assuming all of the supporting evidence for theory X—for “whatever reason”—is wrong. There is probably nothing more central to MMT than the idea that the government does not need its own money, since a currency-issuing government is by definition the source of its own money. Taxes, in the MMT framework, have the effect of giving the government’s money value, and also serve the purpose of managing aggregate demand. But since it does not need its own money, it also does not need the bond holders, wherever and whoever they are (and the last time I checked, China’s government created yuan, not US dollars). Of course, governments—particularly when they are operating on an outdated understanding of the monetary system—can and do impose constraints upon themselves. In the US case, laws previously written by Congress forbid the Fed from providing direct overdrafts to the Treasury. As such, if the Treasury wants to spend and its balances are dwindling, it must either tax or issue bonds to do so. Unfortunately, this self-imposed political constraint is the starting and ending point for Krugman and most others, even as it has little to no economic significance according to MMT. MMT’s approach to this self-imposed political constraint is more general. A currency issuer under flexible exchange rates that allows itself to receive overdrafts in its central bank account will see the interest rate on its debt equal to the central bank’s target rate at the very lowest. This is because the central bank cannot achieve its target rat in this case unless it pays interest on the reserve balances created by the government’s spending net of balances drained by taxes, and these central bank outlays will reduce the profits it turns over to the treasury (a de facto interest payment by the treasury). This is what I like to refer to as the strong form of MMT regarding interest on the national debt. If the treasury instead decides to issue short-term bills, or is required to by self-imposed constraints, these will arbitrage against the central bank’s target rate; if it issues longer-term bonds, these will mostly arbitrage against the current and expected Fed targets. I call this the semi-strong form, and explained it in more detail here and here. Randy Wray does, too, here. Losing access in the semi-strong form is a non-starter—the arbitrage opportunity grows stronger as the non-govt sector can borrow at a lower rate, and there are primary dealers and thousands of hedge funds that would love to take advantage of that trade. In neither of these cases should interest rates on the national debt be considered to be set by “market forces” (aside from what Warren Mosler likes to call “technicals”). Further, the self-imposed political constraint is not a constraint of any economic significance—if one is given the choice between an overdraft at the central bank’s target and issuing debt at roughly the central bank’s target, does it really matter if the overdraft option is then withdrawn? MMT’ers say “no.” Failing the strong and semi-strong forms of interest on the national debt—which I would argue would be exceedingly rare, though the probability is probably not 0—a final option would be for the central bank to purchase the government’s debt in order to keep interest rates on the debt from rising. I call this the weak from of MMT regarding interest rates on the national debt. Marshall Auerback and Rob Parenteau explained this option in more detail here. Here again, access to the bond markets isn’t the issue. The overall point here is that the interest rate on the national debt for a currency issuing government under flexible exchange rates always is, or at the very worst always can be, a monetary policy variable. Concerns about “bond market vigilantes” are misplaced, as they could apply only to non-currency issuers (e.g., Greece, California) or fixed exchange rate regimes. Assumption C is false. Finally, note that Krugman’s Assumption C here is related to his Assumption B, since, as explained above, neo-liberal economics holds that a government running a Non-Ricardian fiscal policy strategy can lose access to the bond markets (explained in more detail here). But, again, functional finance is Ricardian, so even if Assumption C were correct, the fact that that Assumption B is wrong makes it unlikely that Assumption C would be relevant at any rate. So then what? The Fed could directly finance the government by buying debt, or it could launder the process by having banks buy debt and then sell that debt via open-market operations; This is Assumption C again, though this time with the Fed’s intervention to keep rates from rising, as in the weak form described above. either way, the government would in effect be financing itself through creation of base money. Before Krugman again invokes Assumption A below, note that the Fed actually cannot do this and achieve a positive interest rate target unless it pays interest on the large quantity of excess reserve balances left circulating (Krugman’s “base money,” since as above these Fed operations aren’t about currency). In other words, an understanding of monetary operations reveals that the only way this can happen is if the Fed makes reserve balances and T-bills perfect substitutes, which was the scenario under which Krugman argued above that the size of the monetary base doesn’t matter. So? Well, the first month’s financing would increase the monetary base by around 12 percent. And in my hypothesized normal environment, you’d expect the overall price level to rise (with some lag, but that’s not crucial) roughly in proportion to the increase in monetary base. And rising prices would, to a first approximation, raise the deficit in proportion. This is Assumption A, as the rising monetary base is believed to increase the price level directly. Recall, though, that the monetary base (actually, reserve balances, since that’s what’s increasing here) in this case is a perfect substitute for T-bills since the Fed cannot engage in these operations to purchase the government’s debt without paying interest on the reserve balances at its target rate. The alternative would be for the Fed to be unable to achieve a positive target rate. Again, Krugman’s own view is that the size of the monetary base doesn’t matter when it and T-bills are perfect substitute—his mistake was that his lack of understanding of monetary operations led him to believe this would only happen when the economy was in a so-called liquidity trap. More importantly is the fact that a deficit that results in the non-government sector holding government securities is not less stimulative than where the non-government sector does not hold securities. To some degree at least, this should be obvious given that the latter operationally requires that T-bills and reserve balances be perfect substitutes. Note that any government spending results in recipients having more income and increased deposits in their bank accounts, while their banks have greater reserve balances. Taxation does the opposite, reducing income and reducing deposits. A bond sale does neither of these. It is simply a drain of reserve balances (in the case of a bank purchasing the security) or deposits (in the case of a sale to a non-bank such as a primary dealer) and reserve balances (of the dealer’s bank) in exchange for the security. And the new owners of the security, or security holders in the aggregate, don’t suddenly have less spending power. Treasuries are the most liquid of financial assets and can be sold at any moment should the holders for whatever reason prefer deposits, and dealers that would purchase these from current holders generally finance their purchases by borrowing in repurchase agreement markets—that is, this process can result in the creation of additional deposits. Indeed, unlike deposits created by government spending, Treasuries can and do enable additional credit creation via repurchase agreements, often several times the market value of the security itself. Similarly, if banks are holding Treasuries instead of reserve balances, as explained above, they don’t somehow have less ability to create additional loans/deposits. And given that the Fed would have to pay interest at the target rate on reserve balances in order to purchase government securities, the banking system would be indifferent between holding T-bills and interest earning reserve balances. The issue is not whether a given deficit is offset by interest earning reserve balance or securities, since this choice does not create more or less inflation (aside from potential interest rate differentials if longer-term bonds are issued—and in that case the bonds can in fact be more inflationary than not issuing securities), but rather whether the deficit itself—which is raising nominal incomes—and the accompanying debt service—given the Fed’s interest rate target—is pushing the economy beyond full capacity utilization and thus potentially resulting in demand-pull inflation. If this occurs in a functional finance policy world, the appropriate response according to MMT is to reduce the primary deficit. Assumption B is wrong. So we’re talking about a monetary base that rises 12 percent a month, or about 400 percent a year. Does this mean 400 percent inflation? No, it means more —. All three assumptions are required to get this result: The monetary base will only grow as fast as Krugman is implying if the Fed has set interest rates that high; the Fed could slow the growth by simply reducing its interest rate target. Assumption C is wrong. It doesn’t matter how fast the monetary base grows, per se; what matters is the deficit itself relative to full capacity utilization. Assumption A is wrong. MMT would argue that the primary deficit should be reduced if the combination of the existing primary deficit and the interest rate on the debt is creating demand-pull inflation. Assumption B is wrong. because people would find ways to avoid holding green pieces of paper, raising prices still further Apparently Krugman believes that Fed security purchases raise the quantity of “green pieces of paper.” They don’t. They increase the quantity of reserve balances while reducing the outstanding quantity of Treasuries. And we’ve already established that the Fed can’t do this unless T-bills and reserve balances are substitutes, while it is the interest paid on reserve balances that ensures banks will hold the reserve balances at the Fed’s target rate. Assumption A is wrong. I could go on, but you get the point: once we’re no longer in a liquidity trap, Assumption A is wrong. running large deficits without access to bond markets Assumptions B and C are wrong. is a recipe for very high inflation, perhaps even hyperinflation. Assumptions A and B are wrong. And no amount of talk about actual financial flows, about who buys what from whom, can make that point disappear: if you’re going to finance deficits by creating monetary base, someone has to be persuaded to hold the additional base. Assumption A is wrong. Yet again, what has to happen when the Fed buys Treasuries is that in order to achieve a positive interest rate target reserve balances must earn the target rate. This is sufficient to ensure someone will “hold the additional base.” Whether this scenario is inflationary is based on (1) the primary deficit, (2) the interest payments on the national debt set by the Fed, and (3) the size of these two combined relative to the non-government sector’s net savings desired at full employment real GDP. If so, then one or both of these can be reduced. At this point I have to say that I DON’T EXPECT THIS TO HAPPEN — America is a very long way from losing access to bond markets, Assumption C is wrong. and in any case we’re still in liquidity trap territory and likely to stay there for a while. Assumption A is wrong. Krugman’s own straw-man scenario unwittingly makes T-bills and reserve balances substitutes. But the idea that deficits can never matter, Deficits can matter for MMT because Assumption B is wrong. that our possession of an independent national currency makes the whole issue go away, It makes the issue of “involuntary default” go away, while the interest on the national debt is or at least can be a monetary policy variable. Assumption C is wrong. The resulting size of the monetary base doesn’t matter either, since Assumption A is wrong. is something I just don’t understand. Clearly it is difficult for a Neo-Liberal to understand MMT. Krugman’s follow up 24 hours later continued with: I think one way to clarify my difference with, say, Jamie Galbraith is this: imagine that at some future date, say in 2017, we’re more or less at full employment and have a federal deficit equal to 6 percent of GDP. Just to be clear, the assumption here must be that the six percent deficit is consistent with being at or near full capacity utilization and no additional demand-pull inflation. If not, then Krugman is making Assumption B, which is wrong. Does it matter whether the United States can still sell bonds on international markets? Why would it need to? And if it wanted to, why wouldn’t it be able to at roughly the Fed’s target rate? This is Assumption C again, and it is wrong. As I understand the MMT position, it is that the only thing we need to consider is whether the deficit creates excess demand to such an extent to be inflationary. The perceived future solvency of the government is not an issue. I don’t really know what “perceived future solvency” means. There are a lot of people, like, say, Bill Gross of PIMCO, who currently perceive that there are problems with the government’s future solvency. Has that mattered in any economically significant way for the prevailing interest rate on the national debt? No. And even if it did, there’s still the weak form of interest on the national debt available as a policy option. What MMT’ers say is this: How could a government that issues its own currency face involuntary default? This is obviously not to suggest that deficits can’t be inflationary—though this would be imposing Assumption B, which for purposes here is obviouslyly wrong—or that governments cannot impose default on themselves (see here and here). I disagree. A 6 percent deficit would, under normal conditions, be very expansionary; but it could be offset with tight monetary policy, so that it need not be inflationary. If it’s overly expansionary, then MMT would be against it and would argue in favor of a smaller primary deficit. Assumption B is wrong. Using tighter monetary policy instead will only “work” if the higher overnight rate reduces credit creation more than it raises government debt service; consequently, this could potentially require a larger reduction in the primary deficit than not altering monetary policy at all. But if the U.S. government has lost access to the bond market “Losing access” to the bond market for a sovereign currency issuer is a non-starter. The closest approximation would be for the central bank to set the interest rate too high or, in the weak form scenario, is purchasing the government’s bonds at too high a rate, such that interest on the national debt is rising so fast that inflation is rising. Assumption C is wrong. But if this happens, then a primary surplus will be necessary to avoid inflation according to functional finance approach. Assumption B is wrong. the Fed can’t pursue a tight-money policy — The Fed can raise the rate it pays on reserve balances—recall that for Krugman’s scenario to work the Fed must pay interest at its target rate. True, this may not actually “tighten,” since it will raise interest on the national debt that much faster, and thus raise aggregate demand absent a reduction in the primary deficit. But interest rates certainly are still under the Fed’s control even if the transmission mechanism is not as the textbooks suggest. In any event, fiscal policymakers can reduce the primary deficit if a reduction in aggregate demand is desired. Assumption B is wrong. on the contrary, it has to increase the monetary base fast enough to finance the revenue hole. Assumption C is wrong—debt service will only grow that fast if the Fed sets an interest rate target that high. Assumption B is wrong—the primary deficit can be (and under a functional finance strategy, should be) reduced if it is large enough that demand-pull inflation is occurring. And so a deficit that would be manageable with capital-market access becomes disastrous without. Assumptions A, B, and C are wrong. Now, this has NOTHING TO DO WITH OUR CURRENT SITUATION: It has nothing to do with our situation now or in the future, or the situation of any other currency issuer now or in the future, as I’ve explained. It can only ever be otherwise if all three of Krugman’s assumption are true. But they are all false. the rapid growth in monetary base since 2007 has taken place because the Fed is trying to rescue the economy, not because it’s trying to finance the government — True. Not that it matters, though, since, yet again, Assumption A is wrong. and that base growth can and will be reversed as soon as the economy gets anywhere close to full employment. (Actually, the big danger is that it will be reversed too soon.) One last push for Assumption A, this time in reverse. That’s wrong, too. If a larger monetary base doesn’t matter, then it doesn’t need to be wound down, either. So at the moment this is just an intellectual exercise. Still, it’s a point that needed making. If only to demonstrate, for anyone who still remains unconvinced, that Krugman doesn’t understand MMT and, perhaps even more, doesn’t understand the basics of how the monetary system actually works. To conclude by way of reiterating the main point here, one need not agree with MMT that the three assumptions Krugman makes are incorrect. The overarching problem is that Krugman has simply assumed the Neo-Liberal macroeconomic model is correct and the MMT view is incorrect. This is far different from actually demonstrating that MMT is incorrect, which Krugman has yet to even attempt.
Classical Studies | Supervised Reading Program L803 | 0924 | Bridget Balint L803 section no. 0924 Roman Comedy will meet from 2:30P-3:20P MWF in PV 275 this section also meets with L408. We will read a play each by Plautus and Terence. The course will include discussion of the playwrights language, the nature of comedy, staging, political and social commentary, the influence of Greek comedy, and the reception of the plays at Rome and elsewhere. Requirements: in-class presentation of a report on relevant literature or of a scene from Roman comedy; midterm, final.
The classical forms of Latin and Greek are essential to the history of world literature. For those interested in studying seminal texts in Latin and Greek and learning how to translate these ancient languages, The New School offers a selection of courses that focus on particular authors or sets of writings from antiquity. The New School offers at least one course in Latin or Greek each fall, spring, and summer term. Visit the registration website for a list of current course offerings in Latin or Greek and other languages. If you are unsure whether a course is right for you, contact the Department of Foreign Languages at email@example.com. Here is an example of the type of translation exercise you might work on in a Latin course: Nam ceterae neque temporum sunt neque aetatum omnium neque locorum: haec studia adulescentiam acuunt, senectutem oblectant, secundas res ornant, adversis perfugium ac solacium praebent, delectant domi, non impediunt foris, pernoctant nobiscum, peregrinantur, rusticantur. -Cicero, Pro Archia, Chapter 7 Other studies are not for all occasions, nor ages nor places, but literature sharpens our youth, gives pleasure in old age, adorns success, and provides refuge and consolation in misfortune, is a delight at home but not obnoxious in company; it stays up with us, travels with us, vacations with us.
The Alchemy web site on Levity.com Alchemical fictionBack to Alchemy Forum archive Date: Wed, 20 Sep 1995 01:28:35 -0700 Can there be such a thing as "alchemical fiction"? Naturally, I'm less interested in fiction which uses alchemical imagery in some attempt to create a "supernatural" effect. (Meyrink's potboiler 'The Golem' might fit among that category.) I'm more interested in literature, either old or new, which actually tries to re-present the effects and transformations of alchemy in a literary form -- maybe 'The Chemical Wedding of Christian Rosenkreuz' is a good example. I've read some literature which strikes me as pure alchemy, in brief passages - parts of Goethe's Faust plays, a few flashes from Lautreamont, sections of more modern works like Bruno Schulz's 'Street of Crocodiles', Primo Levi's 'The Periodic Table'. So, have you ever read fiction that qualifies as "alchemical"? Can such a thing be? Date: Wed, 20 Sep 1995 10:06:10 -0400 From: Oliver Timken Perrin I admit my fascination to be the product of many childhood nights reading till dawn, but I recommend "The City in the Autumn Stars" by Michael Moorcock most highly. Hot-air balloons, duels, planetary conjunctions, a cross-dressing alchemical adept, a great talking fox who dresses as a dandy and fancies himself a philosopher and thief, scams, counter-scams, battles, sleeping cities, Lucifer, the Paracelsian sword, the grail and the inimitable Von Bek all make it a fantasy tale without peer in my estimation. I am a fool for Moorcock though, have been for quite some time... Date: Wed, 20 Sep 1995 09:38:56 -0500 From: George Randall Leake III How about alchemy which seems like fiction? But to your point, I'd have to suggest the later works of William Shakespeare...even some of the film adaptations of his work such as Peter Brooks' King Lear, Greenaway's Prospero's Books The best piece of fiction I've read which deals with the topic is either Foucault's Pendulum or John Crowley's Ægypt Date: Wed, 20 Sep 1995 18:32:38 -0400 (EDT) Well. I've read several years ago "The Red Lion - The Elixir of Eternal Life" by Maria Orsi (written in 1946) and available in English from Computer Composition Inc. (Francis Hollo) 3525 Trimble Road, Nashville, TN 37215. A really great novel about a guy who wants to aquire the secret of eternal life and studies with an alchemist who has the elixir. He is too eager and impatient to get it and the master refuses to give him the secret before he is ready. Eventually the guy kills the master and drinks the elixir with the result that he has acquired total consciousness for better or for worse. He is forced to remain conscious throughout all his reincarnations and spends all his lives around alchemists. Really fascinating. From: Corey Brand Date: Wed, 20 Sep 1995 18:02:45 +0000 You could try "The Alchemist", by Paulo Coehlo (recently mentioned), ISBN 0 06 250217 4; or "The Chymical Wedding" by Lindsay Clarke, ISBN 0 8041 0702 5. Both of these novels seem to me an invocation of alchemical forces... Date: Thu, 21 Sep 95 11:53:58 CDT From: Dan Hill I have read Zanoni by Sir Bulwer Lytton. It is a great book for alchemical undertones. Rather long, but is good reading sitting beside the fire with a seasoned scotch. From: Corey Brand Date: Thu, 21 Sep 1995 16:36:57 +0000 And let us not forget the short story by Nathaniel Hawthorn... Date: Fri, 22 Sep 1995 09:21:59 -0800 (PST) From: LeGrand Cinq-Mars Here is a fiction involving alchemy (if not an alchemical fiction precisely): Author: Kelly, Eric Philbrook, 1884-1960. Title:The trumpeter of Krakow, a tale of the fifteenth century, by Eric P. Kelly; illustrations made by Angela Pruszynska in Krakow. Pub. Info.:New York, The Macmillan Company, 1928. Phy Descript: ix, 218 p. incl. plates. col. front., col. plates. 23 cm. Notes: Summary: A Polish family in the Middle Ages guards a great secret treasure and a boy's memory of an earlier trumpeter of Krakow makes it possible for him to save his father. Children's Literature Archive. Other Sub.: Middle-Ages -- Fiction. Poland -- History -- Casimir-IV-1447-1492 -- Fiction. Much of the plot moves around the activities of an alchemist who is using a scrying stone in his work. From: Jon Marshall Date: Sun, 24 Sep 1995 14:39:15 -0700 Much as I hate to blow my own trumpet, there is already a list of 20th century novels which are either alchemical or have interesting things to say about alchemy on Adam's web site. (`lighter reading'). I can see a few more titles have to be added. I deliberately avoided Zanoni, and Balzac's Quest for the absolute, and Godwin's St.Leon, and Ainsworth's Elixir of Life, and Conan Doyle's Doings of Raffles Haw. For the same reason I avoided Chaucer, Jonson (Not only the Alchemist, but 'Mercury Vindicated', Lodge (Fig for Momus epistle 7 'Anatomy of Alchymie'), Lylly (`Galathea') and so on, because I was hoping for a more complete list of early fictions/entertainments. As my ambitions as usual exceed the time available perhaps the list as a whole can add to the lighter reading section and stretch it beyond the confines of one century. So with a quick look about i add to the above as possible (for I haven't read them and thus yield to those who have): Dumas The Queen's Necklace, Memoirs of a Physician William Dunbar, Ballet of the fenyeit frier of Tungland Lytton, A strange Story Erasmus, Colloquies ('Beggar talk', 'Alchemy') Yeats, Rosa Alchemica Lylly, Pappe with a Hatchet Even perhaps single poems Donne 'Love's Alchemy' Herbert 'the elixir' Ok more please. From: Jon Marshall Date: Wed, 27 Sep 1995 11:06:15 -0700 Hmm I not really trying to send my posts out twice to people. But yesterday I bought Timothy D'Arch Smith's Alembic which claims to be about alchemy, and I believe that one of Charles Williams novels is about the Philosopher's stone- any idea which? And embarrasment: I forgot Goethe: Fairy Tale (Magnum opus series), also some stuff in a US paperback called Tales for Transformation, and shall we say Faust? to the maybe list Shelley's early novel about Rosicrucians (I forget the name). Oh and there is a `historical romance' which I've looked at because of its title 'the Green Lion', but backed off due to snobbery.. Anyone admitting to having read it and know whether its any good? Another question mark Storm Constantine: Hermetech? Date: Wed, 27 Sep 1995 06:44:13 -0700 Check out almost anything by John Crowley, but especially 'Aegypt' and 'Love and sleep'. Date: Wed, 27 Sep 1995 08:12:18 -0700 (MST) From: Tom WILLARD Jon Marshall asks: >>I believe that one of Charles Williams novel's is about the Philosopher's stone- any idea which?<< >>Shelley's early novel about Rosicrucians (I forget the name)<< 'St. Irvyne, or the Rosicrucian' >>`the Green Lion', but backed off due to snobbery.<< If we're thinking about the same novel, it's an historical fiction (Margaret Atwood would call it a "costume Gothic") with an alchemist in the background. Written (if I'm recalling the right dust jacket blurb) by a woman on a graduate management school faculty in California. From: Adam McLean I have not seen this book, but it appears to be a novel based on the life of Denis Zachaire. Percy Ross. A Professor of Alchemy. George Redway, London, 1887.
Guide to the Internet This U.S. Department of Education online brochure introduces parents to the Internet's use as an important educational tool. In addition to basic tips, you'll find suggestions for using the Internet for school projects and information about how the Internet can enrich the learning experiences of children with special needs. This site also includes Internet safety guidelines, an Internet glossary, and links to a number of fascinating Web sites that are designed with you and your children Parent Information Center The U.S. Education Resource Information Center (ERIC) created this site to provide "educational materials and services to parents who take an active role in their children's education." Here you'll find online brochures and magazines, links to education and parent-friendly sites, and ideas for learning activities. Parents can search the ERIC database or use the AskERIC question-answering service for research-based answers to education questions. This site is loaded with information and activities for you and your children—organized under such categories as Parenting Challenges, Activities, Special Needs, Expert Advice, Software Downloads, and Family Finance. New York Times Learning Network With its "Word of the Day" and crossword puzzles, this site provides vocabulary and spelling practice. In addition, you and your children can reflect on the past with daily historical facts, stay current with news summaries, and test your memory with current-events quizzes. Click on the "Parent Connections" link to browse education news and educational product reviews. Department of Education This home page for the U.S. Department of Education contains a wide array of information, including programs and services, publications and products, and sources for student financial aid. Included are links to important education articles and to the most popular pages on the Web site. This is an invaluable site for Internet research. Through this site, you can access the entire EncycloŠpdia Britannica, read articles selected from more than seventy of the world's top magazines as well as daily news postings from the Washington Post, and link to thousands of the Web's best sites. Theory Center Language Arts Page This language arts page provides links to a variety of online reference works, including dictionaries, biographical encyclopedias, thesauri, and Virtual Facts on File. Also included are links to excellent elementary, middle, and high school literature With an extensive selection of reference tools, online exhibits, and online texts, this site is a great starting point for any research or writing project. Through this site, you can access newspapers from every state and many countries as well. The Teachers' and Parents' Corner, located in the section for youth, is devoted to topics concerning students and education. This online library's more than 14,000 resources are carefully screened to be child-safe, current, and useful. Sites are organized for students, parents, teachers, and librarians. To search the library, click on a topic (or customize your own search) and then view a list of search results categorized by source, such as periodicals, discussion groups, or lists. The National Clearinghouse on Bilingual Education maintains this site dedicated to school issues and research regarding linguistically and culturally diverse learners. In addition to providing strategies for parenting a bilingual child and fostering bilingualism, this site provides information about incorporating technology into bilingual education. At this site, you and your college-bound student can begin to narrow the field of choices for a college or university. Schools are ranked in a variety of orders, including academically by subject, best value, and location. You can also find information on community colleges as well as tips on identifying interests and skills, obtaining financial aid, and finding internships.
Targeted liquid injection from a secondary pumparound (PA) effectively compensated for a shed-deck vapor distribution problem in a fluidized-bed coker. This case study shows how the installation of an unique piping and lance design achieved targeted liquid injection, quenched vapor hot zones and reduced resid entrainment into the heavy coker gasoil (HKGO) The Valero Benicia refinery, owned by Valero Refining CompanyCalifornia, operates a 28,000-bpd fluidized-bed coker.a The coker-reactor-effluent vapor passes through a single cyclone discharging into a scrubber that contains several rows of multi-pass shed decks. The scrubber-bottom liquid is pumped both as a recycle stream to the reactor and as PA liquid to the top of the sheds that feed through a slotted-ladder-type pipe distributor. The top section of the scrubber contains structured-grid packing washed with HKGO. After passing through the reactor and scrubber, the HKGO and light gasoil (LGO) products are separated by the fractionator, as shown in 1. Scrubber and fractionator PFD. In a coker, the scrubber quenches the thermally cracked-reactor products and condenses the heaviest product fractions for recycling back to the reactor. The void space between the cyclone outlet and the bottom shed row acts as a spray chamber with good liquid distribution. It can provide a significant part of the PAs heat transfer and solids removal. The remaining heat transfer and solids scrubbing occurs in the shed decks. While coking and fouling of the scrubber occurs over a typical cycle, at the midpoint of the run, HKGO product quality should be maintainable without undercutting. In this case history, halfway into the cycle, significant residue carryover into the HKGO was observed, along with accelerated increases in the scrubber-grid pressure drop. Fig. 2 illustrates the steep slope and rapid degradation of the HKGO product quality from resid contamination. The impact on downstream units catalyst life and conversion would have required an early turnaround for the coker. A troubleshooting effort focused on identifying and resolving the entrainment 2. Scrubber grid DP growth over time as compared to previous run. ROOT CAUSE FOR RESID CARRYOVER Resid is routinely entrained from the scrubber PA section. The resid carryover into the fractionator is typically measured at less than 5 vol% of the HKGO. As the HKGO becomes more contaminated with resid, downstream GO-filter change outs increase. Additionally, the higher resid percentages can negatively impact runs on the downstream cat-feed hydrotreater and fluid catalytic cracking (FCC) units. The elevated resid content level of the HKGO carries both operational and economic The scrubbers structured packing acts as a guard against resid carryover. The grid provides a surface for de-entrainment of liquid carried up from the scrubber PA; it also enables heat transfer between HKGO wash and the scrubber vapor. Efficiency loss of the grid packing can be a function of either vapor maldistribution into the grid or liquid maldistribution over the grid. Structured packing is very sensitive to liquid maldistribution. Skillful designers pay careful attention to liquid distributor details. Liquid maldistribution of the HKGO wash can result in poor contact of the vapor and liquid through the grid and failure of the scrubber grid to properly wash the Structured packing is also very sensitive to vapor distribution. In this coker scrubber, high localized C-factors (Cs) created channels through the structured packing and entrained liquid from the top of the bed. Both potential root causes of resid entrainment were The structured packing is washed by HKGO through a spray header.b To meet the unique anti-fouling requirements of the coker, the spray header uses three separate laterals, each with its own column nozzle. Each lateral has several large orifice spray nozzles. There are no 90° elbows on the laterals to allow for external flexible-lancing should they become plugged. Operating data review While the overall slope of the scrubber grid pressure drop was trending higher during this cycle than in the previous cycle, a distinct step change was observed at the approximate time that the resid content in the HKGO increased (Fig. 3). An event with the loss of HKGO flow to the grid spray headers could result in coke formation within the bed. Operating data were evaluated to determine whether any instances of a loss in wash-oil rate preceded the higher resid entrainment or step change in the scrubber-grid pressure drop. There were no obvious losses in wash oil that may have created a dry-out situation. 3. Scrubber grid DP and resid in HKGO step change occurring at the end of August 2012. Failure of a spray nozzle or full lateral can leave areas of the grid bed unwetted, resulting in localized dry, hot zones that are subject to coking. Plugged or damaged nozzles would be evidenced by a deviation in pressure drop from design. A pressure survey was conducted to determine the actual nozzle pressure drop. Comparison of field data against the calculated pressure drop indicated that the spray header was operating The scrubber PA section consists of several rows of multi-pass sheds. The liquid pool at the bottom of the scrubber vessel is a mixture of cooler pitch feed and condensed heavy components from the reactor vapors entering the scrubber through the single cyclone. The pool liquid is pumped and distributed over the top of the sheds. As shown in Fig. 4, the vapor from the cyclone discharges to one side of the vessel, and this encourages maldistribution into the shed rows. Pressure drop is generated as the vapor winds its way through the column and passes through the shed-deck liquid curtains. Low pressure drop through shed decks exceeds that of packing. Yet, it still challenges any vapor redistribution. 4. Scrubber snout and shed tray orientation in plane view. The directional flow from the cyclone snout, compounded by the loss of any sheds, could result in vapor-flow channeling. The performance of the PA return-liquid distributor (H-header in this case) and uniform cascade of the liquid showers is consequently critical to maximizing vapor redistribution. VAPOR DISTRIBUTION FROM SHED PA Several thermocouples (TIs) are installed in the scrubber shed section. Readings from the TIs seem to converge at the time the grid ΔP escalated. Both indications are located in the Northeastern quadrant. Based on the elevations under previous normal operating conditions, the 9014 TI reads vapor temperature and the 9015 TI reads the cooler PA liquid temperature. After the incident, both TIs converged and yielded similar readings (Fig. 5). The data indicated that the TIs are now reading the same phase, either liquid or vapor, indicating a maldistribution problem. 5. Scrubber shed temperature profile between TI 9014 and TI 9015. The TI readings were confirmed using a series of skin temperatures at four elevations. Cutouts were made in the insulation so that a thermo-scanning gun could be used to read skin temperatures at approximately 15° increments around the vessel circumference. The skin temperatures had reasonable repeatability, and they indicated that a hot zone existed at the northwest quadrant. This position was located at the orientation of the TIs and confirmed the deviation in readings (Fig. 6. Scrubber shed TI 9014 and TI 9015 from previous turnaround inspection. The H-header design is a simple, ladder-type slotted-pipe distributor with laterals positioned over each of the top layer of sheds. Discussions of the hydrodynamics of liquid flow from a shed deck are found in literature.1 The up-flowing vapor can cause atomization of the liquid as it flows through the curtain, and impingement of the shower on surfaces or other showers can also cause liquid stream breakup. Another method was used to evaluate the scrubber shower liquid throw and was back-checked against internal geometries to confirm that the cascades from the parallel shed decks are not impinging on each other.2 The liquid throw averaged only 15% of the shed spacing (very low weir loadings). In a perfect design, the H-header liquid would be distributed proportionally through the H-header according to the design open area, and each side of the shed should have a weir loading proportional to the vapor space that the liquid needed to cover. Shed decks are not ideal mass-transfer devices, and they are subject to maldistribution (Fig. 7). Accordingly, the actual liquid throw could be slightly different than the calculated value. 7. Scrubber nozzle and internals orientations in plane view. The exit velocity of the H-header end slots is below the target design guidelines for fouling systems. It is possible that fouling or coking could have obstructed liquid flow to a section of the header, resulting in maldistribution of liquid between the sheds or along the length of an individual shed. Damage occurring at a lateral or possibly at a flange could similarly change the header flow hydraulics and alter distribution. With the low weir loadings, this could result in one section of the scrubber having very sparse liquid coverage. Other than the observed temperature deviations, it was not possible to confirm the H-header performance while the scrubber was in operation (Fig. 8). 8. Scrubber primary PA distributor orientation in plane view. A high C value could contribute to liquid entrainment from the sheds. The vapor rate to the sheds is approximated by blending the product stream compositions and estimating the steam from the reactor side. This does not account for the heavier components that are condensed within the shed PA section. However, it should offer a fair approximation of whether vapor superficial velocity is outside the normal design Vapor velocity was calculated two ways. The first method calculates the conventional superficial velocity through the column cross-sectional area, and the second method uses the window velocity of the gas.1 The cross-sectional column area and the window area are very similar in this column, making the two Cs similar. These Cs were then compared against the Kister and Olsson Eq. 3 to determine that this particular shed section operates significantly away from the flood point.3 Table 2 summarizes the results from these two The resid entrainment was initially shown to improve with the use of the startup header, which is an internal open-pipe tee, positioned above the H-header. When the startup bypass is in service, the total PA rate and duty increases. Higher duty results in undercutting GO, thereby improving its quality. However, the liquid from the startup pipe is poorly distributed and drops across the central sheds only. If the duty is held constant, then the side shed TIs in the hot zone are unresponsive when using the startup header. While using the startup pipe can increase overall PA flow, it was ineffective at controlling resid entrainment without major undercutting and LIQUID/VAPOR DISTRIBUTION INVESTIGATION After reviewing the equipment design, operating data and unit impacts to operational adjustments, the factor contributing to excessive resid entrainment was a malfunction of the H-header PA return distributor. It reduced liquid coverage over the northwest quadrant of the column. The liquid maldistribution promotes vapor maldistribution along with high localized vapor velocity and Cs by creating a lower pressure drop pathway, thus leaving the upcoming vapor ENGINEERING A SECONDARY PA From using the startup header, it was clear that a non-targeted application of PA liquid would not resolve the localized high temperatures. The solution had to direct PA liquid to the hot zone in a more precise way and be installed without a unit shutdown. Several existing nozzles on the scrubber vessel were identified at several feet above the PA zone. These nozzles were out of service, and had been part of a decommissioned project to create a spray chamber that could partially compensate for a fouled grid section during a previous cycle. This project had used the HKGO wash oil as a spray media. These existing nozzles were repurposed to inject PA liquid into the scrubber as a supplement to the H-header flow. The nozzle orientations around the tower allowed the liquid flows to be targeted to identified regions that were observed as hot zones by the temperature surveys. Engineering proceeded to route PA liquid to the nozzles. The piping to the new secondary injection location was designed with the hydraulic capacity to operate as the primary PA, should H-header liquid distribution problems become more limiting. A branch was installed on the main PA line, and routed to a new ring header at the existing nozzle elevation. The ring header design is fed at two locations and allows for continuous flow circulation with the flexibility to block and unblock specific nozzles without creating deadlegs. Globe valves were added to each arm leading off the ring header to provide throttling flow to individual nozzles. Instrumentation was installed to monitor total flow to the lances, along with pressure and temperature at the H-header and at each lance location. PA material, by its heavy nature, has elevated fouling and erosive properties. Accurate, reliable flowmetering is problematic, and sufficient pressure and temperature instrumentation was included in the design to approximate flow as a backup to the flowmeters (Fig. 9. Scrubber primary and secondary The only means to create back pressure and throttle flow on the primary line feeding the H-header was an existing block valve (gate), which has poor control range. A bypass line with a globe valve was installed with a hot tap around the existing gate valve to force liquid to the higher elevation where the ring header was located. Design of the nozzle inserts The lances or nozzle inserts were designed at various lengths, so that each nozzle would be able to target a specific zone of the vessel by dumping liquid onto a particular shed deck in the top row. In this manner, the PA liquid could be applied to the northwest quadrant hot zone to supplement the H-header poor performance. An insertable lance would be installed in each of the six nozzles on the run, avoiding a unit shutdown. The nozzles were cleared of wall coke using a hot-tap machine, and the lances inserted through a packing gland. The nozzles were equipped with a steam purge to be used when oil was not flowing through the lance to reduce fouling conditions. The nozzle insert design was intended to accomplish two key objectives: to allow large droplets of liquid to spray in a contained zone from an elevation of 9 ft, and to allow hydrolancing on the run should they become plugged. Several nozzle designs were bench tested with water to determine the spray profile, all with high line and exit velocities to prevent plugging. The best performing design incorporated attributes for anti-fouling and created a tight cone without generating mist (Fig. 10). 10. Nozzle design iterations. Test No. 1: Rectangular slot at end of capped pipe. The initial flow test showed that the material retained more forward velocity than expected, despite the end plate acting to deflect the liquid downward. The pattern was insufficient to wet sheds directly below the nozzle, making a hollow arc 4°-ft outward and 8°-ft to each side. This design would be ineffective in reaching the known hot zone near the wall when used in the existing nozzles. Test No. 2: Rectangular slot shifting inward from end of capped pipe. The exit point was moved further away from the end cap to create a turbulent chamber above the nozzle that would direct more flow downward. This test nozzle showed a similar hollow arc with an even further forward throw Test No. 3: Internal sleeve. An internal sleeve was fitted into the exit orifice to force the liquid to change direction inside the lance, giving the fluid vertical velocity before it exited the slot. This design showed a more uniform pattern, centered only one foot outward from plumb. Test No. 4: Internal weir and sloped end plate. An internal weir would force the same fluid directional change inside the lance, and would be easier to fabricate. The weir covered the full width of the exit slot to minimize side-throw of the liquid, and the end plate was modified to slope backward. This design showed a wide oval cone, but it greatly reduced the forward throw of material. Test No. 5: Final design. For the final test nozzle, the slots arc was narrowed to shrink the wide oval shape of the bulk flow into a tighter full cone. This design was installed. Commissioning the secondary PA. The six nozzles and corresponding lances (A, B, C, D, E and F) were installed, as shown in Fig. 11. All six lances were inserted and set on steam purge. Oil was commissioned to the lances that most closely targeted the hottest areas identified by the skin temperature scans (nozzles A and F). Once the secondary PA was commissioned, operating data indicated an almost instant improvement, and the charge rate was increased without deterioration in HKGO product quality (Tables 3 and 4). 11. Secondary PA nozzle orientation. The skin temperature survey was repeated to determine the impacts on the hot zone from the secondary PA liquid application. The local temperatures in the northwest quadrant decreased by 30°F50°F. Several optimizations of H-header, startup header and lance nozzles were explored to determine the configuration, resulting in the most even radial skin temperatures and lowest resid entrainment into HKGO product. The test with the H-header and lance nozzles A, F and E in service provided the optimal results (Tables 5 and 6). Half of the PA flow was directed to the H-header, while the other half was directed to the nozzles. Nozzles A and E were throttled to allow the majority of the flow to be directed to Although confirmation of the nature of the maldistribution cannot be made until a future outage, there are several engineering optimizations that should be considered as lessons learned in this example. H-header distributor. The design of the H-header allows for low velocity at the end of the laterals and low exit velocity through the slots furthest from centerline. This is a function of the pipe size and slot area. Redesigning the H-header with eccentric reducers along the length of the laterals will allow velocity to be maintained to minimize fouling. Because this system operates with a low shed weir loading, orifice sizes must be balanced against velocities suitable for fouling protection. De-entrainment grid. There are multiple options for structured grid/packing styles that may balance de-entrainment ability against antifouling characteristics (open area for larger capacity). A limited number of fluidized-bed cokers are operating that set a reference for using an alternate grid type.a There may be opportunity to optimize the bed height and grid type to provide longer cycle lengths with adequate entrained resid removal. Fractionator. While the primary issue caused by resid entrainment is contamination of the HKGO product, any liquid carried by vapor up to the trays from the inlet nozzle is subject to coke formation. These trays are notorious for fouling problems, both with standard coke and with polymeric coke. Providing adequate means to break the inlet momentum can prevent liquid entrainment onto the trays, in addition to optimizing the tray design (or considering alternatives to trays). HP This is an upgraded version of a presentation given at the 2013 AIChE Spring National Meeting, San Antonio, Texas, April a The fluidized coker is the Fluid Coking processed licensed and owned by ExxonMobil Research and b FLEXIGRID is a registered trademark owned by Koch Engineering Co., Inc. 1 Fair, J. R., How to design baffle tray columns, Hydrocarbon Processing, May 1993, 2 Bolles, W. L., Chapter 14, Design of Equilibrium Stage Processes, Ed. B. D. Smith. New York, McGraw-Hill, 1963, p. 498. 3 Kister, H. Z. and M. Olsson, Dont let baffle tray flood baffle you, the AIChE Spring Meeting, Distillation Topical Conference, Chicago, March 2011. Jill Brown Burns is a principal process engineer at Valero Energy Corp. She is involved in troubleshooting, operations, and design of the many columns and crude and vacuum units at the 14 Valero refineries. Her previous experience included positions at Marathon Petroleum and Sulzer Chemtech. Ms. Burns has a BS degree in chemical engineering from the University of Oklahoma. Daryl Hanson is a technology advisor for Valero Energy Corp. and is focused on distillation/fractionation/separation issues. He is responsible for design, troubleshooting, operation issues at the 14 refineries and Valeros ethanol plants. His previous experience included positions at Glitsch, Koch-Glitsch and Process Consulting Services. Mr. Hanson has a BS in chemical engineering from Texas A&M University. Chris Riley is the staff process engineer at Valeros Benicia refinery. He has supported Benicia in various technical and operational roles since hiring on with Valero in 2008. His previous experience included positions at Chevron and Genentech. Mr. Riley has a BS degree in chemical engineering from Brigham Young University. Cameron Wicklow is the process engineering manager at Valeros Benicia refinery. He has supported Benicia in various technical, operational, and planning roles since hiring on with Exxon in 1999. Mr. Wicklow earned his BS degree in chemical engineering from the University of Illinois at Urbana Champaign,
Topical Gel for Wound Management Unveiled Excellagen is a syringe-based topical gel product for the management of diabetic foot ulcers, pressure ulcers, and other dermal wounds. Antimicrobial Hydrogel Launched for Necrotic Wounds Normlgel Ag is an antimicrobial hydrogel said to be effective in assisting the debridement and desloughing process in dry necrotic wounds, while maintaining a moist wound environment for optimal wound healing. New Burn Dressing Introduced AQUACEL Ag BURN dressing is a new wound dressing for the management of partial-thickness burns and donor sites that incorporates its manufacturer’s proprietary hydrofiber technology with ionic silver. Save the Date! Mark your calendars now for the 27th Annual Clinical Symposium on Wound Care, October 20-23, 2012, at Caesar’s Palace in Las Vegas, Nevada. From the pages of Advances in Skin & Wound Care Earn CE/CME credit by reading this peer-reviewed, continuing education article from Advances in Skin & Wound Care and taking the test. Comprehensive Programs for Preventing Pressure Ulcers: A Review of the Literature Andrea Niederhauser, MPH; Carol VanDeusen Lukas, EdD; Victoria Parker DBA; Elizabeth A. Ayello, PhD, RN, ACNS-BC, CWON, MAPWCA, FAAN; Karen Zulkowski, DNS, RN; and Dan Berlowitz MD, MPH
Home School and National History Day: Living the Research By Klye Washut The past year has been quite an experience for me and for my family. From kindergarten through eighth grade I attended a small, parochial school in Casper, Wyoming. But, beginning the school year of 1999-2000, my family made a radical change. My parents concluded that the best thing they could do for their five children would be to school us at home. This was no small undertaking with the youngest member of our family not yet a year old, and me, the oldest, a freshman in high school. This was the beginning of an amazing year. I had participated in National History Day during my seventh and eighth-grade years and choose to do so again in 2000 with my best friend Brandon Halvorsen, who is also a home schooler. My former eighth -grade history teacher, Mrs. Jane Medved, agreed to be our NHD mentor. I live more than twenty miles from Brandon, so that left each of us doing our own research, spending a lot of time on the phone comparing information, and taking copious notes so that one could use this or that resource. After discussing our first round of research, Mrs. Medved convinced us to narrow our topic to the persecution and then legalization of Christianity in the Roman Empire. The NHD research became an integral part of my home schooling. The first year of home schooling is not easy, but I was able to schedule time each week to work on my history project while focusing on my other studies. Then we began to take advantage of the project and tie it in to some of my classes. English now included note taking; literature and philosophy included the ancient Roman and early Christian writers, and in history I could see how my NHD topic was a major turning point that affected other events over the course of time. In civics, Constantine’s declaration of religious freedom, the Edict of Milan, was compared and contrasted with the First Amendment of our own Constitution. Math even came into play in my NHD research, I used algebra to figure out the number of men in a Theban legion. After the research was finished, Brandon, Mrs. Medved, and I met again to discuss how we would present our research. We decided on a performance, thereby requiring even more meetings than before in order to block, memorize cues, etc. Part of my English class was writing the script, then Brandon and Mrs. Medved critiqued it until we finally had something we could work with. We built our set as part of art class, and practiced lines for drama class. All of the hard work paid off, and Brandon and I found ourselves participating in the NHD national contest. We didn’t place, but we had a fabulous time. Our parents used the trip to D.C. as a giant field trip, and we gained tremendously from our experience. Now, after two years participating in NHD, I find that I am comfortable with public speaking. The forensics and debate team at a local high school has welcomed this home schooler as a member, and I am doing well. The effects of our NHD project did not stop there. In August, Brandon and I went with our church group to Rome. In Rome we saw much of what we had researched as it is today. History was alive before me! As I walked along the streets of Rome I realized that history is what we live. And like the Romans before us, our own lives make a history to be explored in the future.
All projects must be approved by the adventure learning program coordinator or a Plymouth State adventure learning instructor, usually via e-mail. A copy of this approval must accompany the project when submitted. If you wish to change the topic, scope, timeline, or any other aspect of the project after approval, you must discuss this change with the instructor before submitting the project. Projects are intended to increase your understanding of the workshop topic beyond that gained from attendance and the initial reflection. The focus of the project must be connected to the content of a specific workshop in a clear and meaningful way. A two-credit guided project is intended to represent approximately 30 hours of individual work beyond the time spent attending the workshop or writing the reflection paper. All projects, regardless of type, must include a brief (1-2 page) cover summary that connects the project to the workshop content. Because the adventure learning program is founded on an experiential pedagogy, all practical projects must include a reflective component as well. Guided projects must accurately represent adventure learning concepts and terminology. Two textbooks that are helpful in nearly all projects: Priest, S. & Gass, M. (2005). Effective Leadership in Adventure Programming, 2nd ed. Champaign, IL: Human Kinetics.J.C. & Priest, S. (1999). Adventure Programming. State College, PA: Venture Publishing. Unless specified otherwise by your instructor, please submit projects to: Plymouth State University College of Graduate Studies ATTN: Adventure Learning Program Registrations 17 High Street, MSC 11 Plymouth NH 03264-1595 If you want to receive your project materials back, be sure to include a self-addressed envelope with required postage. Specific Project Types Below are some suggestions for possible projects, with guidelines for developing your proposal in each area. After you read through the following suggestions, if you have an idea not represented there, discuss it with your Plymouth State instructor. Incorporating adventure learning practices into your teaching is a great way to further your understanding of workshop material, as long as this teaching is combined with careful planning and reflection. Lesson units must account for about 10 hours of instructional time. The level of detail in a unit plan should be sufficient for any trained colleague to implement the plan in your absence. Individual situations will dictate the complete format and content of lessons. However, each lesson plan must include the following: - A description of the student population, which may be provided once for the entire unit - Unique learning objectives specific to the lesson - A categorized list of chosen activities with time estimates for each - Simple instructions for each activity, with recommendations for adapting the challenge level, and a resource reference for further instructions - Age and group appropriate framing and debriefing recommendations that connect each activity with the specific learning objectives - Strategy for assessment of learning For curricular frameworks, please include the following components: - Introductory statements of philosophy, goals, and rationale - Specific connections to national and applicable state standards - Discussion of thematic development through adventure programming - Discussion of the role of processing (i.e., debriefing) in the educational process - Specific strategies for assessment of student learning - Resource list for the development of lessons from the curriculum Informational or Promotional Media Presentations Usually presentations are incorporated into other types of projects, such as in-service training sessions, facilitator training, or Web sites. However, students occasionally develop informative multimedia presentations (e.g., PowerPoint) about adventure learning for school administrators, school boards, parent groups, student groups, or colleagues. For these types of projects, please apply the following guidelines: - Define the audience clearly. - Most presentations will include information about the following categories: - Experiential learning methods - Risk management and safety practices - Safe learning environment and full value contracts - Site-specific information - Incorporate interactive experiences that engage members of the audience during the presentation (e.g., conduct an icebreaker or simple initiative, or teach a simple knot used on your course). - The presentation must do more than restate the workshop content. Additional information and research beyond that gained from your workshop must be included. - Presentations must accurately represent adventure learning principles and terminology. - Incorporate into your executive summary a brief reflection on the presentation and its reception by the audience. - Please submit your presentation on a CD, rather than in printed slide format. - For students enrolled in the adventure learning graduate programs, only one guided project included in the program of study can be a media presentation. In-Service Trainings for Colleagues, Peers, or Conference Attendees Sharing your new knowledge and skills with colleagues and peers is a great way to grow your program, increase the capacity of your staff and increase the impact of adventure learning practices. After approval, this type of project will have three phases. First, you’ll submit a complete presentation plan to the PSU instructor for critique and suggestions. Second, you’ll implement the presentation. Finally, you’ll submit a brief (2-3 pages) summary and reflection on the experience of the presentation, the response of the participants, and if known, any impacts observed from the training. - A fully developed presentation plan, similar to a lesson plan - Clearly defined, specific objectives for the session - A blend of theory and practice appropriate to adult professionals - Accurate representation of adventure learning concepts and terminology is paramount - The presentation must do more than restate the workshop content. Additional information and research beyond that gained from your workshop must be included Facilitator Training Manuals and Processing Resources Developing text resources and other tools for program facilitators or staff is an excellent way to share the knowledge that you gained in a workshop, and multiply the benefits for your program. The best training or resource manuals will: - Be accurate - Present a mix of foundational theory and practical methods and activities - Use illustrations, photographs, and other non-text methods where appropriate - Suggest references for further reading and research In addition to manuals or written guides, developing processing tools for yourself or your facilitators is a good way to put into practice your understanding of the role of processing in the adventure learning process. If you wish to propose a project that involves the development of processing tools, please keep in mind the following guidelines: - The tool kit must be accompanied by a paper that explains the use of each tool, with reference to the theoretical model(s) (e.g., Generations of Facilitation, Processing Continuum) that underlie their use. - Represent a range of processing methods, from facilitator-centered to student-centered approaches - Be constructed in a professional and physically durable way - Newly developed tools may not simply mimic those that are already commercially available. It’s usually an acceptable project, however, to assemble a complete kit from commercial products if you develop an accompanying resource manual, as described above. Case Studies and Program Profiles Exploring other programs and their practices with an inquisitive and critical eye is a great way to develop ideas about your own program, and to understand the diversity in the field of adventure programming. These informal case studies or comparative analyses can also help you develop support for your own program or clarify ideas for your capstone project. - Before you start, develop a question or set of questions that will guide your inquiry, perhaps focusing on philosophy, cost, curriculum, physical plant design, or some combination of these topics. - Include three or more programs that are well-established models in your region or your field of practice. - Include interviews with program directors or other senior staff from each program. - Include an analysis of resources such as staff manuals, Web sites, program promotional information, and other literature. - When a program is local to you include a site visit. Often students are intrigued by a topic or concept included in the workshop, or they’re left with some unanswered questions. Other students want to find the most current work that provides evidence-based support for adventure programming and its outcomes. For these situations, a literature review is an excellent choice for a project. Here are some guidelines for literature reviews. - It is important to define a question of narrow enough scope so that you are able to accomplish a thorough review. - There are no numerical requirements for numbers of sources, however there should be enough of a convergence of quantity and quality so that you have achieved a genuine mastery of the topic. - Most of the sources should be from professional journals, recent major texts and other authoritative sources. If you include Web sites in your resources, they should be a small percentage of the total number, and you should explain why you think they are trustworthy. - Your paper should synthesize the resources that you find, organizing them, discussing connections between them, and putting them in context of the workshop material. It can’t be simply a summary of what you have found. - Use APA formatting for your paper. A number of style guides are available on the Lamson Library Web site. - Journal articles in the adventure education field are somewhat decentralized. The primary journal in the U.S. is the Journal of Experiential Education though there are several others. You can access these journals, free and online, through Lamson Library. Facility Design and Construction Projects Developing the physical infrastructure on which your program depends can be an excellent way to enhance your organization’s programming effectiveness. Keep in mind that a complete high and low element course design is often a more extensive project than required for a two-credit guided project. Please be sure to include these components in your project: - Discussion of primary uses and audience for this facility - Specific references for element design choices - Complete list of materials with costs - Labor plan, with either a discussion of choice of vendors, or, for self-built facilities, discussion of builder qualifications - Discussion of possible or intended funding costs - Time frame to implementation Risk and Safety-Related Projects This category of guided project includes the development of Local Operating Procedure (LOP) manuals, Emergency Action Plans and other similar safety-related resources. All documents of this sort have the potential to be used in litigation. Therefore, a key concept in this type of project is to base your own program’s choices on the practices of other highly respected organizations, and on the practices recommended by accrediting bodies such as the Association for Experiential Education (AEE) and the Association for Challenge Course Technology (ACCT). A true LOP manual will include at least the following: - Required, recommended, and optional practices for each initiative, low element, and high element in your program repertoire, including any site-specific practices unique to your program - Set-up, take-down, and storage instructions for elements and other equipment - A single photo or drawing of the element to ensure that facilitators correctly connect the LOP with the element–names are often confusing - Instructions on what to do if an element is suspected of being unsafe - Required qualifications, trainings, and proficiency assessments for facilitators - Instructions for any ongoing safety practices, such as rope usage logs and near miss reports - Diverse references (e.g., standards promulgated by accrediting bodies, practices, and policies manuals from well-established or accredited organizations) that support your organization’s practices Grant proposals are an excellent way to support your program’s infrastructure development or staff capacity. Grant proposals are often a much larger project than that intended for a two-credit guided project (e.g., Carol White PEP grant). However, if that is the case, your guided project may be used to develop contributing materials that will support the grant. The grant or the supporting materials should adhere to the following guidelines: - Must be targeted toward the development of adventure learning programming - Must contain specific content about rationale, benefits, or outcomes of adventure learning Exploratory Research Projects In some cases students choose to develop on-site research projects, such as comparing outcomes between adventure-based and traditional classes. These projects are a great way to integrate the learning from your research design class with the learning from your workshops. They also provide opportunities to develop some supportive evidence for your program. In addition to the general guidelines for all projects, please apply the following guidelines to these research projects: - When working with numbers, look for opportunities to apply simple useful statistical analyses to your results - A discussion of your findings or results should include some citations about comparable topics Web site projects are usually a combination of other types of projects. The content of the intended Web site can be defined in discussion with your PSU instructor. Web sites are expected to be available on the Web before the project is considered complete.
US 7519640 B1 In a garbage collector that employs the train algorithm, some objects in the collection set are evacuated from the collection set, even though they are referred to only by weak references, in order to keep the data that they contain available for post-mortem processing. The destinations to which at least some such objects are evacuated are chosen independently of where the weak references to them are located. 1. A computer system including memory, a mutator and a garbage collector, wherein the garbage collector treats a generation of a heap in the memory as divided into a plurality of car sections grouped into a plurality of trains each ordered in a collection order and configured to collect in collection increments respective collection sets of those car sections in accordance with a train algorithm, wherein the computer system is configured to implement a method wherein, in a collection increment of the collection increments: the garbage collector evacuates a first object from a respective collection set in response to the existence of a weak reference associated with the first object, wherein an object associated solely with a weak reference is evacuated from the respective collection set, prior to reclamation of the respective collection set, based upon a determination that a predetermined amount of unused space is remaining in the heap, and wherein the weak reference is denoted by placement of the weak reference in a second object defined by the mutator as belonging to a predetermined class associated with weak references; the garbage collector selects one of the plurality of trains into which the first object is evacuated from the respective collection set in response to determining the existence of a reference to the object located in the generation, wherein the one of the plurality of trains is selected independently of the reference's location when the reference corresponds solely to a weak reference; and the garbage collector thereafter reclaims the respective collection set as allocatable memory. 2. The computer system of 3. The computer system of 4. The computer system of 5. The computer system of 6. A storage medium containing instructions readable by a computer system including memory to configure the computer system to implement a mutator and a garbage collector wherein the garbage collector treats a generation of a heap in the memory as divided into a plurality of car sections grouped into a plurality of trains each ordered in a collection order and configured to collect in collection increments respective collection sets of those car sections in accordance with a train algorithm, wherein, a collection increment of the collection increments: the garbage collector evacuates a first object from a respective collection set in response to the existence of a weak reference associated with the first object, wherein an object associated solely with a weak reference is evacuated from the respective collection set, prior to reclamation of the respective collection set, based upon a determination that a predetermined amount of unused space is remaining in the heap, and wherein the weak reference is denoted by placement of the weak reference in a second object defined by the mutator as belonging to a predetermined class associated with weak references; the garbage collector selects one of the plurality of trains into which the first object is evacuated from the respective collection set in response to determining the existence of a reference to the object located in the generation, wherein the one of the plurality of trains is selected independently of the reference's location when the reference corresponds solely to a weak reference; and the garbage collector thereafter reclaims the respective collection set as allocatable. 7. The storage medium of 8. The storage medium as defined in 9. The storage medium as defined in 10. The storage medium as defined in 11. A computer system comprising: a hardware processor; first means for treating a generation of a heap in a memory, wherein the memory is divided into a plurality of car sections and grouped into a plurality of trains ordered in a collection order; and second means for collecting in collection increments respective collection sets of those car sections in accordance with a train algorithm by: evacuating a first object from a respective collection set in response to the existence of a weak reference associated with the first object, wherein an object associated solely with a weak reference is evacuated from the respective collection set, prior to reclamation of the respective collection set, based upon a determination that a predetermined amount of unused space is remaining in the heap, wherein the weak reference is denoted by placement of the weak reference in a second object defined by a mutator as belonging to a predetermined class associated with weak references; selecting one of the plurality of trains into which the first object is evacuated from the respective collection set in response to determining the existence of a reference to the object located in the generation, wherein the one of the plurality of trains is selected independently of the reference's location when the reference corresponds solely to a weak reference; and thereafter reclaiming the collection set as allocatable memory, wherein the mutator performs an application program function using the allocatable memory, wherein the mutator is separate from the garbage collector in the computer system, and wherein a portion of the first means and the second means executes on the hardware processor. 1. Field of the Invention The present invention is directed to memory management. It particularly concerns what has come to be known as “garbage collection.” 2. Background Information In the field of computer systems, considerable effort has been expended on the task of allocating memory to data objects. For the purposes of this discussion, the term object refers to a data structure represented in a computer system's memory. Other terms sometimes used for the same concept are record and structure. An object may be identified by a reference, a relatively small amount of information that can be used to access the object. A reference can be represented as a “pointer” or a “machine address,” which may require, for instance, only sixteen, thirty-two, or sixty-four bits of information, although there are other ways to represent a reference. In some systems, which are usually known as “object oriented,” objects may have associated methods, which are routines that can be invoked by reference to the object. They also may belong to a class, which is an organizational entity that may contain method code or other information shared by all objects belonging to that class. In the discussion that follows, though, the term object will not be limited to such structures; it will additionally include structures with which methods and classes are not associated. The invention to be described below is applicable to systems that allocate memory to objects dynamically. Not all systems employ dynamic allocation. In some computer languages, source programs must be so written that all objects to which the program's variables refer are bound to storage locations at compile time. This storage-allocation approach, sometimes referred to as “static allocation,” is the policy traditionally used by the Fortran programming language, for example. Even for compilers that are thought of as allocating objects only statically, of course, there is often a certain level of abstraction to this binding of objects to storage locations. Consider the typical computer system 10 depicted in Additionally, the actual physical operations performed to access some of the most-recently visited parts of the process's address space often will actually be performed in the cache 12 or in a cache on board microprocessor 11 rather than on the RAM 14, with which those caches swap data and instructions just as RAM 14 and system disk 17 do with each other. A further level of abstraction results from the fact that an application will often be run as one of many processes operating concurrently with the support of an underlying operating system. As part of that system's memory management, the application's memory space may be moved among different actual physical locations many times in order to allow different processes to employ shared physical memory devices. That is, the location specified in the application's machine code may actually result in different physical locations at different times because the operating system adds different offsets to the machine-language-specified location. Despite these expedients, the use of static memory allocation in writing certain long-lived applications makes it difficult to restrict storage requirements to the available memory space. Abiding by space limitations is easier when the platform provides for dynamic memory allocation, i.e., when memory space to be allocated to a given object is determined only at run time. Dynamic allocation has a number of advantages, among which is that the run-time system is able to adapt allocation to run-time conditions. For example, the programmer can specify that space should be allocated for a given object only in response to a particular run-time condition. The C-language library function malloc( ) is often used for this purpose. Conversely, the programmer can specify conditions under which memory previously allocated to a given object can be reclaimed for reuse. The C-language library function free( ) results in such memory reclamation. Because dynamic allocation provides for memory reuse, it facilitates generation of large or long-lived applications, which over the course of their lifetimes may employ objects whose total memory requirements would greatly exceed the available memory resources if they were bound to memory locations statically. Particularly for long-lived applications, though, allocation and reclamation of dynamic memory must be performed carefully. If the application fails to reclaim unused memory—or, worse, loses track of the address of a dynamically allocated segment of memory—its memory requirements will grow over time to exceed the system's available memory. This kind of error is known as a “memory leak.” Another kind of error occurs when an application reclaims memory for reuse even though it still maintains a reference to that memory. If the reclaimed memory is reallocated for a different purpose, the application may inadvertently manipulate the same memory in multiple inconsistent ways. This kind of error is known as a “dangling reference,” because an application should not retain a reference to a memory location once that location is reclaimed. Explicit dynamic-memory management by using interfaces like malloc( )/free( ) often leads to these problems. A way of reducing the likelihood of such leaks and related errors is to provide memory-space reclamation in a more-automatic manner. Techniques used by systems that reclaim memory space automatically are commonly referred to as “garbage collection.” Garbage collectors operate by reclaiming space that they no longer consider “reachable.” Statically allocated objects represented by a program's global variables are normally considered reachable throughout a program's life. Such objects are not ordinarily stored in the garbage collector's managed memory space, but they may contain references to dynamically allocated objects that are, and such objects are considered reachable. Clearly, an object referred to in the processor's call stack is reachable, as is an object referred to by register contents. And an object referred to by any reachable object is also reachable. The use of garbage collectors is advantageous because, whereas a programmer working on a particular sequence of code can perform his task creditably in most respects with only local knowledge of the application at any given time, memory allocation and reclamation require a global knowledge of the program. Specifically, a programmer dealing with a given sequence of code does tend to know whether some portion of memory is still in use for that sequence of code, but it is considerably more difficult for him to know what the rest of the application is doing with that memory. By tracing references from some conservative notion of a “root set,” e.g., global variables, registers, and the call stack, automatic garbage collectors obtain global knowledge in a methodical way. By using a garbage collector, the programmer is relieved of the need to worry about the application's global state and can concentrate on local-state issues, which are more manageable. The result is applications that are more robust, having no dangling references and fewer memory leaks. Garbage-collection mechanisms can be implemented by various parts and levels of a computing system. One approach is simply to provide them as part of a batch compiler's output. Consider FIG. 2's simple batch-compiler operation, for example. A computer system executes in accordance with compiler object code and therefore acts as a compiler 20. The compiler object code is typically stored on a medium such as FIG. 1's system disk 17 or some other machine-readable medium, and it is loaded into RAM 14 to configure the computer system to act as a compiler. In some cases, though, the compiler object code's persistent storage may instead be provided in a server system remote from the machine that performs the compiling. The input to the compiler is the application source code, and the end product of the compiler process is application object code. This object code defines an application 21, which typically operates on input such as mouse clicks, etc., to generate a display or some other type of output. This object code implements the relationship that the programmer intends to specify by his application source code. In one approach to garbage collection, the compiler 20, without the programmer's explicit direction, additionally generates code that automatically reclaims unreachable memory space. Even in this simple case, though, there is a sense in which the application does not itself provide the entire garbage collector. Specifically, the application will typically call upon the underlying operating system's memory-allocation functions. And the operating system may in turn take advantage of various hardware that lends itself particularly to use in garbage collection. So even a very simple system may disperse the garbage-collection mechanism over a number of computer-system layers. To get some sense of the variety of system components that can be used to implement garbage collection, consider FIG. 3's example of a more complex way in which various levels of source code can result in the machine instructions that a processor executes. In the Most typically, the class files' byte-code routines are executed by a processor under control of a virtual-machine process 27. That process emulates a virtual machine from whose instruction set the byte codes are drawn. As is true of the compiler 23, the virtual-machine process 27 may be specified by code stored on a local disk or some other machine-readable medium from which it is read into FIG. 1's RAM 14 to configure the computer system to implement the garbage collector and otherwise act as a virtual machine. Again, though, that code's persistent storage may instead be provided by a server system remote from the processor that implements the virtual machine, in which case the code would be transmitted electrically or optically to the virtual-machine-implementing processor. In some implementations, much of the virtual machine's action in executing these byte codes is most like what those skilled in the art refer to as “interpreting,” so Now, some of the functionality that source-language constructs specify can be quite complicated, requiring many machine-language instructions for their implementation. One quite-common example is a source-language instruction that calls for 64-bit arithmetic on a 32-bit machine. More germane to the present invention is the operation of dynamically allocating space to a new object; the allocation of such objects must be mediated by the garbage collector. In such situations, the compiler may produce “inline” code to accomplish these operations. That is, all object-code instructions for carrying out a given source-code-prescribed operation will be repeated each time the source code calls for the operation. But inlining runs the risk that “code bloat” will result if the operation is invoked at many source-code locations. The natural way of avoiding this result is instead to provide the operation's implementation as a procedure, i.e., a single code sequence that can be called from any location in the program. In the case of compilers, a collection of procedures for implementing many types of source-code-specified operations is called a runtime system for the language. The execution engines and the runtime system of a virtual machine are designed together so that the engines “know” what runtime-system procedures are available in the virtual machine (and on the target system if that system provides facilities that are directly usable by an executing virtual-machine program.) So, for example, the just-in-time compiler 29 may generate native code that includes calls to memory-allocation procedures provided by the virtual machine's runtime system. These allocation routines may in turn invoke garbage-collection routines of the runtime system when there is not enough memory available to satisfy an allocation. To represent this fact, The arrangement of The invention to be described below is applicable independently of whether a batch compiler, a just-in-time compiler, an interpreter, or some hybrid is employed to process source code. In the remainder of this application, therefore, we will use the term compiler to refer to any such mechanism, even if it is what would more typically be called an interpreter. In short, garbage collectors can be implemented in a wide range of combinations of hardware and/or software. As is true of most of the garbage-collection techniques described in the literature, the invention to be described below is applicable to most such systems. By implementing garbage collection, a computer system can greatly reduce the occurrence of memory leaks and other software deficiencies in which human programming frequently results. But it can also have significant adverse performance effects if it is not implemented carefully. To distinguish the part of the program that does “useful” work from that which does the garbage collection, the term mutator is sometimes used in discussions of these effects; from the collector's point of view, what the mutator does is mutate active data structures' connectivity. Some garbage-collection approaches rely heavily on interleaving garbage-collection steps among mutator steps. In one type of garbage-collection approach, for instance, the mutator operation of writing a reference is followed immediately by garbage-collector steps used to maintain a reference count in that object's header, and code for subsequent new-object storage includes steps for finding space occupied by objects whose reference count has fallen to zero. Obviously, such an approach can slow mutator operation significantly. Other approaches therefore interleave very few garbage-collector-related instructions into the main mutator process but instead interrupt it from time to time to perform garbage-collection cycles, in which the garbage collector finds unreachable objects and reclaims their memory space for reuse. Such an approach will be assumed in discussing FIG. 4's depiction of a simple garbage-collection operation. Within the memory space allocated to a given application is a part 40 managed by automatic garbage collection. In the following discussion, this will be referred to as the “heap,” although in other contexts that term refers to all dynamically allocated memory. During the course of the application's execution, space is allocated for various objects 42, 44, 46, 48, and 50. Typically, the mutator allocates space within the heap by invoking the garbage collector, which at some level manages access to the heap. Basically, the mutator asks the garbage collector for a pointer to a heap region where it can safely place the object's data. The garbage collector keeps track of the fact that the thus-allocated region is occupied. It will refrain from allocating that region in response to any other request until it determines that the mutator no longer needs the region allocated to that object. Garbage collectors vary as to which objects they consider reachable and unreachable. For the present discussion, though, an object will be considered “reachable” if it is referred to, as object 42 is, by a reference in the root set 52. The root set consists of reference values stored in the mutator's threads' call stacks, the CPU registers, and global variables outside the garbage-collected heap. An object is also reachable if it is referred to, as object 46 is, by another reachable object (in this case, object 42). Objects that are not reachable can no longer affect the program, so it is safe to re-allocate the memory spaces that they occupy. A typical approach to garbage collection is therefore to identify all reachable objects and reclaim any previously allocated memory that the reachable objects do not occupy. A typical garbage collector may identify reachable objects by tracing references from the root set 52. For the sake of simplicity, To avoid excessive heap fragmentation, some garbage collectors additionally relocate reachable objects. Although this relocation requires the extra steps of copying the reachable objects and updating references to them, it tends to be quite efficient, since most new objects quickly become unreachable, so most of the current semi-space is actually garbage. That is, only a relatively few, reachable objects need to be relocated, after which the entire semi-space contains only garbage and can be pronounced free for reallocation. Now, a collection cycle can involve following all reference chains from the basic root set—i.e., from inherently reachable locations such as the call stacks, class statics and other global variables, and registers—and reclaiming all space occupied by objects not encountered in the process. And the simplest way of performing such a cycle is to interrupt the mutator to provide a collector interval in which the entire cycle is performed before the mutator resumes. For certain types of applications, this approach to collection-cycle scheduling is acceptable and, in fact, highly efficient. For many interactive and real-time applications, though, this approach is not acceptable. The delay in mutator operation that the collection cycle's execution causes can be annoying to a user and can prevent a real-time application from responding to its environment with the required speed. In some applications, choosing collection times opportunistically can reduce this effect. Collection intervals can be inserted when an interactive mutator reaches a point at which it awaits user input, for instance. So it may often be true that the garbage-collection operation's effect on performance can depend less on the total collection time than on when collections actually occur. But another factor that often is even more determinative is the duration of any single collection interval, i.e., how long the mutator must remain quiescent at any one time. In an interactive system, for instance, a user may never notice hundred-millisecond interruptions for garbage collection, whereas most users would find interruptions lasting for two seconds to be annoying. The cycle may therefore be divided up among a plurality of collector intervals. When a collection cycle is divided up among a plurality of collection intervals, it is only after a number of intervals that the collector will have followed all reference chains and be able to identify as garbage any objects not thereby reached. This approach is more complex than completing the cycle in a single collection interval; the mutator will usually modify references between collection intervals, so the collector must repeatedly update its view of the reference graph in the midst of the collection cycle. To make such updates practical, the mutator must communicate with the collector to let it know what reference changes are made between intervals. An even more complex approach, which some systems use to eliminate discrete pauses or maximize resource-use efficiency, is to execute the mutator and collector in concurrent execution threads. Most systems that use this approach use it for most but not all of the collection cycle; the mutator is usually interrupted for a short collector interval, in which a part of the collector cycle takes place without mutation. Independent of whether the collection cycle is performed concurrently with mutator operation, is completed in a single interval, or extends over multiple intervals is the question of whether the cycle is complete, as has tacitly been assumed so far, or is instead “space-incremental.” In space-incremental collection, a collection cycle constitutes only an increment of collection: the collector does not follow all reference chains from the basic root set completely. Instead, it concentrates on only a portion, or collection set, of the heap. Specifically, it identifies every collection-set object referred to by a reference chain that extends into the collection set from outside of it, and it reclaims the collection-set space not occupied by such objects, possibly after evacuating such objects so that the collection-set space they previously occupied can be reclaimed with the space that recognizedly unreachable objects occupy. By thus culling objects referenced by reference chains that do not necessarily originate in the basic root set, the collector can be thought of as expanding the root set to include as roots some locations that may not be reachable. Although space-incremental collection thereby leaves “floating garbage,” it can result in relatively low pause times even if entire collection increments are completed during respective single collection intervals. Most collectors that employ space-incremental collection operate in “generations” although this is not necessary in principle. Different portions, or generations, of the heap are subject to different collection policies. New objects are allocated in a “young” generation, and young-generation objects that have remained reachable are eventually “promoted” from younger generations to older or more “mature” generations. Collecting the younger generations more frequently than the others yields greater efficiency because the younger generations tend to accumulate garbage faster; newly allocated objects tend to “die,” while older objects tend to “survive.” But generational collection greatly increases what is effectively the root set for a given generation. Consider One could perform this tracing by simply inspecting all references in all other generations at the beginning of every collection interval, and it turns out that this approach is actually feasible in some situations. But it takes too long in other situations, so workers in this field have employed a number of approaches to expediting reference tracing. One approach is to include so-called write barriers in the mutator process. A write barrier is code added to a write operation to record information from which the collector can determine where references were written or may have been since the last collection interval. A reference list can then be maintained by taking such a list as it existed at the end of the previous collection interval and updating it by inspecting only locations identified by the write barrier as possibly modified since the last collection interval. One of the many write-barrier implementations commonly used by workers in this art employs what has been referred to as the “card table.” Of course, there are other write-barrier approaches, such as simply having the write barrier add to a list of addresses where references where written. Also, although there is no reason in principle to favor any particular number of generations, and, although Some collectors collect the entire young generation in every interval and may thereafter perform mature-generation collection in the same interval. It may therefore take relatively little time to scan all young-generation objects remaining after young-generation collection to find references into the mature generation. Even when such collectors do use card tables, therefore, they often do not use them for finding young-generation references that refer to mature-generation objects. On the other hand, laboriously scanning the entire mature generation for references to young-generation (or mature-generation) objects would ordinarily take too long, so the collector uses the card table to limit the amount of memory it searches for mature-generation references. Now, although it typically takes very little time to collect the young generation, it may take more time than is acceptable within a single garbage-collection interval to collect the entire mature generation. So some garbage collectors may collect the mature generation space-incrementally; that is, they may perform only a part of the mature generation's collection during any particular collection cycle. Space-incremental collection presents the problem that, since the generation's unreachable objects outside the “collection set” of objects processed during that cycle cannot be recognized as unreachable, collection-set objects to which they refer tend not to be, either. There are many way to reduce the adverse effect this would otherwise have on collection efficiency. For example, commonly assigned copending U.S. patent application Ser. No. 10/799,049, which was filed on Mar. 12, 2004, by Detlefs et al. for Garbage-First Garbage Collection, describes an approach in which the results of a heap-wide marking performed largely concurrently with mutator operation are used to help identify as unreachable some objects that, since they are referred to from outside the collection set, would otherwise be considered potentially reachable. For the sake of example, though, we will consider in some detail another approach. The discussion that follows will occasionally employ the nomenclature in the literature by using the term car instead of car section. But the literature seems to use that term to refer variously not only to memory sections themselves but also to data structures that the train algorithm employs to manage them when they contain objects, as well as to the more-abstract concept that the car section and managing data structure represent in discussions of the algorithm. So the following discussion will more frequently use the expression car section to emphasize the actual sections of memory space for whose management the car concept is employed. For reasons that will become apparent in due course, the train algorithm groups car sections into “trains,” which are ordered, conventionally according to age. For example, Conventionally, the car collected in an increment is the one added earliest to the oldest train, which in this case is car 75. All of the generation's cars can thus be thought of as waiting for collection in a single long line, in which cars are ordered in accordance with the order of the trains to which they belong and, within trains, in accordance with the order in which they were added to those trains. As is usual, the way in which reachable objects are identified is to determine whether there are references to them in the root set or in any other object already determined to be reachable. In accordance with the train algorithm, the collector additionally performs a test to determine whether there are any references at all from outside the oldest train to objects within it. If there are not, then all cars within the train can be reclaimed, even though not all of those cars are in the collection set. This tends to reduce the amount of floating garbage because, as will now be explained, the train algorithm so operates that inter-car references tend to be grouped into trains. The train algorithm is like some other approaches to space-incremental collection in that its implementations typically employ “remembered sets” to identify references into the car from outside of it. As card tables do, remembered sets keep track of references. Whereas a card-table entry contains information about references that the associated card contains, though, a remembered set associated with a given region contains information about references into that region from locations outside of it. In the case of the train algorithm, remembered sets are associated with car sections. Each remembered set, such as car 75's remembered set 90, lists locations in the generation that contain references into the associated car section. The remembered sets for all of a generation's cars are typically updated at the start of each collection interval. To illustrate how such updating and other collection operations may be carried out, Block 102 represents a period of the mutator's operation. As was explained above, the mutator makes a card-table entry to identify any card that it has “dirtied” by adding or modifying a reference that the card contains. At some point, the mutator will be interrupted for collector operation. Different implementations employ different events to trigger such an interruption, but we will assume for the sake of concreteness that the system's dynamic-allocation routine causes such interruptions when no room is left in the young generation for any further allocation. A dashed line 103 represents the transition from mutator operation and collector operation. In the system assumed for the When the collector's interval first starts, it first processes the card table, in an operation that block 104 represents. As was mentioned above, the collector scans the “dirtied” cards for references into the young generation. If a reference is found, that fact is memorialized appropriately. If the reference refers to a young-generation object, for example, an expanded card table may be used for this purpose. For each card, such an expanded card table might include a multi-byte array used to summarize the card's reference contents. The summary may, for instance, be a list of offsets that indicate the exact locations within the card of references to young-generation objects, or it may be a list of fine-granularity “sub-cards” within which references to young-generation objects may be found. If the reference refers to an old-generation object, the collector often adds an entry to the remembered set associated with the car containing that old-generation object. The entry identifies the reference's location, or at least a small region in which the reference can be found. For reasons that will become apparent, though, the collector will typically not bother to place in the remembered set the locations of references from objects in car sections farther forward in the collection queue than the referred-to object, i.e., from objects in older trains or in cars added earlier to the same train. The collector then collects the young generation, as block 105 indicates. (Actually, young-generation collection may be interleaved with the dirty-region scanning, but the drawing illustrates it for purpose of explanation as being separate.) If a young-generation object is referred to by a reference that card-table scanning has revealed, that object is considered to be potentially reachable, as is any young-generation object referred to by a reference in the root set or in another reachable young-generation object. The space occupied by any young-generation object thus considered reachable is withheld from reclamation. For example, it may be evacuated to a young-generation semi-space that will be used for allocation during the next mutator interval. It may instead be promoted into the older generation, where it is placed into a car containing a reference to it or into a car in the last train. Or some other technique may be used to keep the memory space it occupies off the system's free list. The collector then reclaims any young-generation space occupied by any other objects, i.e., by any young-generation objects not identified as transitively reachable through references located outside the young generation. The collector then performs the train algorithm's central test, referred to above, of determining whether there are any references into the oldest train from outside of it. As was mentioned above, the actual process of determining, for each object, whether it can be identified as unreachable is performed for only a single car section in any cycle. In the absence of features such as those provided by the train algorithm, this would present a problem, because garbage structures may be larger than a car section. Objects in such structures would therefore (erroneously) appear reachable, since they are referred to from outside the car section under consideration. But the train algorithm additionally keeps track of whether there are any references into a given car from outside the train to which it belongs, and trains' sizes are not limited. As will be apparent presently, objects not found to be unreachable are relocated in such a way that garbage structures tend to be gathered into respective trains into which, eventually, no references from outside the train point. If no references from outside the train point to any objects inside the train, the train can be recognized as containing only garbage. This is the test that block 106 represents. All space occupied by cars belonging to a train thus identified as containing only garbage can be reclaimed. The question of whether old-generation references point into the train from outside of it is (conservatively) answered in the course of updating remembered sets; in the course of updating a car's remembered set, it is a simple matter to flag the car as being referred to from outside the train. The step-106 test additionally involves determining whether any references from outside the old generation point into the oldest train. Various approaches to making this determination have been suggested, including the conceptually simple approach of merely following all reference chains from the root set until those chains (1) terminate, (2) reach an old-generation object outside the oldest train, or (3) reach an object in the oldest train. In the two-generation example, most of this work can be done readily by identifying references into the collection set from reachable young-generation objects during the young-generation collection. If one or more such chains reach the oldest train, that train includes reachable objects. It may also include reachable objects if the remembered-set-update operation has found one or more references into the oldest train from outside of it. Otherwise, that train contains only garbage, and the collector reclaims all of its car sections for reuse, as block 107 indicates. The collector may then return control to the mutator, which resumes execution, as FIG. 8B's block 108 indicates. If the train contains reachable objects, on the other hand, the collector turns to evacuating potentially reachable objects from the collection set. The first operation, which block 110 represents, is to remove from the collection set any object that is reachable from the root set by way of a reference chain that does not pass through the part of the old generation that is outside of the collection set. In the illustrated arrangement, in which there are only two generations, and the young generation has previously been completely collected during the same interval, this means evacuating from a collection set any object that (1) is directly referred to by a reference in the root set, (2) is directly referred to by a reference in the young generation (in which no remaining objects have been found unreachable), or (3) is referred to by any reference in an object thereby evacuated. All of the objects thus evacuated are placed in cars in the youngest train, which was newly created during the collection cycle. Certain of the mechanics involved in the evacuation process are described in more detail in connection with similar evacuation performed, as blocks 112 and 114 indicate, in response to remembered-set entries. For each one of the evacuated object's references, the collector checks to see whether the location that it refers to is in the collection set. As blocks 134 and 16 indicate, the reference processing continues until all references in the evacuated object have been processed. In the meantime, if a reference refers to a collection-set location that contains an object not yet evacuated, the collector evacuates the referred-to object to the train to which the evacuated object containing the reference was evacuated, as blocks 138 and 140 indicate. If the reference refers to a location in the collection set from which the object has already been evacuated, then the collector uses the forwarding pointer left in that location to update the reference, as block 142 indicates. Before the processing of Now, some train-algorithm implementations postpone processing of the references contained in evacuated collection-set objects until after all directly reachable collection-set objects have been evacuated. In the implementation that As FIG. 8's blocks 112 and 114 indicate, this processing of collection-set remembered sets is performed initially only for entries that do not refer to locations in the oldest train. Those that do are processed only after all others have been, as blocks 152 and 154 indicate. When this process has been completed, the collection set's memory space can be reclaimed, as block 164 indicates, since no remaining object is referred to from outside the collection set: any remaining collection-set object is unreachable. The collector then relinquishes control to the mutator. Processing always starts with the oldest train's earliest-added car, so the garbage collector refers to car 1.1's remembered set and finds that there is a reference from object L into the car being processed. It accordingly evacuates object A to the train that object L occupies. The object being evacuated is often placed in one of the selected train's existing cars, but we will assume for present purposes that there is not enough room. So the garbage collector evacuates object A into a new car section and updates appropriate data structures to identify it as the next car in the third train. Since car 1.1 no longer contains live objects, it can be reclaimed, as The next step is to process the next car, the one whose index is 1.2. Conventionally, this would not occur until some collection cycle after the one during which car 1.1 is collected. For the sake of simplicity we will assume that the mutator has not changed any references into the generation in the interim. In the state that The collector accordingly processes car 2.1 during the next collection cycle, and that car's remembered set indicates that there are two references outside the car that refer to objects within it. Those references are in object K, which is in the same train, and object A, which is not. Inspection of those references reveals that they refer to objects I and J, which are evacuated. The result, depicted in So car 3.1 is processed next. Its sole object, object L, is referred to inter-generationally as well as by a reference in the fourth train's object M. As The next car to be processed is car 3.2, whose remembered set includes the addresses of references into it from objects B and L. Inspection of the reference from object B reveals that it refers to object A, which must therefore be evacuated to the fifth train before car 3.2 can be reclaimed. Also, we assume that object A cannot fit in car section 5.1, so a new car 5.2 is added to that train, as A further observation needs to be made before we leave In the state that In that state, only inter-generational references refer to objects in the next car to be processed. So, although its referred-to objects must therefore be evacuated from the train, they cannot be placed into trains that contain references to them. Conventionally, such objects are evacuated to a train at the end of the train sequence. In the illustrated implementation, a new train is formed for this purpose, so the result of car 4.2's processing is the state that Processing continues in this same fashion. Of course, subsequent collection cycles will not in general proceed, as in the illustrated cycles, without any reference changes by the mutator and without any addition of further objects. But reflection reveals that the general approach just described still applies when such mutations occur. The discussion so far has been somewhat simplified in that it has treated all references as the same. In fact, though, many garbage collectors are arranged to treat some references as weak: they sometimes collect memory space occupied by objects reached only through reference chains include such references. Since the browser may cause the virtual machine to execute the paint( ) method many times during the course of the applet's display, performing this I/O operation in each call of the paint( ) method can be expensive. Rather than place the reference to the Image object in local variable im, which goes out of scope (and thus leaves the root set) when the paint( ) method returns, therefore, one might be inclined to store the reference to that Image object in a variable that remains in scope between paint-method calls. But Image objects tend to be large, a web page may have many applets, and many applets may have many images. So keeping such Image objects loaded may place excessive pressure on heap space. It is therefore desirable to allow the garbage collector to reclaim the image's space if necessary between paint-method calls. This is why the program is so written that the Image object is no longer reachable through the im reference when paint( ) returns. Still, thus reclaiming the object's space imposes a performance penalty: an I/O operation will need to be performed when the paint( ) method is next called. To avoid such a penalty when heap space is not currently at a premium, the applet provides a static variable sr, as the listing's third line indicates, and the paint( ) method's fourteenth-line instruction (1) allocates space for an object of the SoftReference class, (2) places a reference to the SoftReference object in sr, and (3) places a reference to the Image object into the so-called Referent field of the SoftReference object to which the static variable sr refers. The Referent field of a SoftReference object is one that the virtual machine's garbage collector has been arranged to treat as one of several types of weak reference. As was stated above, this means that, if every reference chain from the root set to an object (such as the Image object) includes such a reference, the garbage collector will not necessarily refrain from reclaiming that object's memory space. If heap space is running low, for example, the collector may reclaim the referred-to object's space (and set the SoftReference object's Referent field to null to avoid a dangling reference) despite the reference chain from the root set through the weak reference to the object. If there is no pressure on the heap space, on the other hand, the garbage collector may refrain from reclaiming the Image object's space, so the paint( ) method will be able to read the Image object without reloading it. The listing shows this. When paint( ) is called for the first time and the fourteenth-line instruction therefore has never previously been executed, reference variable sr still contains a null value when the tenth-line instruction is executed, so that instructions gives im a null value. In every subsequent call, though, sr refers to the SoftReference object, and the reference variable im receives as its contents those of SoftReference's Referent field. This means that im receives a reference to the Image object if the collector has not reclaimed that object's memory space. As the eleventh-line test indicates, the paint( ) method can therefore avoid the expensive I/O operation. If that memory space has already been reclaimed, though, presumably because of pressure on heap space, the value of im is null, so the block set forth in the twelfth through fourteenth lines loads the image and places references to it in reference variable im and in the Referent field of the SoftReference object to which reference variable sr refers. As shown in Although there are several varieties of weak reference, all weak references share the characteristic that space occupied by the objects to which they refer can be reclaimed only if there are no strong-reference chains to the same objects. For a collector that employs the train algorithm, this means that processing remembered-set entries representing weak references into the collection set must await processing of strong references; what happens to a collection-set object referred to by a weak reference depends on whether that object is also referred to by any strong references. Also, there may be a hierarchy among weak references, so that processing of “stronger” weak references must precede processing of “weaker” ones. Another feature sometimes possessed by objects that contain weak references is the need for some type of processing when the objects to which they refer are found no longer to be reachable through strong-reference chains. Objects of the JAVA™ programming language's FinalReference class are a case in point. When a programmer includes a finalize( ) method in a class definition, he is specifying that certain things should happen when the object's memory space is reclaimed. For example, the object may be associated with non-heap resources that can be released when the object dies, and the finalize( ) method would specify how to handle the resource-release operation. When the user defines a non-trivial finalize( ) method for a given class, he implicitly requires that each instantiation of the class be accompanied by an instantiation of a FinalReference object that “guards” the new instance, i.e., whose Referent field points to it. In the case of this particular type of weak reference, a collection-set object to which it refers is not immediately reclaimed even if there are no stronger references to it; that is, it will be evacuated just as though it were reachable through a strong-reference chain. But a Next field in the FinalReference object containing the reference to the collection-set object is used to place the FinalReference object in a queue of Reference objects similarly discovered to be guarding “dying” objects. Typically, a separate thread of execution processes the entries in that queue to perform the appropriate clean-up operations. These should include changing the FinalReference object's Referent field so that it no longer refers to the guarded object. The referred-to object's memory space will therefore be reclaimed when it next comes up for collection if, as is typical, it has not acquired an additional reference in the interim. In general, in one aspect, the invention relates to a computer system that includes a memory, a mutator and a garbage collector. Further, the garbage collector treats a generation of a heap in the memory as divided into a number of car sections grouped into a number of trains, where each of the trains is ordered in a collection order and configured to collect in collection increments respective collection sets of those car sections in accordance with a train algorithm. The invention also includes a method, in which, in at least one of the collection increments the garbage collector performs the following: the garbage collector evacuates a first object from a respective collection set in response to at least one of the existence of a strong reference associated with the first object and the existence of a weak reference associated with the first object; the garbage collector selects one of the trains into which the first object is evacuated from the respective collection set in response to determining the existence of a reference to the object located in the generation, where the particular train is selected in accordance with the reference's location if the reference corresponds to a strong reference and wherein the one of the plurality of trains is selected independently of the reference's location if the reference corresponds to a weak reference; and the garbage collector thereafter reclaims the respective collection set as allocatable memory. In general, in one aspect, the invention relates to a storage medium that includes instructions readable by a computer system. The computer system includes a memory, a mutator and a garbage collector. Further, the garbage collector treats a generation of a heap in the memory as divided into a number of car sections grouped into a number of trains, where each of the trains is ordered in a collection order and configured to collect in collection increments respective collection sets of those car sections in accordance with a train algorithm. The invention also includes a method, in which, in at least one of the collection increments the garbage collector performs the following: the garbage collector evacuates a first object from a respective collection set in response to at least one of the existence of a strong reference associated with the first object and the existence of a weak reference associated with the first object; the garbage collector selects one of the trains into which the first object is evacuated from the respective collection set in response to determining the existence of a reference to the object located in the generation, where the particular train is selected in accordance with the reference's location if the reference corresponds to a strong reference and wherein the one of the plurality of trains is selected independently of the reference's location if the reference corresponds to a weak reference; and the garbage collector thereafter reclaims the respective collection set as allocatable memory. In general, in one aspect, the invention relates to a garbage collector. The garbage collector includes a first means for treating a generation of a heap in a memory associated with a computer system, wherein the memory is divided into a plurality of car sections and grouped into a plurality of trains ordered in a collection order. The garbage collector further includes a second means for collecting in collection increments respective collection sets of those car sections in accordance with a train algorithm by, in at least one of the collection increments: evacuating a first object from the a respective collection set in response to at least one selected from a group consisting of the existence of a strong reference associated with the first object and the existence of a weak reference associated with the first object; selecting one of the plurality of trains into which the first object is evacuated from the respective collection set in response to determining the existence of a reference to the object located in the generation, wherein the one of the plurality of trains is selected in accordance with the reference's location if the reference corresponds to a strong reference and wherein the one of the plurality of trains is selected independently of the reference's location if the reference corresponds to a weak reference, and thereafter reclaiming the collection set as allocatable memory. Other aspects and advantages of the invention will be apparent from the following description and the appended claims. The invention description below refers to the accompanying drawings, of which: Although the present invention deals with the train algorithm, it need not be practiced in a collector that restricts collection activity to intervals dedicated only to collection. Nor, if it does so, need a full collection increment be performed entirely within a single such interval. Even if a full collection increment is performed within a single interval, the implementation of the algorithm need not be the same as the one described above in connection with For example, I prefer to employ the present invention's teachings in a collector whose strong-reference-processing sequence is more like the one that Blocks 172, 176, and 178 represent operations that correspond to those that FIG. 8's blocks 102, 106, and 108 do, and dashed line 174 represents the passage of control from the mutator to the collector, as FIG. 8's dashed line 104 does. For the sake of efficiency, though, the collection operation of Before the collector processes references in that train's scratch-pad list, the collector evacuates any objects referred to from outside the old generation, as block 186 indicates. To identify such objects, the collector scans the root set. In some generational collectors, it may also have to scan other generations for references into the collection set. For the sake of example, though, we have assumed the particularly common scheme in which a generation's collection in a given interval is always preceded in the same interval by complete collection of every younger generation (of which, in this case, there is only one). If, in addition, the collector's promotion policy is to promote all surviving younger-generation objects into older generations, it is necessary only to scan older generations, of which there are none in the example; i.e., some embodiments may not require that the young generation be scanned in the block-186 operation. For those that do, though, the scanning may actually involve inspecting each surviving object in the young generation, or the collector may expedite the process by using card-table entries. Regardless of which approach it uses, the collector immediately evacuates into another train any collection-set object to which it thereby finds an external reference. The typical policy is to place the evacuated object into the youngest such train. As before, the collector does not attempt to evacuate an object that has already been evacuated. When it does evacuate an object to a train, it additionally evacuates to the same train each collection-set object to which a reference in the thus-evacuated object refers. In any case, the collector updates the reference to the evacuated object. When the inter-generational references into the generation have thus been processed, the garbage collector determines whether there are any references into the oldest train from outside that train. If there are none, the entire train can be reclaimed, as blocks 188 and 190 indicate. As block 192 indicates, the collector interval typically ends when a train has thus been collected. If the oldest train cannot be collected in this manner, though, the collector proceeds to evacuate any collection-set objects referred to by references whose locations the oldest train's scratch-pad list includes, as blocks 194 and 196 indicate. It removes them to younger cars in the oldest train, again updating references, avoiding duplicate evacuations, and evacuating any collection-set objects to which the evacuated objects refer. When this process has been completed, the collection set can be reclaimed, as block 198 indicates, since no remaining object is referred to from outside the collection set: any remaining collection-set object is unreachable. The collector then relinquishes control to the mutator. As was just explained, most train-algorithm implementations maintain for each train a set of information by which the collector can readily determine whether any references located outside the train refer to locations within the train. If the collector infers from this information that there are no such references into the train, then the train's memory space can be reclaimed without inspecting all of the locations that all of the train's remembered sets identify. My commonly assigned copending U.S. patent application Ser. No. 10/313,878 for Detection of Dead Regions During Incremental Collection, which was filed on Dec. 6, 2002, and is hereby incorporated by reference, extends that concept. It describes techniques for identifying individual cars whose memory space can similarly be reclaimed without laboriously processing their entire remembered sets. The general approach employed there is to maintain a “youngest-car indicator” and an “oldest-car indicator” for each car. Together these indicators define a maximum car range outside which it can be guaranteed that no references to the associated car are located. During a collection increment, the collector marks as potentially reachable all the cars in the generation that are identified as containing locations referred from outside the generation. It also marks as potentially reachable any car whose car range includes a potentially reachable car. Cars that are not thereby found to be reachable can be recognized as dead and their memory space reclaimed without the need to inspect the locations that their remembered sets identify. Cars thus identified as dead will often be collected before “older” cars, i.e., before cars that are ahead of them in the nominal collection order. Independently of whether a collector employs such an aggressive approach, of whether it uses the strong-reference-processing sequence of For reasons that will be explained in due course, moreover, some of the present invention's embodiments will additionally employ one or more further fields, such as the illustrated embodiment's fields 224, 225, and 226, that the mutator does not use; only the collector uses them, in a way that will be explained below. Although those fields' contents serve as references in the sense that they refer to objects, they are “invisible” as far as the mutator is concerned, so they do not serve as ways for the mutator to reach objects, and the collector therefore does not trace them to find reachable objects. When weak-reference processing occurs, strong-reference processing will already have been completed, as was indicated above. That is, the collector will already have identified collection-set objects as potentially reachable by following chains of strong references into the collection set. It then turns to a list or lists of weak references to collection-set objects. Such lists result from weak-reference-containing objects' having been “discovered.” Now, the embodiments of the present invention to be described here will ordinarily perform most discovery before strong-reference processing occurs, but it is helpful first to consider how discovery can occur during strong-reference processing, since that is when conventional collectors ordinarily perform it. To that end, consider a strong-reference-processing operation in which the collector is scanning a region that a remembered-set entry identifies, i.e., a region that was at some time found to contain a reference to an object in a car section that has now reached the collection set. Suppose that in doing so it encounters weak-reference object 218. It can typically identify that object as containing a weak reference by following a pointer in that object's header 228 to information about the object's class. The class information thereby found would identify object 218 as a subclass of the Reference class, so the collector would usually consider the contents of that object's Referent field 216 to be a weak reference. That weak reference breaks any strong-reference chain that the collector may be following, so that chain does not cause the strong-reference-processing operation to recognize the referent object as potentially reachable. But the collector has thereby discovered a weak reference to the collection set: since that reference will need to be processed, but only after strong-reference processing, the collector places weak-reference object 218 in a list of the objects that will have to be processed during weak-reference processing. Some implementations of the JAVA™ virtual machine use the Next field 222, to thread such objects into a linked list of discovered weak-reference objects. But that field also has another purpose, which necessitates its being accessible to the mutator, and this can cause a conflict in collectors that operate concurrently with mutator execution. So, as In that drawing the discovery of weak-reference object 218 is shown to result in that object's being placed in a linked list identified by a list-head field 230. In the JAVA™ virtual machine, the different top-level subclasses (SoftReference, WeakReference, PhantomReference, and FinalReference) of the Reference class are considered to be of different “strengths.” For the most part, instances of a higher-strength top-level subclass (and of any of its own subclasses) must all be processed before instances of a lower-strength subclass. So list-head field 230 will typically be one of several such fields, which will correspond to respective top-level subclasses of the Reference class and serve as the roots of respective linked lists. (Also, in collectors that execute in a plurality of parallel threads, there may be respective lists for each thread in order to reduce synchronization cost.) Still, some implementations may employ only a single, common list for all strengths. After strong-reference processing, the collector processes the weak-reference-containing objects on the discovery lists. Examples of ways in which such processing can be performed will be given in some detail in due course. For the present, though, we will consider only an overview, which FIG. 16's block 232 represents selecting the next weak-reference strength for processing. SoftReference's strength is selected first. Block 234 represents finding which of the discovered weak-reference objects of that strength contain Referent fields whose contents refer to a “dying” collection-set object, i.e. to an object that previous, strong-reference processing has not identified as potentially reachable. In the case of a copying collector such as the one described above, any object not yet evacuated by the time weak-reference processing occurs is dying; if it had been reachable, it would have been evacuated. The collector compiles a list of weak-reference objects that have the selected strength and refer to dying objects in the collection set. As block 236 indicates, it arranges for appropriate processing of the references thus listed. The particular type of processing that results from a guarded object's dying depends on the Reference subclass to which the guarding weak-reference object belongs. In the case of a weak-reference object of the SoftReference or WeakReference class, the processing will always include setting the weak-reference object's Referent field to NULL, since the memory space allocated to its erstwhile referent is to be reclaimed. In the case of weak-reference objects belonging to the PhantomReference and FinalReference classes, on the other hand, the collection-set objects to which their Referent fields refer are evacuated so that they can be reached in connection with certain post-mortem operations. What those post-mortem operations are is not of interest here, but they are usually defined by code that the developer has written for that purpose, and they are typically executed by one or more separate, post-mortem-processing mutator threads. Respective linked lists of objects that require such post-mortem processing are maintained for each type of processing thus defined. Part of the weak-reference processing that a PhantomReference or FinalReference object undergoes when its referent is found to be dying is to employ the weak-reference object's Next field to place it into such a linked list. Specifically, the object is placed in a linked list headed by a queue object that the weak-reference object's Queue field identifies. As block 240 indicates, the processing that blocks 232, 234, and 236 represent is performed in order for each top-level subclass (together with any subclasses thereof). The present invention primarily concerns provisions for processing weak-reference objects that thus refer to locations in the collection set. To place such operations in context, though, Some collection-set objects may be weak-reference objects that belong to linked lists of references to locations outside the collection set. Since the collection-set memory space that such objects occupied is to be reclaimed, the references by which they are linked into such lists must be update to avoid dangling references. FIG. 16's block 244 represents doing so. As was explained above, strong-reference processing in the case of a train-algorithm-implemented collector includes determining whether locations identified by the collection-set cars' remembered sets contain references to objects in the collection set. As was also explained, that operation can include determining whether the references identified by the remembered-set entries are weak references and deferring the processing of those that are. But I have recognized that there are a number of ways in which using the same common remembered-set structure for weak ones as for strong ones can complicate popular-object handling and retard progress. In this situation, objects A and B should be available for collection, because no strong reference outside the oldest train refers to any object inside it. But the collector would not conventionally recognize the situation if it has not so maintained the reference sets as to distinguish between strong references and weak references. The tally of references into car section 1.2 from outside of it, for instance, would merely show that there is a reference from outside the train, not that the reference is a weak one. Of course, the collector could inspect the remembered set's entries, find the references from outside the train that gave rise to them, and determine whether any of those are strong references. Although doing so would not be expensive in the illustrated, simple case, thus processing remembered-set entries for all cars in the oldest train often would be. So the failure to have distinguished between strong and weak references during remembered-set updating effectively prevents the collector from recognizing that there are no strong references into the train from outside of it. The collector is therefore prevented from collecting the entire train. Worse, the result could be futile collection activity. The process of collecting the collection set, namely, car section 1.1, includes determining whether the heap locations identified by car 1.1's remembered-set entries contain references into car section 1.1. In the simplified example, car 1.1's remembered set will at least contain entries that identify the locations such references in objects B and W1. And the collector will indeed take the time to determine that the reference in object W1 is a weak reference, i.e., is a reference that should not by itself prevent object A's memory space from being reclaimed. But the reference from object B is not in a collection-set car, and object A therefore appears potentially reachable. The result may be that object A is evacuated to a new car in the oldest train, as Now consider what happens during the next collection cycle. In that collection cycle, the situation is exactly the same from the point of view of the collection activity as during the previous cycle: the collector will not be able to collect the object in the collection-set car, and it will not be able to recognize that the oldest train contains only garbage. Object B may therefore have to be placed in a same-train car behind object A's car. Potentially, therefore, the collector could fail ever to proceed beyond the oldest train: the failure to distinguish between weak and strong references in the abstracted reference information has prevented the collector from progressing. Weak references can also adversely affect efforts to limit remembered-set size. U.S. Pat. No. 6,185,581 to Alexander T. Garthwaite for a Train-Algorithm-Based Garbage Collector Employing Fixed-Size Remembered Sets describes a way of limiting the memory cost that can be imposed by remembered sets associated with cars containing “popular” objects, i.e., objects to which a large number of references refer. In that technique, the collector adds no further entries to a given remembered set whose number of entries has reached a predetermined limit, but it continues to keep track of which train is the youngest one that contains a reference into the car with which the collection set is associated. When that car comes up for collection, the collector notes that there were too many references for the remembered set to contain, and it re-links the car into the youngest train containing a reference to it. This enables the remembered set to be cleared, since the remembered set does not need to contain cars that are farther forward in the collection sequence. But thus re-linking the car to a younger train—and therefore failing to reclaim any of its space—is unnecessary if all of the outside references into the car are weak references, so it would be desirable for remembered-set updates somehow to distinguish between strong references and weak references. Although making that distinction during updating is desirable, it is not enough. Suppose, for example, that the distinction has been made, so the collector knows that there are no strong references into the (in this case, single-object-containing) collection-set car. But further suppose that there were too many weak references for the remembered set to contain them all. Then, although the object's memory space would otherwise be ripe for reclamation, the collector would not be able to perform all of the clean-up operations associated with the weak references to the object. So, unless the collector additionally keeps a complete list of weak references, it cannot properly reclaim the dying object's memory space. The illustrated embodiment reduces such problems by, to a great extent, performing some of the discovery as “pre-discovery,” i.e., by recognizing weak-reference objects as weak before the strong-reference processing for the collection sets to which they refer and by listing them separately from strong references. Instead of recording weak-reference locations by adding entries to the normal remembered sets, for example, the illustrated embodiment uses a field in each such weak reference's containing object to make, for respective cars, linked lists of objects that contain weak references to objects in those cars. Those linked lists may be updated, for example, as part of the dirty-card-inspection operation used to update cars' remembered sets. As blocks 260, 262, and 264 indicate, a reference that the collector finds not to be weak is processed in the normal manner. That is, an entry identifying the reference's location is entered into the remembered set of the referred-to object's car if that remembered set does not already contain such an entry. We will assume for the sake of example that such entries are added only if the referred-to object's car is “older” than the car containing the reference, i.e., is ahead of it in the sequence in which cars are nominally to be collected. This is not a necessary aspect of remembered-set updating. Indeed, there are some advantages to having the remembered sets reflect all of the references into the associated car, not just those in younger cars. For a collector employing the train algorithm, though, it is more typical to keep remembered sets relatively small by omitting entries for references in older cars. The metadata for the car that contains the referred-to object may include a value that in some fashion serves as an identifier of the youngest train in which a reference into the car containing the referred-to object resides. That identifier may, for example, be a youngest-car indicator, an indicator that identifies the most recently added car that contains such a reference in that train. If so, the collector will need to update that value as references are found. Block 264 represents that updating. Such indicators can be used for various purposes, such as to aid in re-linking special cars whose remembered sets have overflowed or in identifying sequences of cars that contain only garbage. Preferably, such an indicator is updated only in response to strong references; for the purposes to which that indicator is typically put, it is better for the indicator to identify the youngest car containing a strong reference to the referred-to object even if it is in a car older than one containing a weak reference to that object (See Although the particular type of strong-reference recording exemplified by block 262 is not critical, it will typically involve adding an entry to a remembered-set data structure. In contrast, such an entry does not have to be made into the remembered-set data structure if the reference is a weak reference. When the collector finds a reference-containing object of the weak-reference-object type, it checks that object's Discovered field (e.g., FIG. 15's field 224) to determine, as block 268 indicates, whether that field still contains the NULL value it had when the weak-reference object was initially allocated. If it does, the state is as In this situation, the collector discovers the weak-reference object containing that reference: it places the weak-reference object into that list. And, since the discovery occurs before the referred-to object has reached the collection set, I refer to this type of discovery as “pre-discovery.” The operations performed during pre-discovery are largely the same as those illustrated above in connection with To add the newly discovered weak-reference object to the discovery list, which is a linked list in the illustrated embodiment, the collector places it at the front of that list. As FIG. 19's block 268 indicates, that object's Discovered field receives the contents of a discovery list head associated with the car in which the referred-to object is located: it receives a pointer to the now-second object in that list. The list head and the second object's Previous field receive a pointer to the weak-reference object being added, as block 270 indicates, and, as block 272 indicates, the Previous field of the weak-reference object being added receives a (tagged, as will be explained below) pointer to the data structure that contains the list head. (Of course, the pointers used by embodiments of the invention for this purpose could point to any individual field in the weak-reference-containing object, such as the Discovered field 224 or the Referent field 218, but I prefer to have them point to its header.) For reasons that will be explained in due course, the collector not only places the weak-reference object in a discovery list associated with the car section in which its referent object is located but also, in an operation that block 274 represents, adds that weak-reference object to an Owns list associated with the car section in which the weak reference itself is located. It does so by adding it to a linked list threaded through the Owns fields such as the one to which FIG. 15A's reference numeral 226 refers. The illustrated embodiment performs pre-discovery not only as part of card-table processing, i.e., not only in response to the mutator's using a write barrier to inform the collector that it has modified a reference. It also pre-discovers weak-reference objects as part of object promotion. When a weak-reference object whose referent resides in the mature generation is itself promoted to the mature generation, for example, it is added to the Owns list of the car into which it is placed, and it is placed on the discovery list of the car that contains its referent resides. As will be seen below, pre-discovery can also occur as part of “follower” evacuation. At the beginning of strong-reference processing there will therefore be associated with each of the collection-set cars (and, indeed, with each of the non-collection-set cars) four lists, each of which is associated with a different one of the top-level subclasses of Reference and contains zero or more objects of that class whose Referent fields refer to locations within the associated car section. Since the nature of the card-table processing that produced the remembered sets and the linked lists of pre-discovered weak-reference objects was such as to segregate weak references from strong references, the locations identified by the remembered-set entries do not ordinarily contain weak references. But the operation of processing strong references can nonetheless result in discovery of further weak references into the collection set. To appreciate this, we consider the operation represented by FIG. 10's block 132, namely, the processing of references contained in an object evacuated as a result of strong-reference processing. Naturally, there must be some way of finding where those references are, and the typical way is to consult a structure, which can be found by following the class pointer in the object's header, that contains information about the object's class. For classes whose instances include references, that information includes a reference map, i.e., some structure from which the locations of references within a class's instances can be inferred. The reference map may, for instance, be a list of offsets that indicate references' relative locations with respect to the start of an instance object. The way in which the illustrated system presents reference-map information is to have the class information indicate whether the class's instances include weak references and to provide two different reference maps for those that do. Every class-information-containing structure includes a “strength” field, which has one of five possible values in the illustrated, JAVA™-virtual-machine embodiment. One value indicates that the class is not a subclass of Reference: its instances include no weak references, so the class information includes at most a single reference map. Each of the other four values is associated with a different weak-reference “strength,” i.e., with one of the four top-level subclasses of Reference, namely, SoftReference, WeakReference, PhantomReference, and FinalReference. Each of those four values indicates that the class is either the associated top-level subclass or a subclass of it. It therefore indicates that the class's instances include weak references and that the class information therefore includes two reference maps. One of the reference maps, called the strong map, includes the offsets of all references, both weak ones and strong ones. The other reference map, called the weak map, includes only offsets of strong references. Since FIG. 10's operation 132 is intended to deal only with strong-reference processing, the map that the collector ordinarily employs when it is searching for references in an instance of the Reference class is its weak map, the one that excludes the object's weak reference. As was mentioned above, though, the contents of the Referent field are not always treated as a weak reference. To understand this, consider a situation in which the Referent field in an instance of, say, the FinalReference class has been found during some previous collection to point to a dying object, i.e., in which the FinalReference object has been found to “guard” that dying object. As was mentioned above, the FinalReference object would have been enqueued: its Next field would have received a pointer that places it into a linked list of objects that some finalizing thread needs to process. Part of that finalizing thread's operation may require access to the guarded object, so the previous collection would have included evacuating the guarded object to prevent its contents from being overwritten before the finalizing thread can have access to them. So, to maintain that access through subsequent collections, a weak-reference object's Referent field is treated as containing a strong reference until the finalizing operation has been performed on that weak-reference object. In the case of an instance of the Reference class, therefore, the operation represented by FIG. 10's block 132 will need to include a determination of which reference map to employ. If a weak-reference object's Next field is NULL, on the other hand, then it is has not been enqueued, so the weak map should be employed: the contents of the Referent field should not be treated as a strong reference. That is, its processing should be postponed until the weak-reference-processing operation. If a weak reference's processing is thus to be postponed, though, the collector must ensure that the weak-reference-processing operation will include that reference. That will happen only if the weak-reference object containing it is discovered, i.e., only if the containing object has been placed on a list of weak-reference objects. As block 282 indicates, the collector therefore determines whether the weak-reference object's Discovered field is NULL, i.e., whether the weak reference still needs to be placed in such a list. Most frequently, it does not; it will have been pre-discovered during card-table processing, and the block-282 test will have a negative result. But some embodiments may perform pre-discovery only for weak references located in cars younger than the cars containing the objects to which the weak references refer. The rationale for thus limiting pre-discovery is that recording other references is unnecessary in most cases. If a car containing a reference is to be collected before the car containing the object to which that reference refers, there is no need to record the reference's location against that car, because that reference will no longer be in that location when the referred-to object comes up for collection. But an older, reference-containing car can be included in the same collection set as a younger car containing the referred-to object if the collector employs multiple-car collection sets. So, if pre-discovery is performed only for younger-car references, a weak-reference object containing a weak reference to a collection-set object may remain undiscovered until strong-reference processing occurs. In that case, the outcome of the test represented by block 282 can be affirmative: the Discovered field can have a NULL value. As block 284 indicates, the collector therefore performs discovery on the weak-reference object: it employs the weak-reference object's Discovered field to place the weak-reference object in a linked list of weak-reference objects that are of the same strength and contain Referent fields that refer to locations in the collection set. In the illustrated embodiment, the lists employed for this purpose are collection-set-wide lists; unlike the weak-reference objects in the lists employed for pre-discovery, the weak-reference objects in these lists are not segregated in accordance with the cars that contain the objects they guard. Now that the weak-reference object has been discovered—i.e., has been placed on the list of weak-reference objects that will be processed during a subsequent weak-reference-processing operation—the strong-reference-processing operation can safely skip processing the object's weak reference. That operation therefore selects the weak map, as block 286 indicates. The strong-reference-processing operation may include discovery of weak-reference objects even if the collection set does not contain multiple cars. As was mentioned above, objects that are not located in the old generation may contain references to objects in the (old-generation) collection set, and the particular policies employed for those weak references may not include pre-discovery. As was explained above in connection with FIG. 8A's block 110, for instance, the collector may perform an exhaustive search of the (typically just-collected) young generation to find references to collection-set objects. In the process, it may find weak-reference objects. If it does, it may employ a routine similar to that of As a consequence, the end of an old-generation collection set's strong-reference processing will in the illustrated embodiment find several lists of weak-reference objects whose Referent fields refer to collection-set locations. For each weak-reference strength, there is a list of whatever weak-reference objects of that strength have been discovered during strong-reference processing. Additionally associated with each strength is a separate pre-discovery list for each car in the collection set, as was explained above. In what we will refer to as a “gathering” operation, the illustrated embodiment combines the per-car pre-discovery lists for each strength with the collection-set-wide discovery list for that strength. The test represented by block 296 instead yields a negative outcome if the current weak-reference object is indeed reachable. For a reachable weak-reference object, the As block 298 indicates, this continues until all of the weak-reference objects in the current pre-discovery list have been processed in this way. The collector then moves on to the next pre-discovery list for the current Reference subclass, as blocks 304 and 292 indicate. When processing has thus been completed for all of the current strength's pre-discovery lists, the collector moves on to the discovery list for the next subclass, as blocks 306 and 290 indicate. The routine returns when this operation has been performed for all four collection-set-wide discovery lists. With the discovery lists thus supplemented with selected contents of the pre-discovery lists, the collector is ready to perform the actual weak-reference processing. If the weak-reference object guards no object, no weak-reference processing needs to be done to it. Also, if the weak-reference object's Next field has a non-NULL value, the contents of the weak-reference object's Referent field should not be considered weak. As blocks 314, 316, and 318 indicate, the routine therefore simply proceeds to the next weak-reference object on the list in both cases. As block 320 indicates, the collector otherwise determines whether the location identified by the weak-reference object's Referent field contains an indication that the object originally located there has been evacuated. If it has, the referred-to object is not dying, so the weak reference to it does not yet need weak-reference processing. But the weak-reference object's Referent field needs to be updated to point to the guarded object's new location, and that weak-reference object needs to be placed into one of the new car's pre-discovery lists. Block 322 represents thus updating the weak-reference object's Referent, Discovered, and Previous fields in accordance with the guarded object's new location. If the guarded object has not been evacuated, on the other hand, then it is dying, so the reference should be subjected to weak-reference processing. Block 324 represents therefore placing the weak-reference object on a “dying” list, i.e., on a list of weak-reference objects that guard dying objects. As block 316 indicates, this continues until no more objects remain in the current discovery list. When that list has been exhausted, the collector turns to processing the weak-reference objects in the “dying” list that it has just produced. As was mentioned above, the type of processing required by a weak reference to a dying object depends on the class to which the weak-reference object belongs. If the weak-reference object is of the SoftReference or WeakReference class or any of their subclasses, its referent field is cleared, as blocks 328 and 330 indicate. As block 332 indicates, the referred-to object is otherwise evacuated because, at least in the case of the FinalReference class, enqueuing the weak-reference object may result in post-mortem processing that will depend on the guarded object's contents. This possible evacuation is why the illustrated embodiment employs the intermediate operation of placing on a “dying” list the weak-reference objects whose Referent fields refer to dying objects. If two weak-reference objects of the same strength refer to the same object, immediately processing the first weak-reference object could result in the referred-to object's evacuation, which in turn could cause the second weak-reference object's being found in the block 320 step not to require processing. Placing the weak-reference objects on the “dying” list until all same-strength objects have been considered prevents such a result. As block 334 indicates, the collector then determines whether the weak-reference object's Queue field is NULL. If it is not, that field identifies a post-mortem-processing queue into which the weak-reference object should be placed, and the weak-reference object's Next field is employed for this purpose. But block 336 does not represent enqueuing the weak-reference object immediately. For synchronization reasons not important here, it may be more convenient to place that object initially into a linked list of weak-reference objects that need to be enqueued. Block 336 represents using the weak-reference object's Next field for that purpose. If the block-334 test instead determines that the Queue field's value is NULL, then there is no queue to which the weak-reference object needs to be added. To distinguish weak-reference objects that have not yet reached the enqueuing step from those that have reached it but have not needed enqueuing, the collector places in the weak-reference object's Next field a pointer to the weak-reference object itself, as block 338 indicates, rather than give it, say, a NULL value. Thus “enqueuing” the weak-reference object converts the reference contained in its Referent field from one that should be treated weakly to one that should be treated strongly, and this should therefore have an effect on any lists to which it belongs. The nature of the resultant necessary adjustment will depend on where the weak reference is located. (Although the evacuation, if any, of the guarded object will have resulted in its remaining in the old generation, the weak-reference object guarding it may not be in that generation.) In the particular case in which the weak-reference object is located in the old generation, the Next field's value change is an old-generation reference modification, so it has to be recorded in the manner used by that generation for such purposes. In particular, the card-table entry associated with the card containing that weak-reference object (in the case of so-called imprecise card marking) or with the card containing its Referent field (in the case of so-called precise card marking) must be marked dirty so that subsequent card-table processing will add the location of the weak-reference object's Referent field to the remembered set of the card that contains the guarded object. Block 340 represents doing so. If the guarded object has been evacuated in the step represented by block 332 to keep it accessible for post-mortem processing, then any “follower”, i.e., any collection-set object referred to by a reference in the guarded object or in any other follower—should be kept accessible, too. As was indicated in connection with block 330, this is not an issue in the case of weak-reference objects that belong to the SoftReference or WeakReference class. So, as blocks 342 and 344 indicate, the collector evacuates followers only of evacuated objects guarded by weak-reference objects of the other two classes. For this purpose, all of the guarded objects' Referent fields are treated as containing strong references. As blocks 346 and 348 indicate, this operation of performing any necessary evacuation and enqueuing is repeated for all objects on the “dying” list. As blocks 350, 352, and 353 indicate, the “dying” list is then cleared if any discovery lists remain, and the “dying” list is again populated from the next discovery list. When the operations of thus populating the “dying” list and processing the weak-reference objects in that list have been completed, the collector processes any other weak references, as was mentioned above in connection with FIG. 17's blocks 242 and 244. As FIG. 22's blocks 354, 356, 358, and 360 indicate, that is, the collector clears any such references whose referred-to objects have not been evacuated from the collection set. Before the collection set is actually reclaimed, any non-collection-set cars' discovery lists that include unevacuated—and therefore unreachable—weak-reference objects located in the collection set should be changed so that their links no longer point to those unreachable objects. And non-collection-set cars' discovery lists that include evacuated weak-reference objects should be changed so that their links point to those objects' new locations. Moreover, those evacuated objects may need to be added to their new cars' Owns lists. Block 364 represents doing so, and Some embodiments may inspect the entire collection set to find its weak-reference objects for this purpose. As was mentioned above, though, each collection-set car's metadata in the illustrated embodiment include a field that serves as the root of an Owns list, i.e., as the root of a linked list threaded through the Owns fields of all the weak-reference objects that reside in that car and have Referent fields that refer to mature-generation objects. The illustrated embodiment can therefore use the collection-set cars' Owns lists for most of that Discovered-list updating, as will now be explained. A perusal of the just-described strong- and weak-reference processing reveals that it does not affect the Owns lists' links; although some weak-reference objects residing in the collection set may have been evacuated, the erstwhile Owns fields in the collection-set locations that they occupied still contain the same contents, because the evacuation operation changes only the header field that receives the forwarding pointer. So each collection-set car's Owns list can still be traversed to find each collection-set location where a weak-reference object that refers weakly to a mature-generation object resided when the collection interval started. The collector performs that Owns-list traversal to remove unreachable objects from their discovery lists and to update the reachable (and therefore evacuated) weak-reference objects' memberships in Discovered lists and Owns lists. To this end, the collector starts with the first car's Owns field, as FIG. 23's block 366 indicates. As block 368 indicates, the collector determines whether that field's contents are non-NULL, i.e., whether that car contained any weak-reference objects whose Referent fields refer to mature-generation objects. If it did, the collector considers the Owns list's first object, as block 370 indicates. Block 372 represents inspecting that location to determine whether the (weak-reference) object that occupied it has been evacuated. If it has not, it is unreachable, so it should be removed from the discovery list to which it belongs, at least if that discovery list is associated with a non-collection-set region. Block 374 represents that removal operation. Since the illustrated embodiment's discovery lists are double-threaded, i.e., are threaded in respective opposite directions through the member objects' Discovered and Previous fields, the removal operation in that embodiment is performed in two relatively inexpensive steps. In the first step, the collector places the contents of the unreachable object's Discovered field into the Discovered field of the object or car-metadata structure that the unreachable object's Previous field identifies. To distinguish between a Previous field that identifies another weak-reference object and one that instead identifies a car's metadata structure—and thereby enable the thread performing the removal operation to infer the proper Discovered-field offset—the illustrated embodiment takes advantage of object alignment, i.e., of the fact that the least-significant bits of all object- and metadata-structures are always zeros in that embodiment. Specifically, the least-significant bit of the identified structure's address is replaced in the Previous field with a 12 if that structure is a car's metadata structure rather than another weak-reference object. In the second step, if the contents of the unreachable object's Discovered field are non-NULL, it places the Previous field's contents into the Previous field of the object that the Discovered field identifies. Of course, the Previous field is not necessary, so some embodiments may dispense with it; in such embodiments the collector could still find the desired objects by tracing all of the discovery lists. Since that could be quite time-consuming, though, the illustrated embodiment avoids such tracing by using the Previous field for double threading. Still, double threading does add to discovery cost, so the illustrated embodiment, too, dispenses with double threading in certain circumstances. One such circumstance involves mature-generation weak-reference objects whose Referent fields refer to objects in the young generation rather than in the mature generation. To understand why, it helps to consider an overview of the illustrated embodiment's general approach to discovery lists. All of the previously discussed individual-car discovery lists can be thought of as constituents of one higher-level discovery list among several such lists, each of which has a potentially different respective format and is subject to potentially respective policies. The illustrated embodiment can be thought of as maintaining a respective such high-level discovery list for each pair (A, B) consisting of an object domain A and a weak-reference domain B, where the object domains are the generations and where the weak-reference domains are the generations as well as extra-heap root sources such as the call stacks. Each high-level discovery list includes the weak references in domain B to objects in domain A, and the high-level list of which the above-described individual-car discovery lists are constituents is the one for which domains A and B are both the mature generation. As was explained above, the format policy for that high-level discovery list is that it comprises individual-car discovery lists; each individual-car discovery list is a linked list whose members are restricted to mature generation weak-reference objects that refer to objects in the car with which that list is associated. The reason for this policy is that the mature generation tends to be relatively large, and the weak-reference-processing phase could therefore be too time-consuming if it included traversing mature-generation weak-reference lists that are not so restricted. The illustrated embodiment saves time by traversing the individual-car discovery list only for cars in the collection set to process dying collection-set objects weakly referred to from mature-generation weak-reference objects. But this savings would be greatly compromised if, to update Discovered-list memberships for the collection set's weak-reference objects after having thus dealt with the collection set's dying objects, the collector had to traverse the individual-car discovery lists for all of the mature generation's cars. The illustrated embodiment avoids this to an extent by using the above-discussed Owns-list expedient, but that alone does not take care of the problem; if the Referent field of a weak-reference object in that list is NULL (because it had referred to a dying object in a previous collection set), the only way to identify the car from whose discovery list that weak-reference object needed to be removed would be, in the absence of the illustrated embodiment's double threading, to traverse potentially all of the individual-car lists. It is for this reason that the illustrated embodiment employs that double threading. But considerations are different for weak-reference objects that belong to other high-level discovery lists. For example, consider those on the discovery list consisting of the mature-generation weak-reference objects whose Referent fields refer to young-generation objects rather than old-generation ones. There ordinarily are very few such objects, so the illustrated embodiment implements that discovery list as a single linked list. To update the Discovered-list memberships of all weak-reference objects that began the collection increment in the collection set, the collection-set members of this high-level discovery list have to be considered along with those on the collection set's Owns lists, i.e., along with the collection-set weak-reference objects whose Referent fields refer to mature-generation objects. To that end, the collector traverses the single linked list of mature-generation weak-reference objects whose Referent fields refer to young-generation objects. That is, it traverses a high-level discovery list rather than Owns lists associated with the collection-set cars. Although this list is not restricted to weak-reference objects that were located in the collection set, its traversal is rarely expensive, since it is almost always quite short. And, when a member of that list is encountered that remains in the collection set and should therefore be removed from the discovery list to which it belongs, the collector can do so readily without using a Previous field, since the weak-reference object to be removed was encountered in the process of traversing the list from which the removal is to occur. The illustrated embodiment therefore only single-threads that discovery list, through its members' Discovered fields. We digress at this point to note that some aspects of the techniques that the illustrated embodiment employs for Reference-class's objects are also applicable to dealing with other weak references. For example, consider a string-interning table. As is well known to those skilled in the art, a string-interning table is a table of string structures so arranged that no two of its string structures have the same value. It is usually implemented as a chained hash table: for each of a plurality of values to which strings can be hashed, it includes a respective linked list of “bucket” structures of which each contains a reference to a string that hashes to the value associated with the bucket's linked list. When a reference to a string in the heap is to be “interned,” i.e., to be set to refer to a common, canonical instance of a string having that string's value, the collector searches the interning table for a bucket whose reference refers to a string structure whose string value is the same as that of the one referred to by the reference being interned. If such a bucket is found, the reference being interned is redirected to the string to which the bucket's contents refer. If no such bucket is found, one is added to the appropriate linked list, and its contents refer to the string to which the reference being interned refers. The string reference in an interning table's bucket is weak: the string to which it refers needs to be retained only so long as some other, strong reference refers to it. If a string remains unevacuated in the collection set when the collection routine reaches the loop that The illustrated embodiment avoids such a whole-table traversal. In addition to maintaining for each car a discovery list of mature-generation objects that potentially contain references to objects in that car, the illustrated embodiment maintains for each car another discovery list, this one being a linked list of interning-table buckets whose weak references refer to that car's strings. (It also maintains such a bucket-discovery list for the young generation as a whole.) Whenever an interning-table bucket's referent field becomes directed to a mature-generation string, the collector adds that bucket to the bucket-discovery list maintained for the car in which that string resides. And, when an interned string is evacuated from the collection set into another car section, the bucket containing the weak reference to that string is re-linked into the new car's bucket list. Then, when the collector needs to clear or update the interning table's weak references to collection-set strings; it can simply traverse the collection-set cars' bucket-discovery lists; it avoids the need for a whole-table traversal. We now return to the clean-up operation that If the weak-reference object should still be treated as weak, on the other hand, the link fields of the objects logically adjacent to it in its discovery list need to be updated to reflect that object's new location. That is, the Discovered field of the weak-reference object or metadata structure that precedes that object in the discovery list needs to be updated with that object's new location, as does the Previous field of any object that succeeds it. Block 382 represents performing those updates. Additionally, the evacuated weak-reference object needs to be placed in its new car's Owns list, as block 384 indicates. As blocks 386, 388, 390, and 392 indicate, the collector repeats this operation for each object in each Owns list associated with a collection-set car, and, as block 394 indicates, it additionally performs the above-mentioned related operation for collection-set weak-reference objects in the other high-level discovery list, i.e., in the discovery list in which the members are mature-generation weak-reference objects whose Referent fields refer to young-generation objects. Having thus updated the weak-reference objects' memberships, the collector arranges, as FIG. 22C's block 394 indicates, for the enqueuing of the weak-reference objects that were identified as needing to be enqueued. As was mentioned above, this operation is typically performed by a separate thread, one that may, for instance, operate concurrently with the mutator. This completes weak-reference processing. However, the reference-evacuation operation that FIG. 22B's block 332 represents requires further discussion, because it may differ from the type of evacuation that the collector performs for most strong-reference objects. As was mentioned above, the collector usually places evacuated objects in trains that references to them occupy. This is ordinarily beneficial, because it tends to concentrate a garbage data structure within a single train. But I have recognized that it is not as beneficial when the object is being evacuated in response to a reference in a weak-reference object's Referent field. To appreciate why, consider the situation that In the case of the other collection-set object, on the other hand, the sole reference to it is a weak reference, in object W. Let us assume that object W's class requires that an object referred to by its weak reference be evacuated. Conventionally, object A would therefore be evacuated to a car in object W's train. But recall that, because object W is recognized during weak-reference processing as referring to a dying object, it will be placed on a queue of objects to be subjected to post-mortem processing—processing that will probably take place concurrently with mutator operation and that will likely cause object W's Referent field to be cleared relatively soon. So object A will probably soon become garbage. Conventionally, though, its memory space would not be reclaimed until collection reaches the fourth-row train. In contrast, when embodiments of the present invention evacuate dying objects in response to weak references to them, they at least sometimes place them independently of the reference's location, as Reflection reveals that the same considerations can apply during strong-reference processing when the object-evacuation step represented by FIG. 9's block 124 is performed. As was mentioned above, weak-reference objects' Referent fields are sometimes treated as strong references when the containing weak-reference object has already been enqueued. So the evacuation operation performed by the illustrated embodiment actually differs slightly from the one that Other embodiments may achieve a similar result in a different manner. One way of doing so, for instance, is to perform strong-reference processing in two phases. The first phase, which involves normal evacuation, would be carried out as part of a strong-reference-processing operation similar to the one described above. The second phase, which involves evacuation to the dying-object train, would be performed as part of the gathering operation. To implement such an approach, the reference-map-selection operation that the collector uses during strong-reference processing may be of the type that The reference numerals in Now, although it is typical for a dying object to become unreachable soon, some exceptions can occur. The particular queue on which the weak-reference object is enqueued may be especially long, for instance, or the thread that processes the weak-reference queue may be suspended for a particularly long time. An object referred to by a weak-reference object thus awaiting processing may repeatedly prevent the dying-object train from being reclaimed as a whole. To reduce such occurrences, the collector may impose a limit on the number of times an object can be placed in a dying-object train in response to the object's status as a dying object. Embodiments of the invention that implement such a policy will normally employ some way of marking the dying object to indicate how many times it has been evacuated to a dying-object train because it was found to be dying. As will now be explained, the “tying off” technique alluded to above is one way of doing so, and If the block-406 operation instead finds that the Referent field is not NULL, the collector determines whether the weak-reference object has already been enqueued: it determines whether that object's Next field is NULL. Block 410 represents making that determination. If the weak-reference has not been enqueued, then its referent could not already have been evacuated to a dying-object train as a result of having been found to be dying, so it is not the type of object that the collector is attempting to identify. As the drawing indicates, the If the block-410 operation finds that the weak-reference object has been enqueued, on the other hand, the collector updates the weak-reference object's Referent field, as block 412 indicates. That is, it determines whether the location to which that field refers indicates that the object previously residing there has been evacuated. If so, that operation copies a forwarding pointer from that location into the Referent field. If, in operations represented by blocks 414 and 416, the collector finds that the enqueued weak-reference object is not located in the collection set but that the object to which its Referent field refers still is, it is the illustrated embodiment's policy to evacuate that referent object to the dying-object train once more but to prevent its status as a dying object from thereafter causing any further such evacuations. To arrange for the evacuation, the collector places the Referent field's address, as block 418 indicates, into a scratch-pad list that the collector maintains to list objects to be evacuated to the dying-object train. To mark the object as having once been evacuated in this manner, it ties off the guarding weak-reference object's Discovered and Previous fields, as block 420 indicates, with a result that will be explained in due course. As block 420 also indicates, the collector splices the weak-reference object out of the discovery list. To understand why, recall that the Before we discuss the reason for block 420's tying-off operation, it helps to consider the remainder of But, in the illustrated embodiment in which the collector uses the scheme of Note that FIG. 28's block 418 represents also evacuating followers, i.e., objects referred to by strong references in other objects evacuated in that operation. For this purpose, a reference in a weak-reference object's Referent field is considered strong only if the weak-reference object has been both enqueued and tied off. Otherwise, the collector deals with the Referent field either later in the As described so far, the illustrated scheme for limiting the number of evacuations into dying-object cars can largely be implemented by simply (1) inspecting the guarding object's Next and Referent fields to determine whether the weak-reference object has been enqueued and post-mortem processing for its guarded object has been completed and (2) recording the weak-reference object in the appropriate list (i.e. in the pre-discovery list or remembered set). These mechanisms result in a natural progression for a dying object whose space cannot be reclaimed. In the As will now be explained, though, there are situations for which the illustrated embodiment uses the tying-off operation as an additional mechanism to keep track of whether the dying object has already been evacuated to a dying-object train. Among the things that can happen to a weak-reference object are, as has been discussed, that it can be allocated, set to guard an object, and enqueued. Although the enqueuing has been described above as being performed by the collector, it is a feature of the JAVA™ a programming language that the mutator can itself explicitly enqueue a weak-reference object, i.e., place a reference in its Next field. As a consequence, all three of those actions can occur between the same two successive garbage-collection intervals. If this happens, the Now, one of the steps in the operation that FIG. 18's block 258 represents is, as FIG. 19's block 260 indicates, to determine whether the reference is weak. The illustrated embodiment that uses the mechanism of Having now explained the reason for the tying-off operation of FIG. 28's block 420, we return to that drawing to complete the description of the operation that it describes. Yet to be considered is what happens when the block-414 determination is affirmative, i.e., when the pre-discovery-list weak-reference object currently being considered is itself found to be located in the collection set. In that case, that weak-reference object has not been found so far to be reachable, so the fact that its Referent field refers to a collection-set object is not without more a basis for evacuating the object to which it refers. The collector therefore skips the block-418 operation of scheduling the guarded object for evacuation. But the weak-reference object has been identified as enqueued and referring to an object, and it may still end up being evacuated; an object subsequently to be evacuated may refer to it. If so, the object to which the weak-reference object's Referent field refers will be evacuated, too, so it should be identified a previously evacuated dying object. And, in any event, the weak-reference object should be spliced out of the pre-discovery field to save the gathering and weak-reference-processing operations the effort of dealing with it. So, as the drawing indicates, the collector performs the block-420 operation of splicing out and tying off the weak-reference object before proceeding to the pre-discovery lists' next weak-reference object. Also remaining to be considered is what happens if the block 416 operation determines that the object to which the weak-reference object refers is no longer located in the collection set. This typically happens because the referred-to object was evacuated, in which case the referred-to object is now a dying object that has been evacuated for the second time. (Actually, a poorly written mutator can result in that referred-to object's having been “resurrected,” in which case it would not for most purposes be considered “dying” any more. For the Although the embodiment described above employs only a single dying-object train for any given increment, and any first-time dying object is evacuated to that train, some embodiments may operate differently. As was mentioned above, for example, some embodiments may not use a special, dying-object train at all; some may simply evacuate dying objects to an already-existing train, such as the oldest existing train, the oldest such train that includes no collection-set car, or a train some predetermined number of trains behind that. Also, some embodiments may treat some types of weak references differently from others. For example, a collector that employs the present invention's teachings may evacuate, say, only objects referred to by FinalReference objects independently of the reference's location but always evacuate objects referred to by PhantomReference objects to those objects' trains. Or it may do just the opposite: it may treat the Referent fields in PhantomReference object as being the references of the independent placement type. Moreover, even if it performs independent placement for both types of references, a collector that employs the present invention's teachings may make the placement location depend on the reference type; there could be a special dying-object train for objects evacuated in response to weak-reference objects of one class but not for those evacuated in response to weak-reference objects of another class, for instance. Or there could be separate dying-object trains for objects evacuated in response to the different types. So the present invention can be practiced in a wide range of embodiments that, by making the evacuation of collection-set objects in response to weak references independent of those references' locations, can reduce floating garbage. The present invention therefore constitutes a significant advance in the art.
|Antiques Digest||Browse Auctions||Appraisal||Home| The French Tradition Since it was France that drew the eyes of the world to its painters in the last century, let us see where the origins of its national art lay. After the decline of Venetian art Rome had become the center of Italian painting, not because there flourished in the capital city great masters to whom anxious students made their pilgrimage, but because it was rich in collections of masterpieces. It was the last stronghold in Italy of the classical traditions which were being displaced by a sensual materialism on the one hand, and by an enervated false sentimentality on the other. But Rome was overcrowded with painters, as we have seen from the exodus of El Greco. Nevertheless the ambitious art students of all Europe turned their footsteps to the Eternal City. Among others was a sickly, poverty-stricken youth by the name of Poussin. Poussin had left his little hamlet in the north of France and after many discouraging vicissitudes, had made his way into Italy. He wanted to be a painter in the classical manner; his ambition was not just to paint what he saw, but to set down the stories and legends of antiquity. In Rome he found an environment that encouraged his penchant for the glories of the past. He transferred to his canvases the antique sculpture in which the city abounded; his figures pose lifelessly in splendiferous, imaginary settings. And in addition to borrowing the subject, the pose, the proportions and even the spirit of a distant epoch, he studied well the compositions of the Florentines and the technical methods of the Venetians. He did not succeed in breathing much life into his creations, but he was, together with his exiled compatriot, Claude, responsible for the foundation of a taste in painting which opposed the tendencies of the North. And in addition, he gave an impetus to the art of painting in France that brought about its sudden rapid development. If he added nothing that was precisely new, he at least succeeded in stating with paint the ideals of a great number of his less talented contemporaries. From his precepts there grew a body of practitioners who were so pleased with their own interpretations of Classicism that they formed an exclusive little society, the French Academy. Their aim apparently was to guard the art of painting against any assault upon its classical intentions. Under the presidency of Le Brun they did prodigious work towards this end by ignoring all painting except their own. If Poussin added little to the art, they added less. They are chiefly important for having opposed the genius of the period, Watteau, and for having voted against him when he competed for the Grand Prix. Watteau, like Raphael and Giorgione, failed to reach the prime of life. He died at the age of thirty-five. But unlike his illustrious forerunners, his curtailed existence is not a record of gentleness and serenity of soul. He was a stormy, impetuous character who seemed to have divided his time between painting quietly romantic pictures and making enemies of his benefactors and friends. His difficulties with pedantic teachers may have been due to his temperament, but the fact that the precepts of the Classicists were officially and implicitly accepted as fundamental to art in France was no little factor in the conflict between him and other artists. He was by every natural cause a Romantic. Though born in France in the little town of Valenciennes he was of Flemish ancestry. From this fact we see that the rigidity of the Classicists was antipathetic to his northern nature. And the early opposition of his father, the town plumber, to an art career compelled the boy to learn to draw by sketching people in the street, that is, by observation instead of by an infallible system. Even when his father relented and sent him to study with an obscure painter in the village, it was from the canvases of Rubens' followers, Teniers and the genre painters, that young Watteau absorbed his ideas of color, composition and technique. The tenets and methods of the lowland painters found responses in his own nature. If Vermeer was a classicist in a romantic country Watteau was the very opposite. The urge to paint things and people in his own way was hampered by a hostile environment. At the age of eighteen he ran away from home, arriving in Paris penniless. He found employment in the service of a decorator, and this fact too sheds some light upon his mannerisms, particularly the stylized elegance of pose and arrangement. Later he found more congenial work making decorations for the Grand Opera. The life of the theater absorbed him. The artificial pageantry, the rhetorical affectation, the elegance of manner, the queer people who loll about and sway and curtsy, all found a place in his pictures. But his artificial world was not an offensive one. It was peopled with figures a little fantastic, charming nevertheless. And the restrained manner of the artist saves him from any criticism with regard to matters of taste. Always he is genteel. This is not to say that he was mild or effeminate. Above everything else, his pictures possess a vitality completely absent in the work of the Classicists whose formal, lifeless figures stand like frozen images in arrested action. Much of Watteau's vitality is the result of his early sketches of his townsmen. In his drawings of street types he achieved a piquancy and an originality which establish him as the oustanding draughtsman of the eighteenth century. And in his technical grasp upon the problems of paint he is much stronger than his contemporaries. He employed the warm tones of the Venetians and set them off with silvery nuances. Rubens' cool reflections evidently suggested to him the effects to be attained by playing the silvery tones against the deep warm notes of the Italians. However immeasurably advanced over his contemporaries was Watteau in painting ability, it is in the realm of fancy that much of his significance lies. The human warmth of which we spoke permeates his paintings and is transferred to us with magic ease. If Watteau inspired Cezanne centuries after him to bring the method of contrasting color to a culmination, his vague, half sentimental, unworldly romanticism will continue to distil its subtle charm when theories of color will have been exhausted. The effect of Watteau's paintings was to break down the influence and the dignity of the Classicists. But little good came of this rebellion. The painting practiced in his name did nothing to raise the standards of French art. The Louvre galleries in Paris have many examples of the work of his followers, notably of Boucher and Greuze. These painters appropriated the technical accomplishments of their predecessor and something of. his preference for the fanciful world. But they fall so far below him in spirit, conception, significance and every other quality not precisely that of craft, that instead of supporting his principles, they serve only to reflect the general spiritual decadence of the times. Greuze slyly preaches morals in an age that has no use for them except academically, and he is careful to select for his holy lessons the most voluptuous models. Boucher invades the Eden of nudes floating on clouds accompanied by angels and cupids. Neither painter understands the important contribution made to the art by Watteau's discovery of the use of warm and cool color. The painter Fragonard came nearest to the ideals of the master, but only after the movement away from formal Classicism had died of anaemia. The end of the eighteenth century was already too far from Watteau's ascendency for the revival of an art which had suffered so much in the hands of small-spirited men. The star of Classicism began its rise once more, this time under the guidance of David. David went back to the legends of Greece and Rome and painted great compositions of many figures which by comparison made the static creatures of Poussin appear as animated as dancers. He not only contrived to have his posing people suspend all motion, but in his use of cold color he attained the deathly stillness of a marble world. The livid hues of his faces even hint of petrifaction. But such was the influence of David that at the beginning of the nineteenth century he stood in complete control of French art. Every ambitious student found his way to the studio of this scholar of antique lore. Discussions on theories of art resolved themselves into questions of Greek history and social custom, rather than into problems of color, form., design. But with the entry into David's fold of rebellious and independent spirits the discussions returned to the old argument of Classicism versus Romanticism. The youthful painter Gericault, before he died at the age of thirty-four, split the ranks of David's pupils by his compositions of writhing figures done in the manner of Tintoretto. His Raft o f the Medusa, a tremendous canvas depicting a shipwrecked group of half-dead survivors, shocked all Paris with the tragic realism of that event. But for the most part the picture was viewed by critics as a brutal denial of art, and stared at as a curiosity. There was no body of criticism to take up a defense of Gericault's principles. It remained for another young painter to carry on his work after he was gone. The genius of Delacroix may not have surpassed that of Gericault, but the way for his progress was already prepared. At the time David's most illustrious student, Ingres, was startling Paris by his unmatched draughtsmanship and ability to reveal character in a portrait by means of the accurate line of the Florentines, Delacroix revived the romantic spirit of the Venetians with force and skill. He and Ingres became the respective champions of Romanticism and Classicism, just as Ruysdael and Claude had been before them. The two young painters soon became bitter enemies. Throughout their lives they fought, each in his able way, to uphold the precepts of their art. Victory was inevitable for Delacroix, since the time was ripe for a more virile and imaginative art than the stagnant Classicism of David. And the wave of Romanticism would have swept away the whole antiquated school if it had not been for the single genius of Ingres. It was really not Romanticism against Classicism. It was Romanticism against Ingres. What were the radical principles which drew so many artists to Delacroix's banner? For one thing he believed that art could not be taught. In this respect he antedated the Modernists. He declared that art was a thing innate in the man, a matter of passion and spirit, and not of rules and craft. He set a premium upon originality, upon the creative instinct; and so his theories came to be interpreted as a defense of novelty. The Academicians even today attribute to him the advent of Modernism, since it was he more than any painter of the early half of the century who denied the principles and traditions of the art. In his own work he was extremely inventive. His composition went back to the source of all romantic, rhetorical figure arrangement, the Venetians. As for his color, he was perhaps the first Frenchman to see in the landscapes of Constable the beginning of a new era; from the Englishman he derived an appreciation of tone and atmosphere and light. And a certain realism, a dramatic way of presenting ordinary facts, must have filtered through to him from the art of the Spanish realist, Goya. Romanticism to Delacroix meant no more than agitated illustration on a grand scale. There is in his compositions none of the romantic feeling imparted to El Greco's burning canvases for instance; nor is there the quieter romance and drama of Rembrandt's old characters. His romanticism is the romanticism of Rubens-a realistic depiction of events done in exaggerated gestures. But whether or not we thrill to the subjects which thrilled the painter, there remains his leadership of a new and vital cult. Every important movement from his time to Impressionism owes a debt to Delacroix. The most immediate effect of the Frenchman's energetic campaign for realism was felt among the landscapists. An entire school was founded with him as godfather, Ruysdael as patron saint, and Constable as honorary high priest. The group of painters who settled at Barbizon in the Fontainbleau Forest dedicated their art to atmosphere and the moods of nature. Corot was the outstanding member of this group. Oddly enough, his were the only pictures which retained vestiges of the enemy's methods. In his youth he had learned to people his landscapes with nymphs, cupids and other pagan creatures of fancy. These remnants of a bygone tradition adhered to him but detracted little from his attainments. In his less lyrical subjects, particularly in his pictures of definite places, he loses the fairytale quality of his woodland scenes and shows a command of his medium which stamps him a great painter as well as an innovator. (Although Corot's fame rests upon his landscape, critics are gradually coming to the opinion that his figure painting is his greatest form of expression, placing him in a class with Vermeer and Watteau.) Another type of realism came to light in the work of Millet. Millet was born in Normandy. In spirit as well as geographically he was closer to the Dutch than to the Italians. He was the first French painter of importance to find in the pursuits of the peasant and the laborer, and in their family life, inspiration for pictures. But unlike the genre painters he was not prompted to regard his subjects from the jovial point of view indispensable to the national art of the Netherlands. His peasants are viewed romantically. They have the sadness and fatalistic stamp of Michelangelo's supermen. They are clods, but they are pious and good. They are close to nature, but are her slaves. As for Millet's manner of painting, it is as simple and as humble as is his subject matter. There is no virtuosity, no evidence of clever brushwork. The paint is simply stuck on. But the solid qualities of form and draughtsmanship ably express his meaning. His draughtsmanship is not the draughtsmanship of Ingres. Indeed the Barbizon painter's line was as sharp a contrast to the graceful, precise drawing of Ingres as a rustic's honest speech is to the flattery of a courtier. Where Ingres' line fluidly plays about the anatomical swellings and indentations, always subtle and decorative, Millet's, boldly and massively, without regard for detail, expresses the general mood of the figure. Its power and simplicity inspired the satirist Daumier, who ably appropriated the method for his own ends. The forcefulness of Millet's line seems indicative of his character. He defied academic formulas. He showed how unimportant mere technique or cleverness was when one had something vital to say. He revealed, in his choice of subject, the possibilities of beauty in the most humble and ordinary truths of nature, a plowed field, an old church in the sunlight, a man leaning on a hoe. Finally in his own manner of living he was an inspiration to a whole class of artists who were moved by his example to seek art close to the people instead of in the studios of Montmartre. Although Millet was an avowed realist, he was, in common with the rest of the Barbizon School though to a lesser degree, a lyricist. The Fontainbleau landscapists all sang the glories of nature. Some frankly drew upon their imaginations, using nature only as a lay model. Monticelli a century before. Diaz and Rousseau confined their talents to flaming sunsets and somber foliage. If Millet avoided subjects which obviously bid for sentimental rapture, he yet gave to the most humble scene his poetic commentary. Classicism had been completely crushed, but now the camp of the Romantics was divided. The Realists seceded There was a right wing and a left wing. The radicals believed that the prinicipal aim of their part (and of all painting) was to depict things as they are with comment. Millet, it seemed to them, allowed his poetic emotions to color his presentation of fact. Corot, like the other Barbizon painters, was frankly appealing to our sentimentality. Nature was not all woodland dells with fairy dancers, nor were peasants all patient giants. In some parts of the country peasants were very homely indeed, and not well proportioned. "Let us have the truth," the realists cried. They were influenced of course by the sudden interest in scientific research. It was only a few years before the novelists, Flaubert and Zola, were to show the world how close to actual physical fact literature could get. The romanticism of Victor Hugo was passing out. The prosaic hunters of truth held the field. In their vanguard was the captain of the radical painters, a provincial named Gustave Courbet. A born realist, he had no need for theories. He was destined to influence a later generation as Delacroix had influenced his own.
Perry, Gillian; Roach, Joseph and West, Shearer The First Actresses: Nell Gwyn to Sarah Siddons. London: National Portrait Gallery and University of Michigan Press. This book was written to accompany the exhibition The First Actresses: Nell Gwyn to Sarah Siddons at the National Portrait Gallery, London, 2011-12, curated by Gill Perry. The exhibition included 54 portraits and objects and involved extensive research in British archives, and some collaborative explorations with colleagues in theatre studies, music history and literature. Perry edited the book and wrote 70% (20,000 words), including three chapters and a section on biography. The book explores the role of feminine portraiture in the history and visibility of the first British actresses. It reassesses the often controversial relationship between art, gender and the theatre during the late seventeenth can d eighteenth centuries, providing a critical analysis of the ‘feminine face’ of eighteenth century celebrity culture. The exhibition was designed to bring to public attention the important role of gender and feminine portraiture in perceptions of the theatre and its cultural influence, and in the construction of early celebrity culture. It also highlighted the remarkable symbiosis between the fine and dramatic arts during this period, and the important role of women in this synergy. In the first chapter ‘Introduction: Painting Actresses’ Lives’ Perry explores the origins of the term ‘actress’, and the complex ways in which the idea of the ‘actress’ and its cultural associations have been mediated through visual culture, and biographical and autobiographical narratives. Her chapter ‘Divas, Dancing and the Rage for Music’ draws on new research on the relationship between musical and visual culture during the period, arguing that portraiture could be seen to embody (and sometimes to seek resolutions for) many of the social and cultural contradictions implicit in public musical performances (both singing and dancing) by women. Perry argues that portraiture offered another form of ‘performance’, a visual re-staging of femininity as somewhere between art and nature. In the final chapter ‘Star Systems: Then and Now’, she explores parallels and differences with modern celebrity culture, considering some definitions and historical overviews of concepts of ‘celebrity’, often argued to have first developed in the eighteenth century with a growing commercial culture of consumption. It is argued that eighteenth century feminine portraiture provided a visual embodiment of the conflation of public and private identities and gendered myths. She argues for the continuation of a ‘distinctively feminine face’ of this culture, and a parallel and voyeuristic obsession with ‘public intimacy’. ||2011 National Portrait Gallery ||Arts > Art History ||22 Dec 2011 13:05 ||23 Oct 2012 14:26 |Share this page: Actions (login may be required)
- 26 Pins Scratches on your back baby Nails Art, Batman Nails, Nails Design, Nailart, Bats, Beautiful, Dark Knight, Fingers Nails, Nail Art Loved Calvin and Hobbs Geek, Nerd, Chewy, Stuff, The Artists, Funny, Stars Wars, Calvin And Hobbes, Starwars Starswars, Storms Troopers, Future Families, Baby Room, New Baby, Funny Posters, Stars Wars Baby, Starwars, Baby Shower These are so awesome. Super hero socks! Superhero Socks, Wonder Women, The Batman, Superhero Capes, Super Heros, Superheroes, Crazy Socks, Super Heroes, Wonder Woman R2D2 Hats, R2D2 Stars, R2D2 Beanie, Star Wars, Stars Wars, Beanie Hats, General Geekery, Earflap Beanie, Baby Stuff The Yeti has become a cultural icon, appearing in movies, literature, music, and video games. Perfect for a trip to Disneyland, Walt Disney World, snowboarding, skiing, cold play or just for fun everyday wear. Makes a great gift too! Yeti is made with Faux Fur for that "wild" look and a teal fleece lining, white yard braiding with White/Teal pom poms. This hat is an teen/adult size, fitting ages 8 and up. **CUSTOM ORDER FOR CHILDREN OR XL SIZES** Faux Fur, Walt Disney, Snowman Beanie, Yeti Abominable, Etsy Team, Beanie Hats, Culture Icons, Abominable Snowman, Disney Worlds The Sims 3 Showtime Katy Perry edition. Sims3, Videos Games, Collector Editing, Katy Perry, Los Sims, Perry Collector, Showtime Katy, Sims 3, The Sims cat mohawk? if only I could get mine to rock one of these... Cat Hats, Kitty Cat, Punk Rocks, Crochet, Knits Fashion, Hats Costumes, Rainbows Mohawks, Pets Toys, Mohawks Hats An IPad art series that is a mash up of Toy Story and The Shining. Creepy and awesome! Kyle Lambert, Stories Character, The Artists, Stories Meeting, Funny, Movie, Toys Shinee, Mashup, Toys Stories Zombie bon bons with cherry brains Holiday Gift, Zombies Chocolates, Valentine Day, Food, Chocolates Zombies, Halloween Snacks, Cherries, Zombies Head, Christmas Gift Nerd Taste, Nerd Vana, Personalized Gifts, Funnyness Awesome, Too Funny, Living Proof, Funny Babies, Maternity Baby'S Families Love these newborn baby shoot ideas! www.thedailybuzz.... Bedtime Stories, Book Worms, Photos Ideas, Newborns Pictures, Newborns Photos, Glasses, Baby Pictures, Baby Book, Baby Photos Super Hero onsies....cute Geek Baby, Superhero Onesies, Superhero Snapsuit, Baby Boys, Future Baby, Super Heroes, Justice League, Little Boys, Baby Stuff Everybody Poops--from threadless.com LOVE this website. Lim Henge, Art Prints, Too Funny, Funny Stuff, So Funny, Henge Swee, Everything Art, Icecream, Ice Cream Cones Star Wars Care Bears by me (www.keithcorcoran...). Stormy Bears and Darth Vabear Herpes, Nerd Geek Sht, Geeky Toys, Funny Bones, Care Bears, Stars Wars, Awesome People, General Geekery, Future'S Baby'S Nerdy Stuff star wars baby Baby Yoda, Stars Wars Nurseries, Star Wars, Future Baby, Future Kids, Baby Clothing, Stars Wars Baby, Starwars, Baby Stuff precious swimsuit for girls Little Girls, Bathing Suits, Kids Swimsuits, Girls Clothing, Swimming Suits, Bath Suits, Baby Girls, Two Piece, Beach Trips MIckey Mouse Ears Treat / Party Favor Thank You Goodie by natebarn, $24.00
Do laws restricting alcohol markets serve the public good? A new Mackinac Center study addresses the popular misconception that greater access to alcohol leads to more alcohol-related problems, including traffic accidents and health problems. The study, “Alcohol Control Reform and Public Health and Safety,” was co-authored by Michael D. LaFaive, director of fiscal policy at the Mackinac Center and Antony Davies, adjunct professor at Duquesne University. It addresses a neglected but significant remnant of Prohibition: the legacy of alcohol regulations and the “public safety” argument. Unique to the policy literature on this topic, LaFaive and Davies measured legislative effectiveness through alcohol-attributable deaths as well as binge-drinking and traffic fatalities. “This is the best and broadest measure of alcohol-related harms,” explains LaFaive. He says the study was prompted by “ruminations from well-intentioned but misguided opponents of alcohol deregulation.” With original analyses, as well as borrowing from academic research by economists Donald J. Boudreaux and Julia Williams and the University of Michigan, the study finds that there is no statistically significant relationship between heavy alcohol controls and alcohol-attributable deaths —and it is frequently an inverse relationship. LaFaive has given several speeches on the topic, and the Mackinac Center has released Viewpoints advocating reduced alcohol regulation since July of 2011. LaFaive’s most recent commentary, “Time to Scotch Michigan’s Wholesale Alcohol Monopolies,” was reprinted widely, appearing in MLive.com, the Detroit Legal News, the Saginaw News, the Bay City Times, The Flint Journal, the Jackson Citizen Patriot and the Grand Rapids Press. Through his analysis and this study, it is clear that the Mackinac Center’s efforts to highlight this issue are having an impact and leading reporters to seek out the Center for comment. This study was released prior to Gov. Rick Snyder’s recommendations to the 21-member advisory committee, formed last year by the Office of Regulatory Reform/Reinvention. The Mackinac Center also submitted 15 recommendations to the committee last year, and anticipates that several of those ideas will be included in the governor’s list. “I believe it will impact the debate in a strong way,” says LaFaive. “This is a very original, Michigan-centric contribution to the discussion.”
Categories: NER Community Former NER intern and Middlebury graduate Jenn Shapland writes for The Millions about her summer spent cataloguing Wallace’s papers at UT’s Ransom Center. I begin with a delicacy that is paralyzing. I fear getting anything out of order, out of place. I fear removing the rubber bands, the paper clips, the numbered Post-it notes. I’m distinctly aware that if I mess up, if I lose the order, the order is lost. That if I damage anything, there is no replacement. This is always the tricky, taxing part of archival work. The sense of responsibility is kind of overwhelming. I have to take out all the staples I find, because they make the paper deteriorate faster. Staples take me about five minutes each, using a thin metal wand, hands shaking. The process feels unnecessarily violent. [read the essay Categories: NER Recommends Listen to KCRW’s Bookworm Michael Silverblatt and David Foster Wallace discuss some of the structural components of Infinite Jest as well as their opinions about the plight of modern literature in this stunning interview from 1996: “MS: ‘…Something came into my head that may be entirely imaginary which seemed to be that the book was written in fractals?’ DFW: ‘Expand on that.’ MS: ‘It occurred to me that the way in which the material is presented allows for a subject to be announced in a small form, then there seems to be a fan of subject matter, other subjects, then it comes back in a second form containing the other subjects in small, then comes back again as if what were being described.. and I don’t know this kind of science but I said to myself, “This must be fractals”.’ DFW: ‘It’s, uh, I’ve heard you were an acute reader. That’s actually one of the things structurally going on. It’s actually structured like something called a Sierpinski Gasket…’ “
February 22, 2013 In the Book Notes series, authors create and discuss a music playlist that relates in some way to their recently published book. Previous contributors include Bret Easton Ellis, Kate Christensen, Kevin Brockmeier, George Pelecanos, Dana Spiotta, Amy Bloom, Aimee Bender, Myla Goldberg, Heidi Julavits, Hari Kunzru, and many others. Andrew Shaffer shares the shocking behavior of some of Western literature's biggest names in the always entertaining Literary Rogues: A Scandalous History of Wayward Authors. Publishers Weekly wrote of the book: "In this rollicking romp through a gallery of writers whose genius came with a price (alcoholism, drug addiction, depression, and other troubles), Shaffer offers a terrific blend of literary history, biography, and witty commentary." In his own words, here is Andrew Shaffer's Book Notes music playlist for his book, Literary Rogues: A Scandalous History of Wayward Authors: Music plays the role of the villain in Literary Rogues. In the preface, I describe meeting my first real author in the flesh when I was twelve (a comic book writer), and my subsequent disappointment that he wasn't as cool as the rock stars on MTV. He was just an ordinary guy, just someone's geeky dad. Up to that point, I was certain I was going to be a writer when I grew up. Suddenly, I wasn't so sure if that was the path I wanted to take. Did writers even get laid? It didn't seem too likely. For a few years, I entertained the idea of being a musician instead. Thankfully, literary rogues like Bret Easton Ellis and Hunter S. Thompson eventually seduced me back into literature. Literary Rogues is my tribute to the outlaw writers who lived and wrote on the margins of society. "It's So Easy" by Guns ‘n' Roses Nothing says "Sunset Strip in the eighties" like "It's So Easy." Drinking and driving, sleeping with your sister—what an awful, unapologetic song! If only writers could be this badass, I thought as a teenager. Probably not as cool in retrospect, but what a great bass line. "You Belong to Me" by Bob Dylan Dylan and his fellow singer-songwriters co-opted a large part of the audience for confessional poetry in the sixties and seventies, and poetry has never really returned to the national stage. Poet John Berryman didn't much care for Dylan, who he never forgave for "stealing" his friend Dylan Thomas's name. The hauntingly sparse "You Belong to Me" was maybe the first Bob Dylan song I ever heard, or at least remember liking—it was on the Natural Born Killers soundtrack. "Woman With Girdle" by Anne Sexton and Her Kind Some poets saw the writing on the wall. Anne Sexton fronted her own experimental rock group, Her Kind. Although they never officially released any recordings, you can hear this live track on YouTube. "Hello" by Poe I was looking over Bret Easton Ellis's "Book Notes," and saw he'd included Poe's "Haunted." I'm especially fond of her first record, Hello—especially the title track's ethereal dance beat. By the way, is there a more literary pop singer out there? Her name is derived from literary rogue Edgar Allan Poe, and her brother is New York Times bestseller Mark Z. Danielewski (House of Leaves). "I Hate Myself and Want to Die" by Nirvana In past generations, you can point to a novel that encapsulated the generational zeitgeist. In the twenties, that book was Fitzgerald's This Side of Paradise. In the eighties, Ellis's Less Than Zero. By the nineties, however, it seems that music had completely eclipsed literature in that respect—Nirvana's Nevermind played that cultural role for Generation X. This track, originally released on The Beavis and Butt-head Experience, was always one of my favorites. On a side note, "I Hate Myself and Want to Die" was also the working title for literary rogue Elizabeth Wurtzel's memoir, Prozac Nation: Young and Depressed In America. "No Church In the Wild" by Kanye West and Jay-Z Sometimes I wish novelists shouted out their own names in their books like rappers. "Fitzgerald!" "Plath!" No? Okay, that's probably a stupid idea. I love that "No Church In the Wild" was used in one of the Great Gatsby 3D trailers. Kanye West, Jay-Z, and Beyonce are the 21st century Hemingway and F. Scott and Zelda Fitzgerald. "Marilyn" by Dan Bern A catchy, fun song about Marilyn Monroe marrying literary rogue Henry Miller instead of Arthur Miller. In Bern's alternate history, Monroe would have dyed her hair blue, smoked opium in Paris, and might still be alive today. "The Flowers of Evil" by Marilyn Manson This is one of several tracks inspired by literary rogue Charles Baudelaire on Manson's new album, Born Villain. I listened to the album on repeat while editing Literary Rogues. Born Villain is as close as Manson has sounded to his Antichrist Superstar self in years, a real return to (creepy) form. I met Manson last year after one of his concerts and gave him an advance copy of the book. We also took a picture together of him simulating sodomizing me; I'll save you the therapy and not post it here. Andrew Shaffer and Literary Rogues: A Scandalous History of Wayward Authors links: AmyBeth Inverness interview with the author The Bat Segundo Show interview with the author The Daily Beast article by the author (top 10 misbehaving literary rogues) Huffington Post contributions by the author Monkey See profile of the author also at Largehearted Boy: 100 Online Sources for Free and Legal Music Downloads 52 Books, 52 Weeks (weekly book reviews) Antiheroines (interviews with up and coming female comics artists) Atomic Books Comics Preview (weekly comics highlights) Daily Downloads (free and legal daily mp3 downloads) guest book reviews Largehearted Word (weekly new book highlights) Note Books (musicians discuss literature) Shorties (daily music, literature, and pop culture links) Soundtracked (composers and directors discuss their film's soundtracks) Try It Before You Buy It (mp3s and full album streams from the week's CD releases) weekly music & DVD release lists Posted by david | permalink blog comments powered by Disqus
Character: Susan Pevensie, aka Queen Susan the Gentle of Narnia From: The Chronicles of Narnia First Appearance: The Lion, the Witch, & the Wardrobe Last Appearance: The Last Battle Created by: C. S. Lewis Portrayed in TV/Film by: Sophie Cook, Suzanne Debney, Anna Popplewell (pictured), Susan Sokol, Sophie Winkleman Character History: A young British woman from the first half of the 20th century, Susan Pevensie and her three siblings, Peter, Edmund, and Lucy, are sent away from their parents to live with Professor Kirke and Mrs. Macready, his servant. The children become bored in the large house, until the youngest, Lucy, discovers a portal into a magical world called Narnia through the back of a large wardrobe. Susan doesn't believe in Narnia's existence until pulled in, but once there, she quickly joins Lucy in finding their lost brother Edmund, who has been tricked by the evil White Witch. With the help of Mr. and Mrs. Beaver (talking animals), they meet both Father Christmas (who gives Susan a bow and arrow) and Aslan, Narnia's Christ-like savior and creator. Aslan manages to arrange his own sacrifice to save Edmund's life, and Susan and Lucy bare witness his death and resurrection. With Aslan's help, Susan, Lucy, and their brothers defeat the White Witch and her army. They are crowned Kings and Queens of Narnia. During her reign, which is considered the golden age of Narnia, Susan is courted by the prince of Calormene, but she refuses him after taking the advice of her brother, Edmund. She returns to their castle at Cair Paravel, after escaping by their ships. Some time later, the four Pevensies are hunting a White Stag, which Susan feels will lead them to something new. In reality, the four Pevensies fall back through the wardrobe. They are de-aged and returned to only moments after they originally went through. Susan returns to her normal life, until Narnian magic pulls the four Pevensies back to Narnia on their way to school the next year. They appear at Cair Paravel, but it is in ruins, because some time has passed. They encounter Trumpkin, a dwarf in the service of Prince Caspian, Narnia's rightful but displaced ruler. Susan defeats him in an archery contest to prove their identities, and Susan and her siblings journey to meet with Caspian. Along the way, Susan does not believe that Aslan is helping them this time, but Lucy does. Finally, Aslan appears to Susan as well, and she believes again. The four Pevensies help return Caspian to his throne. When Aslan sends them back to Earth, but Aslan tells both her and Peter that they are too old to return to Narnia again. Susan's memories of Narnia, or her ability to reconcile her adventures with the real world, fade as she grows up. She becomes more interested in make-up and boys, and becomes a true beauty. While her younger siblings and eventually her cousin go to Narnia, Susan never returns and begins to doubt its existence. In a horrific train accident, all of Susan's family, including her siblings, cousin, and parents, as well as Professor Kirke (who had been to Narnia himself as a child) are killed and reawakened in Aslan's Country, or Heaven. Susan does not appear in Heaven, and it is unknown whether she survived the accident, was even on the train, or whether she was condemned to Hell for her lack of belief in Narnia. Personality: Susan, as a child, was intelligent but not very curious. She read, but did not have the imagination of her sister Lucy, nor the bravery of her brother Peter. She liked to do things correctly. In Narnia, Susan was braver, and sure of her faith and place in the world, but was not as quick to believe in magic as her siblings. She still listened to her brothers, however. As an adult, Susan grew into a beauty, and became obsessed with worldly things, such as boys and lipstick. She had lost her faith in Narnia. Archetypes: Susan is primarily a Skeptic, the one who, when faced with the unknown, chooses to rely on what she already knows. She also fulfills the role of the Good Sister, caring for her siblings above all else. As an adult, she is a Pretty Girl, who likes pretty things. Analysis: Susan's fate has struck me harder than the fate of any other fictional character, mostly because its simple implied cruelty. Lewis, well-known for his disdain for sex and his love of the Christian faith (simply put, he will probably be remembered for Narnia nearly as much as he is remembered as one of the foremost Christian writers of the last century), and his friendship with Tolkien (who shares similar problems with adult female characters). I find it hard to reconcile the sheer misogyny of Susan's fate with the fond memories I have of these books from when I was a child. It's interesting to note that so many writers were similarly affected by Susan's fate (and the women of The Lord of the Rings) that it could be why fantasy and science fiction were one of the first places women entered equality with men in the fictional world. Narnia and The Lord of the Rings are considered the first true fantasy novels, so it's not surprising that later writers want to fix the genre's problems. Buffy, Xena, and Ripley have helped form the female consciousness and changed pop culture on screen, while Hermione, the Belgariad's Polgara and Ce'Nedra, and Jacqueline Carey's Phedre represent the salvation of Susan in the current fantasy novel. But as a character, Susan just sticks out not only for her character's fate, but because of what Lewis does to get her there. In The Lion, the Witch, & the Wardrobe, Susan is equal to her brothers and sister. She fights in the battle with the Witch, and witnesses Aslan's sacrifice. In the first book, despite Susan's reluctance to believe in Lucy's story originally, there's hardly anything to suggest what will happen later. Chronologically, The Horse and his Boy come next, but not in publishing order. This book was written later, and gives us the newer version of Susan. Even as Queen of Narnia, before being de-aged, Susan relies on Edmund to make her decision about whether or not to marry the foreign prince. She relies on him to make the escape plans. She is not the independent thinker she was in The Wardrobe. Notice the differences apparent between Susan of the novels and the Susan of the modern films, portrayed by Anna Popplewell. She's almost a completely different character. The novel Susan disdains violence and doesn't actively fight in any battle but the one with the Witch. In the movies? She is on the front lines, alongside her brothers. (She's also given a romance sub-plot with Prince Caspian, which either reinforces her Pretty Girl status or gives her a more Post-Feminist slant, depending on how you want to look at it.) I might be a man, but I do hate it when women in literature become the scapegoat. Lewis needed one of the characters to fall from grace - and he apparently had it in mind that the only fully developed woman of the series would be it. In fact, the other adult woman besides Mrs. Pevensie (who never actually shows up in the books, really), in the train accident is Polly, who the reader sees as a child but hardly ever as an adult. She reappears only just before her death, really. Essentially, I'm glad the modern films have redeemed Susan in whatever way they can. I think it speaks to the growing knowledge that women must be protrayed in equality with men, because let's face it, they are equal to men, people. Literature and art were one of the first bastions of the fight for equalit, and whether it was the Bronte sisters writing under male pseudonyms or Emily Dickinson's hidden poems, women have been producing literature alongside men for several hundred years. Susan Pevensie deserved a better fate than the one she got. I'm glad that modern audiences recognize this fact, despite Narnia's classic status. Other Versions: Susan has been portrayed in film, television, and cartoons multiple times, most recently with Anna Popplewell as Susan in the films released in the 2000's. This Susan was more stronger-willed than her novel counterpart and fought alongside her brothers, as well as having a romantic relationship with Prince Caspian. The character has also been parodied in films like Epic Movie and was featured in a short story by Neil Gaiman called "The Problem of Susan". She appeared in the comic book series The Oz/Wonderland Chronicles along Dorothy Gale, Wendy Darling, and Alice from Alice in Wonderland. Appears in: The Chronicles of Narnia
by MacDonald Harris. New York: Simon & Schuster, 1990. From the Jacket: In 1922 a suitcase containing almost everything that the young Ernest Hemingway had written up to that time was stolen in a train station in Paris. No trace of this suitcase or its contents has ever been discovered, despite the fact that the unpublished stories it contained would be immensely valuable. In present-day Los Angeles, a wealthy dilettante named Nils-Frederik Glas returns from Europe and produces some tories that bear a striking resemblance to Hemingway's early work. So begins MacDonald Harris' iongenous and provocative new novel, Hemingway's Suitcase. Nils-Frederik refuses to say where the stories came from, but he announces his intention to publish them to his son, Alan, a struggling literary agent. As Alan reads the manuscripts one by one, he realizes that if they are genuine Hemingway stories, Nils-Frederik has made the literary discovery of the century. If they are not, he is a clever forgerer and the perpetrator of a possibly criminal fraud. When Alan reluctantly agrees to help his father prepare the book for publication, he finds himself entangled in a web of intrigue and mystery, where the distinction between genuine and fraudulent is oddly blurred. It is a web spun by the cunning and duplicitous Nils-Frederik, made even more sinister by the sexual fantasies played out by his mistress, Charmian, and the bizarre private visions of Nana, his blind and aged mother. Alan's wife, Lily, looks for her truth in the stars, and even their nine-year-old daughter, Kilda, is adept at creating her own realities. Everywhere--in his convoluted relations with his father, in his curious attempts to create facsimiles of the "Hemingway" manuscripts, in his encounters with less-than-ethical academics, opportunistic publishers, and the ominous private sleuth Klipspringer--Alan is confronted by the question: What is false, what is real? Five of the disputed Suitcase stories, all having as their hero the Nick Adams of Hemingway's early fiction, are included in this witty, cleverly plotted, and compellingly readable novel. Are they the work of Hemingway or not? Let the reader decide--as all of the characters in Alan's world must finall come to terms with the lives they have created--or merely imagined--for themselves. Hemingway's Suitcase is a fascinating exploration of the duplicities of human consciousness. But is also a story with many suspensful twists and turns--a story that will challenge the reader's imagination and his own sense of reality as it spins towards its Critical Acclaim for Hemingway's Suitcase "In the winter of 1922 a suitcase containing part of a novel and twenty or so stories by Ernest Hemingway was stolen from a train. So starts this thoroughly enjoyable literary lark by veteran novelist Harris (The Little People), complete with five clever 'Hemingway' stories. Always in the foreground is th e suitcase, a symbol, 'like Pandora's box, or Faust's pact with the Devil. They're about good and evil...this one is about real and - "One of the most entertaining novels ever written about writing fiction...Mr. Harris's premise and its complications are so diverting, and the stories themselves so witty and evocative of Hemingway, that...one agrees to be manipulated in the interest of having a good time." The New York Times Book Review - "Harris is primarily a storyteller with a deceptively casual way of moving along a plot. His characters spring to life with the greatest of ease, he imparts a sense of mystery with every page, his English countryside is as exotic as Gabriel Garcia Marquez's Latin America." Dan Cryer, Newsday "Harris's range is, in fact, immense. Genuinely cosmopolitan, yet without pretensions, he deeply knows and loves the many foreign languages, landscapes, and mythologies that figure in his books. Compared with most modern tales of K mart angst or upscale introspection, Harris is an erudite writer, well versed not only in the history and arts of the past but in science and technology as well." Michael Malone, Philadelphia Inquirer - "Mr. Harris is an elegant and fastidious writer, a thinking man's novelist, with a penchant for international situations and polyglot dialogue." James R. Mellow, The New York Times Book Review - "There can no longer be any question whatever that MacDonald Harris is one of our major novelists." Arthur Zilch, Los Angeles Times Book Review - "MacDonald Harris's clever prose is imbued with generous humor and subtle wisdom. The seductive magic of literature and legend make this, Harris's fourteenth novel, another small classic in the gallery of great American Literature." The San Francisco Chronicle. Return to Harris/Heiney publications page
How to Get Your Convention and Visitors Bureau Working for You Convention & Visitors Bureaus (CVB’s) exist to help you, the meeting professional. They’re an excellent resource, if you know how to get them working for you. Each CVB offers slightly different services, tailored to its city or region. Following are some services most CVB’s offer. What you should expect from your CVB: - Assistance gathering proposals for accommodations and venues - Familiarization tours (FAM) and site inspections - Promotional literature to send to your attendees before the conference - Help locating services such as transportation or recreation - Suggested itineraries and group rates What Tourism Toronto can do for you that other CVB’s don’t: One expert point of contact connects you with all that Toronto has to offer through Tourism Toronto’s comprehensive roster of member products, services and resources. Tourism Toronto partners with you to ensure that you get the most from your Toronto event. - Take advantage of Tourism Toronto’s strong network of partners. For example, once you’ve decided to consider hosting your event in Toronto the Canadian Tourism Commission may help cover the costs of your flight into the city. - One of our expert representatives will meet you at the airport and personally escort you to every site inspection and around the city – our representatives will provide you with many options and creative suggestions for your event Tourism Toronto is one of only a few CVB’s that have a corporate team so we specifically know the needs of corporate and incentive clients. - RFP assistance to get you the best value possible. - Our team travels to your show the year before you come to Toronto to better understand your organization and the needs associated with creating a bigger and better experience for your delegates in Toronto. - Our customized projects will enhance your delegates experience ensuring that when they arrive to our city they feel welcome. Our team will create unique and creative ways to welcome attendees such as city signage, airport banners and much more. - Our CVB can ensure that you leave a lasting impression on your delegates and not on the earth. If hosting an environmentally friendly and sustainable event is of interest to you, our team can make it easy. Whether it’s putting you in contact with the right hotels and convention facilities so you can do it on your own or providing you with a green meeting consultant who will help you every step of the way Tourism Toronto can help make it green. Visit our green meeting webpage for more information. Get us working for you. Submit your Request for Proposal today. With so many exciting possibilities for unforgettable and inspiring incentives, offer your best a rewarding Toronto experience! Tips & Advice The Skinny on Carbon Offsetting. Stay up to date on the hottest shows and events going on in Toronto. Plus be the first to find out about new travel offers.
“This bracing and volatile book is an important one.” —Dwight Garner, The New York Times Twenty years ago, Ayatollah Khomeini called for the assassination of Salman Rushdie—and writers around the world instinctively rallied to Rushdie’s defense. Today, according to writer Paul Berman, “Rushdie has metastasized into an entire social class”—an ever-growing group of sharp-tongued critics of Islamist extremism, especially critics from Muslim backgrounds, who survive only because of pseudonyms and police protection. And yet, instead of being applauded, the Rushdies of today (people like Ayan Hirsi Ali and Ibn Warraq) often find themselves dismissed as “strident” or as no better than fundamentalist themselves, and contrasted unfavorably with representatives of the Islamist movement who falsely claim to be “moderates.” How did this happen? In THE FLIGHT OF THE INTELLECTUALS, Berman— “one of America’s leading public intellectuals” (Foreign Affairs)—conducts a searing examination into the intellectual atmosphere of the moment and shows how some of the West’s best thinkers and journalists have fumbled badly in their effort to grapple with Islamist ideas and violence. Berman’s investigation of the history and nature of the Islamist movement includes some surprising revelations. In examining Hassan al-Banna, the founder of the Muslim Brotherhood, he shows the rise of an immense and often violent worldview, elements of which survives today in the brigades of al-Qaeda and Hamas. Berman also unearths the shocking story of al-Banna’s associate, the Grand Mufti of Jerusalem, who collaborated personally with Adolf Hitler to incite Arab support of the Nazis’ North African campaign. Echoes of the Grand Mufti’s Nazified Islam can be heard among the followers of al-Banna even today. In a gripping and stylish narrative Berman also shows the legacy of these political traditions, most importantly by focusing on a single philosopher, who happens to be Hassan al-Banna’s grandson, Oxford professor Tariq Ramadan—a figure widely celebrated in the West as a “moderate” despite his troubling ties to the Islamist movement. Looking closely into what Ramadan has actually written and said, Berman contrasts the reality of Ramadan with his image in the press. In doing so, THE FLIGHT OF THE INTELLECTUALS sheds light on a number of modern issues—on the massively reinvigorated anti-Semitism of our own time, on a newly fashionable turn against women’s rights, and on the difficulties we have in discussing terrorism—and presents a stunning commentary about the modern media’s peculiar inability to detect and analyze some of the most dangerous ideas in contemporary society. “An intellectual thriller in the form of a polemic, with Inspector Berman hunting for clues… Maybe Berman’s book will start intellectuals talking, and not just about each other. Maybe some of the previously silent will begin to speak out against the death squads rather than snark about their victims and targets.” —Ron Rosenbaum, Slate “Despite the complexity, history and nuance of these subjects, the author probes each issue with elegant, incisive language. A stunning, riveting commentary.” —Kirkus (starred review) “It has been quite astonishing to see how far and how fast there has been a capitulation to the believable threat of violence…. I join with Paul Berman in expressing utter astonishment at this phenomenon, or rather at the way that it is not a phenomenon.” —Christopher Hitchens, Tablet “Paul Berman is, just like me and I think many others, surprised—and that’s an understatement—that some liberals choose to defend ideas that are very illiberal and choose to look away from practices that are even more illiberal. Why are they excusing radical Islam? That fascinates Berman and it also fascinates me, what the presence of Islam does to the liberal psyche in the West.” —Ayaan Hirsi Ali, Maclean’s “Powerful.” —Columbia Journalism Review Praise for TERROR AND LIBERALISM “Berman, one of America’s leading public intellectuals, has written the first significant ideological contribution to the United States’ war on terror…. It deserves, even demands, to be read.” — Foreign Affairs “A fluid and lucid essay by one of America’s best exponents of recent intellectual history.” —The Economist “Terror and Liberalism is several fine things: an evaluation of what is wrong in the Muslim world, a defense of humanist values, a messageof hope and, not least, a scintillating contribution to political literature.” —The Wall Street Journal “One of the most challenging accounts of the post-9/11 world.”—The New York Times
Malone University Writers Series closes the year with David Giffels on April 1 March 19, 2014 | Release # 6885 The Malone University Writers Series will close out the 2013-2014 academic year with popular and versatile author David Giffels Tuesday, April 1 at 7 p.m. in the Everett L. Cattell Library, located on the campus at 2600 Cleveland Avenue N.W. in Canton, Ohio. The program is free and open to the public. David Giffels is the author of The Hard Way on Purpose, a collection of linked essays about the quirky, hardbitten cultural landscape of America's "Rust Belt." An assistant professor of English at University of Akron, Giffels teaches creative nonfiction in the Northeast Ohio Master of Fine Arts Program. Giffels' previous book, All the Way Home: Building a Family in a Falling-Down House (William Morrow/HarperCollins, 2008), is a memoir of growing into young fatherhood while trying to reclaim a ramshackle mansion. The book received widespread acclaim, from the New York Times, which described it as "sweet and funny" to the Los Angeles Times, which called it "a truly wonderful book" to Oprah's O at Home magazine, where it topped the "Fantastic Summer Reads" list. Giffels is coauthor of Are We Not Men? We Are Devo! and Wheels of Fortune: The Story of Rubber in Akron. He was a longtime columnist for the Akron Beacon Journal and a contributing commentator and essayist on National Public Radio station WKSU. His essays appear in the anthology Rust Belt Chic; The American Midwest: An Interpretive Encyclopedia; The Appalachians: America's First and Last Frontier; and West Point Market Cookbook. He has written for the New York Times Magazine, the Wall Street Journal, Grantland, Redbook and many other publications. He also was a writer for the MTV series Beavis and Butt-Head. Giffels' recent awards include the Cleveland Arts Prize for literature, the Ohioana Book Award, the Associated Press' "Best News Writer in Ohio" award, and the National Society of Newspaper Columnists award for general excellence. Malone University, a Christian university for the arts, sciences, and professions in the liberal arts tradition, affiliated with the Evangelical Friends Church, awards both undergraduate and graduate degrees in more than 100 academic programs. Malone has been recognized by the prestigious Templeton Foundation as a leader in character development, as one of Northeast Ohio’s Top Workplaces by the Cleveland Plain Dealer, and is ranked among the top colleges and universities in the Midwest under the category Regional Universities according to U.S.News & World Report's America's Best Colleges 2014,has been awarded the designation Military Friendly School by Victory Media, and is named to AffordableCollegesOnline (ACO)’s Best Lifetime Return on Investment list for the State of Ohio. Suzanne Thomas, APR Director of University Relations 2600 Cleveland Avenue N.W., Canton, OH, 44709 fgubznf+znybar+rqh Phone: 330-471-8239
Previous History: The Rise of the Mongol Empire Khubilai Khan, the Conquest of China, and the Foundation of the Yuan Dynasty Mongol Rule over China The End of Mongol Rule The Northern Yuan The so-called "Mongols" were actually a heterogenous group of different nomad peoples of Turkish and "Tartar" origin. The word "Mongol" is derived from the name of a tribe called Manghol. Although the cultural stages of these ethnical groups were quite different, they had a common language (Mongolian or Turkic) that allowed a unification under the hand of the strongest clan. The strongest ethnics were the Merkit and the Tatars. They were socially divided into aristocracy, common people, and slaves and prisoners of war. Except animism, the higher religions of Nestorian Christianity, Manicheism and Buddhism had won many followers among the "Mongols". The economical base of these peoples was cattle breeding, hunting and trade with different Inner Asian states and the empires of China (Jin 金, 1115-1234, Western Xia 西夏, 1038-1227, and Southern Song 南宋, 1127-1279). The unifier of the nomad peoples, Temüjin, was a originally vasall of the Kereyid and had been used by the Jin court to subdue the Kereyid Tatars. By 1206 Temüjin had defeated all his opponents and unified the Mongol people under his rule. He adopted the title of Great Khan (qan, or qaghan, qaγan, Chin. kèhán (!) 可汗) and was called Čingghis Qan (Genghis Khan, Gengghis Khan, Chinggis Khan). Chinggis used the expertise of the culturally more advanced Uyghurs to crush the empires of northern China. His basic aim was not to conquer the territory, but only to exploit their wealth in a manner that earlier steppe peoples had also used when looting Chinese border towns. The capital of the early Mongol empire was Karakorum (Qara-qorum, Karakhorum, "Halahelin 哈剌和林", short: Helin 和林) at the Orkhon River. Chinggis' campaigns against the Jin empire had begun in 1211. Its central capital Zhongdu 中都 (modern Beijing) fell in 1215, and the Mongols installed a military government. In 1217 a large campaign, consisting of the armies of different tribes and peoples of the grasslands north of the Gobi desert, Khitans (a proto-Mongolian people that had founded the Liao empire 遼, 907-1125, in northern China), Jurchens (the people that had founded the Jin empire in northern China) and submissive Chinese, was launched against the Central Plain of the Yellow River, the heartland of northern China. The campaign was led by general Muqali (Mukhali, "Muhuali 木華黎"). The Mongols also found support among the Chinese gentry of the former Jin empire who saw their chance to get rid of the domination of the foreign Jurchens, founders of the Jin empire. Such were Zhang Rou 張柔, Yan Shi 嚴實, Zhang Rong 張榮, Li Quan 李全 and his son Li Tan 李璮. A political balance between Persia and the new Mongol empire was not very easy, and some difficulties between these two empires led to the first Mongol expedition to the west: northern Persia and southern Russia (modern Ukraine) became part of a huge steppe empire. Chinggis (posthumous title Emperor Taizu of the Yuan 元太祖, r. 1206-1227) died in 1227, just when the Tangut empire of Western Xia had submitted to the Great Khan. Chinggis' son Öködei (Ögedei, "Wokuotai 窩闊台"), elected Great Khan during the Mongolian state council (Mongolian khuriltai, Chinese rendering "hulitai 忽里台"), in 1229, started to fulfil the left heritage of the first Great Khan: the conquest of the Jin empire. In three great division, the Mongol armies advanced to the south, Öködei himself commanding the central division, Temüge-otčigin ("Tiemuge Wochijin" 鐵木哥斡赤斤") the eastern division, and Tölüi (Tolui, "Tuolei 拖雷") the right division. They entered Jin territory from the Han River 漢水 valley. The Mongol armies merged, but general Subotai ("Subutai 速不台") was not able to take the besieged Jin capital Kaifeng 開封 (Bianliang 汴梁, modern Kaifeng, Henan). Only a year later, when Emperor Aizong of the Jin 金哀宗 (r. 1223-1233) had fled, the capital fell by treason. The Mongols then besieged the city of Caizhou 蔡州 (modern Xincai 新蔡, Henan), where the emperor had fled to, and sent to the Southern Song court a suggestion for a joint attack on the last strongholds of the Jin empire. The militarily relatively weak Song saw their chance to conquer back northern China that had been lost with the invasion by the Khitans almost three centuries earlier. It was therefore decided to ally with the Mongols, and general Meng Gong 孟珙 led a Song army to the north. He helped the Mongols to break the fortress of Caizhou in early 1234. Shortly before, Mongol armies had conquered the Jin satellite state of Dongzhen 東真 (in the area of modern Jilin province and North Korea) and a great part of the Korean kingdom of Goryeo 高麗. Chinggis' grandson Batu ("Badu 拔都"; in European sources called Bathy) conquered a great part of the Russian principalities, subjugated the Turkish Kipchaks, and the Volga and Kama Bulgars. The Mongol hords terrified the eastern European states. Only shortly after the destruction of the Jin empire, Öködei sent his sons "Kuochu 闊出" and "Kuoduan 闊端" to begin with the conquest of Song China, their ally of yesterday. Öködei had a Khitan advisor named Yelü Chucai 耶律楚材 who compelled the Great Khan to make use of the traditional Chinese taxation method in northern China. Instead of plundering and enslaving the peasantry, Yelü Chucai argumented, a regular taxation would yield regular revenues in the long run and not deprive the Mongols' source of exploitation of its wealth. The local administration in northern China - and later in the south - was taken over whithout making personal changes, but every Chinese or Jurchen official was controlled by a Mongol or Central Asian supervisor, an office called darughachi ("daluhuachi 達魯花赤"). Household registers were retained and adjusted in 1235 as base for the taxation. To make administration easier, five households were obliged to pay a collective tax in the shape of cloth (wuhu si 五戶絲). For their merits achieved during the conquest, the Mongol princes and chieftains were rewarded with large fiefs in the north China plain. The Central Asian merchants of Turkish, Uyghurian or Persian origins were given special rights and monopolies in the trade. Furthermore, they were given the exclusive right to collect taxes and to monopolize important branches of the economy and the revenues the sales of salt. Generals or potentates of the Jin empire who quickly submitted to the Mongols and joined their cause were rewarded with hereditary titles of marquess (shihou 世侯). The sudden death of Öködei (posthumous title Emperor Taizong of the Yuan 元太宗, r. 1229-1241) in 1241 forced the Mongol troops to interrupt their campaign and to return to Mongolia for the election of the new khan, that eventually should be Güyük ("Guiyou 貴由"), Öködei's son, who adopted the title of Khan in 1246. Between 1241 and 1246 Öködei's widow Naimaĵin Töregene ("Naimazhen Tuoliegena 乃馬真脫列哥那") acted as regent in the Mongol homeland. Güyük's reign experienced the first split of the great Mongol empire. Batu, khan of the Golden Horde in the far west, was no friend of him. Only Gügük's (posthumous title Emperor Dingzong of the Yuan 元定宗, r. 1246-1248) early death in 1248 could prevent a military confrontation between Mongols and Mongols. Oγul Qaimiš ("Wowuli Haimishi 斡兀立海迷失"), widow of Gügük, took over regency until the new Great Khan would be elected. Batu proposed to elect Möngke ("Mengge 蒙哥"), son of Tolui, the youngest son of Chinggis Khan, and enforced his election during an incomplete state assembly in which the supporters of the lines of Čagatai and Öködei did not participate. These Chingisids contined to deny in a common assembly with Batu and Möngke. Mönke therefore one-sidedly declared himself Great Khan in 1251. He was not willing to tolerate differences among the descendent lines of Chinggis. He killed Oγul Qaimiš and Gükük's adherents Čingqai ("Zhenhai 鎮海") and Elĵigidei ("Yelizhijidai 野里知吉帶") and ordered Güyük's son "Shiliemen" 失烈門 to go to the western front. While Möngke tried to establish an effective central government of the vast empire, his brothers took over the mililtary duties: Hülagü ("Xüliewu 旭烈兀") conquered Persia, and the Chinese affairswere laid in the hands of Möngke's younger brother Khubilai (Qubilai, "Hubilie 忽必烈"). In 1252 a kind of household registration within the great Mongol empire was undertaken. It was a great difference for the Mongols to erect a khanate on a vast territory in the scarcely populated areas of Inner Asia, Persia or southern Russia, or to control a densely populated empire with a highly sophisticated administration and culture like China. Immediately after being named military commander over the region of the former Jin empire Khubilai invited Khitan, Jurchen and Chinese scholar-officials to advise him how to govern his realm: Liu Binzhong 劉秉忠, Zhang Wenqian 張文謙, Lian Xixian 廉希憲, Yao Shu 姚樞, Xu Heng 許衡, and Shi Tianze 史天澤 proposed to install regular pacification commissions (anfusi 安撫司) and military commissions (jinglüeshi 經略司) as administrative units, and to propagate the creation of military agro-colonies (tuntian 屯田) as germs for the reconstruction of the economy. Chinese, Khitan or Jurchen advisors were essential for Khubilai's style of governing China, but the Mongol prince and eventual Great Khan had always to create a balance between the interests of the Mongol nobility and the prosperity of his own domain. When the Chinese governor Li Tan rebelled against him in 1262, Khubilai sacrified almost all Chinese advisors in higher positions and replaced them with Persians and Uyghurs. Khubilai becomes Great Khan Great Khan Möngke ordered Khubilati to take over the conquest of Dali 大理, an empire in the southwestern region of Yunnan, from where it would be possible to destroy Song China. After Khubilai had conquered the capital of Dali the new territory was left to general Uriyangqadai ("Ulianghedai 兀良合台") for further consolidation, and Khubilai headed back to the north to keep a close eye on the administration of his domain in northern China. He had constructed a Chinese-style palace in his "Upper Capital" (Shangdu 上都) Kaiping 開平 (modern Duolun 多倫, Inner Mongolia; the "Xanadu" of Western reports). Great Khan Möngke meanwhile had learned that Khubilai was able to exploit great ressources from China in a very sophisticated way, and envious of his success, Möngke left the conquest of Southern Song to other generals like Alamdar ("Alandar 阿藍答兒") and "Tachar 塔察兒". These conquered the region of the Han River and eastwards to the Huai River 淮水 region which means that practically all territory north of the Yangtse River was in Mongol hands. Möngke himself commanded an army to conquer the rest of Sichuan. But the conquest of Sichuan proved far more complicated than expected because the Chinese governor resisted the Mongol assaults for long months in the fortress of Diaoyucheng 釣魚城. The Mongol troops did neither smoothly advance, and Möngke could not but hand over command to the experienced Khubilai in 1258. Khubilai reorganized the Mongol troops, installed the Chinese Yang Weizhong 楊惟中 and Hao Jing 郝經 as provisory governors of Sichuan and forbade his troops looting and marauding. In the same moment Mönkge died (posthumous title Emperor Xianzong of the Yuan 元憲宗, r. 1251-1259) during the siege of Diaoyucheng. Neglecting the critical situation of this moment, Khubilai did not interrupt his campaigning and the duty to finish his task. Ariq-Böke (Arigh Böke, "Alibuge 阿里不哥"), his brother, who commanded the troops in Mongolia, saw his chance to assume the powerful throne of the Great Khan. Following the advice of Hao Jing, Khubilai negotiated a cease-fire with the Song commander Jia Sidao 賈似道 and hurried to the national assembly in Mongolia. In 1260 Khubilai was elected Great Khan by his own state assembly and simultaneously proclaimed a Chinese reign motto (Zhongtong 中統 "Well-balanced government") as emperor of China. His empire was governed through a Chinese-style Imperial Secretariat (zhongshusheng 中書省), and the various regions of China were governed through "en route"-branch secretariates (xing zhongshusheng 行中書省). The abbreviation of this administrative units, sheng 省, was later to become the term for "province". The war with Ariq-Böke and the foundation of the Yuan dynasty But Khubilai was not safe yet on the throne of the Mongol empire. His brother Ariq-Böke had himself proclaimed Great Khan and was supported by the Mongol troops standing in China's west (modern Gansu, Shaanxi and Sichuan). To secure title and empire, Khubilai commanded his troops himself to engage in a protracted war among brothers. Most campaigns and battles took place far in the west and destroyed the territory and economic base of the Central Asian khanates. Only in 1264 Ariq-Böke submitted to his stonger brother. Khubilai was accepted as the Great Khan, but the western khanates began to indulge in a fratricidal war that would end the unity of the Mongol world. Khubilai and his descendants became rulers of China and Mongolia. Under the influence of Chinese and Jurchen officials, Khubilai went on to regularize the administration of China's north without depriving the Mongol nobility of their privileges. Yanjing 燕京 (modern Beijing) became "Central Capital" (Zhongdu 中都), and an imperial palace was constructed on the traces of the old buildings. In 1271 Khubilai proclaimed the Yuan dynasty 元, and the Central Capital was made main capital of the empire. It was called "Great Capital" (Dadu 大都), in Mongolian-Turkic "Khanbalik" ("City of the Khan"). The conquest of the Southern Song empire The conquest of southern China with the Southern Song empire proved to be far more complicated than expected. The campaign began in 1268 with the siege of the double-city Xiangyang 襄陽 and Fancheng 樊城 (modern Xiangfan 襄樊, Hubei) by the generals Aĵu ("Azhu 阿朮") and Liu Zheng 劉整, a defector from the Song. Only in 1274 the stubbornly defended fortress capitulated and the way to southern China was open. General Bayan ("Boyan 伯顏") marched down the Han River to the Yangtse valley, and Liu Zheng and Dong Wenbing 董文炳 started to attack Song China in the Huai River region. Although there are also many examples of heroic Song commanders withstanding the assaults of the Mongol marine troops, there were many contingents that capitulated without fighting. The actual powerholder of the Song empire, Counsellor-in-chief Jia Sidao, resisted the intruding Mongol troops only half-hearted. In 1275 the Song emperor Gongdi 宋恭帝 (r. 1274-1275) offered his capitulation after the capital Lin'an 臨安 (modern Hangzhou 杭州, Zhejiang) was pocketed. In 1279 the conquest was ended, and China was reunited for the first time since the end of the 9th century - although not but a native, but by a foreign conquest dynasty. The conquests of Khubilai were not yet ended, but within China, a time of consolidation began. Two times, in 1274 and 1281, Khubilai tried to invade Japan, but his flots were repelled by typhoons - by the Japanese interpreted as "Divine Winds" (kamikaze 神風). 1282 a flotilla under general Söghetei ("Suodu 唆都") was sent out to conquer Champa ("Zhancheng" 占城; middle part of modern Vietnam), two years later Prince "Tuohuan 脫歡" was sent out to conquer Annam 安南 (northern Vietnam). In the same period of time, Mongol troops were sent out from Yunnan to conquer the Burmanese state of Bagan ("Bugan 蒲甘") and devastated this holy city thoroughly. Mongol flotillas were event sent out to conquer Java ("Zhuawa" 爪哇), an undertaking that was determined to failure. So far the expansion politics of the early Yuan period. At home, in China, the situation was relatively calm after the reunification of Chinese territory. Indeed, Khubilai invested much energy in the establishment of an effective government and administration in Chinese style which was better suited than the exploitative management adopted elsewhere. The dissolution of the Great Khanate Marxist historians often overstress the significance of further wars of resistance against the Mongol government or - in their eyes - occupation. Much of these popular uprisings in the 1280es were mere small-scale rebellions against high taxation, like the rebellions of Huang Hua 黃華 and Zhong Mingliang 鐘明亮. Such peasant uprisings were quite "normal" through all ages of Chinese history and were almost naturally occurring through the Yuan period. A much greater threat to the rule of Khubilai were the expansion wars to Japan and the south that imposed an enormous burden on the state treasury, and the wars against the other Mongol khanates (ulus "hordes", Chinese rendering "wulusi 兀魯思") who rebelled against the overlordship of Khubilai. Qaidu ("Haidu 海都") from the Öködei Ulus, and Boraq ("Bala 八剌") from the Čaqadai Ulus united in a front against the Great Khan Khubilai in 1276, inmidst Khubilai's campaigns against Southern Song. This second threat from Mongol khanates posed upon upon Khubilai the question whether he was willing and able to control all khanates, or to reduce his power to the rich region of China. In the struggles and war campaigns against his western neighbours the "Chinese" khan was not able to extend his control beyond the Tarim Basin. This region was mostly inhabited by Uyghurs that had long been accustomed with diplomacy, communication and trade between east and west. The Yuan government had learned much from these Central Asian specialists and employed many Uyghurs and other Central Asian Moslems within their bureaucray. Governing China and the Chinese At the same time Khubilai had to appease the claims of the Mongol nobility for land and wealth that had been promised to them with the beginning of all military undertakings in Mongolia. The Mongols installed translation offices, and although they had to rely on Chinese experts for administration, their deep distrust into their new subjects led to the decision that high offices could only be appointed to Mongols, and that tax administration could only be laid in the hands of the Uyghur and Persian allies of the Mongols. The Mongol chieftains could be pursued not to use the Chinese soil as a prairie ground for their horses as they had intended to do during the first years after the conquest of the Jin empire. Yet Mongol rule exerted a deep discrimination among different ethnic groups of the Mongol empire - at least theoretically. The population was classified in occupational ranks or levels based on a combination of ethnic and political considerations. The highest social status granted to the Mongols, the secondary status to their allies and non-Chinese persons from Inner Asia (called semuren 色目人 "special people"), the third status was granted to the inhabitants of north China, subjects of the former Jin empire, including the Khitans and Jurchens (called hanren 漢人 "Han people" or "Chinese"), and at the lowest level of society were the southern Chinese, subjects of the former Song empire (called nanzi 南子 "southlings" or manzi 蠻子 "barbarians"). This discrimination was the basis for taxation and the use of the penal law, but also vice versa for privileges granted to the members of the higher ranks. Mixed marriages were forbidden, and promotion inside this social system was in theory impossible. While Chinese historians often blamed the Mongols for exerting a government of exploitation where the Chinese, especially in the south, were not seen as much more than beasts, scholarly research has made evident that in practice, particularly on the local level, these restrictions were not stringently adhered to. Thus, the senior co-incumbent office of the darughachi was often filled by Chinese and not, as law prescribed, by Uyghurs, Persians or Mongols. And the Mongols were not in total illiterate, barbarious and ignorant of Chinese culture, but after a few generations, it became necessary that Mongol officials learned Chinese and took decisions in a cooperative way rather than by pure authority. It can furthermore be seen that at the end of the Yuan period, there were many Chinese warlords that fought for the Yuan dynasty and against looters, bandits and rebels like Zhu Yuanzhang 朱元璋, the eventual founder of the Ming dynasty 明 (1368-1644). In 1294 Khubilai died without having nominated a heir. He was not obliged to do so according to Mongol law. His Chinese-style posthumous temple name is Emperor Shizu 元世祖 (r. 1260-1294). After the death of Khubilai Khan the imperial court of the Yuan was dominated by faction struggles among the Mongol nobility that sought to control the emperors. Khubilai had refrained from naming a successor because according to steppe traditions it should be the Mongol nobility that elected the new khan during a state assembly, a khuriltai. This custom would be a problem for the stability of the Yuan empire in later years because the Chinese bureaucratic empire required a more regular succession without greater conflicts. Nevertheless Khubilai's grandson Temür, son of Prince Jingim ("Zhenjin" 真金), had obtained the seal of heir apparent and was backened by his mother Kököjin ("Kuokuozhen") and by deserved officials of Khubilai, namely Üs Temür ("Yuxi Tiemu'r 玉昔鐵木耳"), Bayan ("Boyan 伯顏"), the Turk Bukhumu ("Buhumu 不忽木"), and Ölĵei ("Wanze 完澤"), all of which were experienced with the Chinese state bureaucracy and experienced military leaders. These highly estimated persons enforced the election of Temür against his opponent Kammala ("Ganmala 甘麻剌"). Temür saw himself as successor (posthumous title Emperor Chengzong 元成宗, r. 1294-1307) and perpetuator of the will of his grandfather. Retaining the loyal ministers of his grandfather like Ölĵei, Bukhumu and later Harghasun ("Halahasun 哈剌哈孫"), Emperor Chengzong was dedicated to develop regular patterns of a peaceful Mongol rule over China. While Ölĵei and Harghasun were grand counsellors, Bukhumu as a well-educated Confucian scholar took over the task of Censor-in-chief. Many other high post of the Yuan central government were filled with people of different origins, Chinese, Uyghur and Mongols, in order to balance ethnic origin and "ideologies". Yet although many of these statesmen were guided by the Confucian principle that the tax burden was to be kept low, the Yuan state treasury was permanently plagued by deficits, caused by extremely high apanages to imperial princes, a blown-up bureaucracy with thousands of officials just being paid for doing nothing, and widespread corruption even among the highest state officials, Mongols as well as Chinese. Zheng Jiefu 鄭介夫 pointed out in his memorial Taipingce 太平策 that jurisdicitional proceedings took too much time. In that situation, much of the government expenditure had to be paid by the monetary (silver) reserves in the provinces. Emperor Chengzong soon called off all preparations that had by his father been initiated for further expansions to Annam (Vietnam) and Japan. Yet military expenditure was necessary for the suppression of rebellions in the southwestern mountainous area, led by tribal chieftains like Song Longji 宋隆濟 and the female leader Shejie 蛇節. It took long months for the generals Liu Shen 劉深 and Liu Guojie 劉國傑 to supress these rebellions. In 1304 Emperor Chengzong concluded a peace treaty with Du'a ("Duwa 篤哇") and "Chabar 察八兒", khans of the Čaqadai Ulus and the Öködei Ulus, respectively. From then on, the western border of the Yuan empire was undisputed by territorials claims. Upon his death, Empress Dowager Bulukhan ("Buluhan 卜魯罕") and Akhutai ("Ahutai 阿忽台") planned to install Ananda (阿難答), but under Prince Tura ("Tula 禿剌"), Prince Yakhudu ("Yahudu 牙忽都"), Harghasun as Right Counsellor-in-chief and the Chinese imperial tutor Li Meng 李孟 preferred the princes Qaišan and Ayurbarwada who had in general better conditions for the throne. Ayurbarwada advanced to the capital, killed Akhutai and arrested the Empress Dowager in a coup d'état. It was thus the first time that a Mongol ruler came to the throne without being elected on a khuriltai: the new khan was only reaffirmed ex post by the Mongol nobility. The mother of the two princes, Targi ("Daji 答己"), made the elder, Qaišan, emperor under the condition that the younger, Ayurbarwada be his successor. Qaišan (posthumous title Emperor Wuzong 元武宗, r. 1307-1311) was a young man who was rather inclined to the traditional martial Mongolian way of life than to a bureaucratic administration. His retainers hoped to exploit the wealth of China to reunite the Mongol world that was divided into four different khanates (ulus), but their ambitions were not fulfilled. Instead of planning military campaigns against the other khantes, mperor Wuzong indulged in dissipative activities and wasted the wealthes of the state treasury. He even displayed disgrace for his supporter Harghasun and removed him from the Great Capital. The new emperor's disinterest in the conduction of appropriate government led to a deep financial crisis. Highest official posts were not only filled with Wuzong's retainers that he had brought with him from Mongolia; he even bestowed high titles and posts to some of the smallest fray among his entourage. Administrative matters bypassed the Chinese bureaucratic channels and were forwarded by his private court attendants. The state treasure suffered extreme deficits through these practices, and in this financial crisis the Uyghur official Toghtō ("Tuotuo" 脫脫) proposed to reintroduce the Chinese-style Department of State Affairs (shangshusheng) that was determined to organize fiscal reform. New paper bills and two new copper coins were issued, and silver money was taken out of circulation, but only in certain provinces, and not throughout the empire. Furthermore, the prices on salt licences were raised, liquor production licences were introduced, taxes in array were recollected, and in some areas surcharges were introduced, and the quota for the so-called tribute grain to be be shipped to the state granaries were raised. Tax collectors obtained a commission in case of high collections. But instead of reducing expenditure, the Department only prospected for new sources of income. In the minds of the population, these new kinds of taxation and the resulting inflation created a bad image of the Yuan government, and therefore a lot of high offials contradicted the introduction of these measures. The distastrous fiscal policy of Emperor Wuzong's ministers "Baoba 保八", Yue Shi 樂 實 and "Sanbaonu 三寶奴" and natural disters aggravated the situation and critically affected the living standards of vast parts of the population. These fiscal reforms were therefore nullified after Emperor Wuzong's early death. Emperor Wuzong left the throne to his younger brother Ayurbarwada (posthumous title Emperor Renzong 元仁宗, r. 1311-1320). He was the best-educated ruler among all Yuan emperors. Through the guidance of his tutor Li Meng he was able to study the Confucian Classics as well as Buddhist writings, poetry, and assembled around him scholars, painters and calligraphers from China and Central Asia. Emperor Renzong decisively pursued a politics of accomodation of Mongol rule to the Chinese bureaucratic and state ritual system. He first dismissed or even executed courtiers and retainers of his brother Emperor Wuzong, abolished the Department of State Affairs and the new coins and paper bills. He then established a state council staffed with experienced loyal persons of Mongol and Chinese origin and restored the state examination system that provided the Chinese access to official career. Many of his highest officials were Chinese scholars, like Zhang Gui 張珪, Li Qian 李謙, Hao Tianting 郝天挺, Cheng Jufu 程鉅夫 and Liu Minzhong 劉敏中. Emperor Renzong selected scholars to be teachers in the Hanlin Academy 翰林院, the Academy of Scholary Worthies (jixianyuan 集賢院) and Directorate of Education (guozixue 國子學). This measure gave a chance for Chinese scholars to climb the ladder of official career, and at the same time gave an impetus to Mongol and semu people to study Chinese thought. He also took care for the regularization of the darughachi system by which Chinese officials of all levels were controlled by Mongols who often successful cooperated with their Chinese conterparts in administrative means. The grand-counsellor Temüder's ("Tiemudier 鐵木迭兒") proposal to deprive the Mongol princes of the right to install their own judges (jarghuchi) and darughachi met the harsh resistance of the Mongol nobility. Emperor Renzong intiated the compilation of a legal code, the Da Yuan tongzhi 大元通制 (see Tongzhi tiaoge 通制條格), published 1323, and the statecraft statutes Yuan dianzhang 元典章. The Confucian among the Mongol emperors did not only have translated Confucian Classics and Chinese books on government (e.g. Zhenguan zhengyao 貞觀政要) and social behaviour into Mongolian, but had also compiled the agricultural work Nongsang jiyao 農桑輯要 "Essentials of agriculture and sericulture". Factional struggles at the court impeded reforms and even the right exertion of imperial power during the last years of Emperor Renzong's reign. The court was dominated by Empress Dowager Targi and Temüder who reigned with autocratic power. Although a faction around Li Meng, the Khitan Xiao Baizhu 蕭拜住 (Baiju), the Tangut Yang Dorji and the Önggüd Zhao Shiyan 趙世延 unveiled the corruption of Temüder, he was protected by the Empress Dowager. While the court at the Great Capital was bound by struggles between these groups, the high tax burden caused peasant upraisings like that in 1315 by Cai Wujiu 蔡五九. Renzong left the throne to his son Šudibala (posthumous title Emperor Yingzong 元英宗, r. 1320-1323) who tried to free himself from the influence of Grand Empress Dowager Targi and the mighty Counsellor-in-chief Temüder. Supported by Confucian scholars like Ke Jiusi 柯九思, he installed Baiju, descendant of the honored general Mukhali, as his Left Counsellor-in-chief and therewith won the support of large parts of the Mongolian aristocracy. But only after the death of Temüder and the emperor's grand mother, the retainers of Temüder could be executed. Emperor Yingzong announced further steps in the sinification of governmental structures, especially in means of education of scholar-officials in the state academies. He also appointed important Chinese scholars in highest state offices, like Zhang Gui, Wu Yuangui 吳元珪, Wang Yue 王約, Han Congyi 韓從益, Wu Cheng 吳澄, and "Bozhulu Chong" 孛朮魯翀, all of them serving as his advisors. Superfluous posts were planned to be abandoned, corruption should be fighted, and a corvée-assistance law (zhuyifa 助役法, a fix proportion of the field was reserved to deliver an amount of money as a substitution for labour corvée) was issued to relieve the corvée burden of the small peasants. Nevertheless, Emperor Yingzong also was an ardent adherent of Buddhism and spent huge sums for the construction of Buddhist temples, like the Dazhaoxiao Temple 大昭孝寺 near the Great Capital. Moslems on the other side were somewhat repressed during his short reign. The tensions between the pro-reforming group and the traditional Mongol warrior elite aggravated and resulted in bloody fights at the court and the assassination of the emperor and his chancellor at Nanpo 南坡 by chief-censor Tegshi ("Tieshi 鐵失") who lead a group of people who had been protégés of Temüder and feared further purges. To his sideliners also belonged many Mongol princes like Esen Temür ("Yexian Tiemu'r 也先帖木兒") who had not been granted their annual apanages by Emperor Yingzong and felt their traditional privileges endangered by the centralisation and bureaucratisation undertaken by Emperor Renzong and his son Yingzong. For a decade the Yuan court should find no peace and was bound to be a battlefield of the pro-Mongol and the pro-China factions. The new ruler Yesun Temür (posthumously called the Taiding Emperor 元泰定皇帝, r. 1323-1328) tried to punish the assassins of the late emperor - although the belonged to the pro-Mongol group himself and had probably stimulated the murderers. Now, Tegshi and Esen Temür were executed, others were banished, in a kind of coup that legitimated the succession of Yesun Temür. The new emperor was quite the contrary of the two literate and educated rulers he followed. The Taiding Emperor had spent his life in the steppe and brought retainers with him that now filled the posts of the central government, including Mongols and semu people like the Muslim Daula Shāh ("Daolasha 倒剌沙"). Almost none of these men had a deeper understanding of Chinese culture. The Chinese scholars' influence on the Yuan government was very limited during his reign. Yesun Temür's policy was reconciliatorious: he compensated the relatives of the victims of Temüder and the Nanpo coup and granted high apanages and amnesties to the other Mongol princes in order to obtain their loyalty. He did not only patronage Islam and Buddhism but also showed reverence to Confucius and sponsored colloquia about the Confucian Classics. The Taiding Emperor died unexpectedly, and El Temür ("Yan Tiemu'er 燕鐵木兒") who was in control of the imperial kesig guards (quexue 怯薛), took his chance to welcome Tuγ Temür as the new emperor (posthumous title Emperor Wenzong 元文宗, r. 1328; 1329-1331). At the same time Prince Ongchan ("Wangchan 王禪") and Counsellor-in-chief Daula Shāh proclaimed Aragibag as emperor (posthumously called the Infant Emperor of the Tianshun Reign 幼主天順皇帝, he had no temple name, r. 1328) in the Upper Capital in Inner Mongolia. Tuγ Temür, emperor in the Great Capital, invited his older brother Qošila to mount the throne. In this situation of inner war, the Great Capital finally fell into the hands of the supporters of Tuγ Temür and his brother, and Qošila was made the new emperor (posthumous title Emperor Mingzong 元明宗, r. 1329). It took the rebel generals Temür Bukha ("Tiemu'r Buhua 帖木兒不花") and Örlüg Temür ("Yueli Tiemu'r 躍里帖木兒") one month to conquer the Upper Capital and to execute Arigibag's ministers; the Infant Emperor himself had vanished. Only in March 1332 the last followers of Yesun Temür's line, Prince Tügel ("Tujian 土堅"), capitulated. But only after a few months after the capitulation of the loyalists at the Upper Capital, El Temür felt endangered by the Muslim retainers of the new khan, Qošila, and managed to meet with Emperor Mingzong in the Middle Capital Ongghachatu and poisoned him, making his younger brother Tuγ Temür emperor (posthumous title Emperor Wenzong 元文宗; r. 1328; 1329-1331). Tuγ Temür was a weak personality and left government affairs widely in the hands of his ministers, especially the Turk-Qipchaq El Temür and the Merkit Bayan, who reigned with almost autocratic power. All officials and retainers of Yesun Temür were punished, the deceased emperor was denied a temple name. Likewise, all governmental officials of Qošila were purged, and no single Muslim was allowed to hold a high office, and only a few Chinese advanced to important posts in the central government. Emperor Wenzong's reign was marked by permanent rebellions of discontent Mongol nobles, ethnic minorities in Yunnan and by increased pressure from the peasantry in China proper. Natural disasters aggravated the situation of the peasants, the suppression of rebellions and the feeding of starving peasants again endangered the state treasury. But unlike before, the government now tried to lower its expenditures for apanages, for religious purposes, and inside the palace. It tried increasing its revenue by selling offices. Through these measures, it was necessary to issue new paper bills. Emperor Wenzong himself as one of the few well-educated Mongol rulers mastered calligraphy, poetry and studied the Confucian Classics. He had published a political enyclopedia, the Jingshi dadian 經世大典, compiled by Zhao Shiyan 趙世延 and Yu Ji 虞集, and was the first and only Mongolian ruler to perform the Suburban Offerings (jiaosi 郊祀). He also founded the Kuizhangge Academy 奎章閣學士院 whose objective was to transmit Chinese culture to the Mongolians, and whose members were renowned Chinese, Mongol, Uyghur and other semu scholars. The tendency that not the emperor but his highest ministers controlled the Yuan government would continue to the end of the Yuan period. After Emperor Wenzong's early death, Irinĵinpal (posthumous title Emperor Ningzong 元寧宗, r. 1332) was the first under-age emperor who acceeded to the throne. He died after a few months and was succeeded by his older brother Toqōn Temür (posthumous title Emperor Shundi 元順帝, r. 1333-1368/1370), illigimate (?) son of the assassinated Qošila. This accession was only made possible after the death of the mighty El Temür who had controlled the court for a couple of years. Now, it was Bayan who held a firm grip on the Yuan government and murdered El Temür's retainers. Bayan's political program intended to improve the general welfare of the Yuan empire's society by reducing expenditure, and also to resume the politics of the dynastic founder Khubilai, in first place the enforcement of the strict ethnic division of Yuan China's population. But during the last fourty years the strict separation into four "castes" had become indistinct, Mongols were accustomed to the Chinese way of life, and Chinese had adopted some Mongol customs, both peoples intermarried with each other although it was strictly forbidden by law. Especially among the elite, Chinese, semu people and Mongols could no longer clearly be separated. Chinese historians blamed Bayan with many faults of the Mongol politics in general. Bayan indeed abolished the state examinations in 1335 an so destroyed the hopes not only of the Chinese, but also of many young Mongols, to climb the ladder of bureaucratic career. The main arguments of the most important proponent of the abolishment, Cherig Temür ("Cheli Tiemu'r 徹里帖木兒"), were the expenses for state schools and the examinations, and that the examination degrees undercut the value of the aristocratic hereditary privileges. Bayan prohibited the class of Southern Chinese to learn Mongolian or one of the semu languages. He is even said to have planned to kill all Chinese with the most common surnames Zhang 張, Wang 王, Liu 劉, Li 李 and Zhao 趙. By his harsh treatment of some members of the Mongol aristocracy Bayan made himself a lot of enemies. When he was outraged by a murder committed by a Chinese, he wanted to purge the whole stratum of Chinese officials at the Yuan court. In this situation, Bayan's nephew Toghtō ("Tuotuo 脫脫") arranged a coup against the mighty Counsellor-in-chief and had him banished into exile, where Bayan died soon. Like in the decades before, every change in political leadership was immediately followed by almost reverse politics, either pro-Chinese (centralist-bureaucratic), or pro-Mongolian (provincial, and nobility-oriented). The same situation repated with the two leading politicians of the reign of Emperor Shundi, Toghtō and Berke Bukha ("Bie'rque Buhua 別兒怯不花"). The examination system was resumed and access to high offices was again opened to Chinese. Toghtō ("Tuotuo" 脫脫) cooperated with Chinese officials, strengthened fiscal policy, military administration and many other spheres of governmental tasks like the compiling of the previous dynasties' official histories, which resulted in the Songshi 宋史, Liaoshi 遼史 and Jinshi 金史. The emperor himself scarcely intervened actively into government affairs but instead dedicated himself to asketic practices, influenced by a Tibetan monk. The period of Berke Bukha's administration made the strengthening of provincial civil and military administration necessary. Because of heavy taxation, corrupt local officials and repeating natural disasters led to banditry. The end of the 1330es experienced several peasant uprisings, e.g. under Zhu Guangqing 朱光卿 in Guangdong, Bang Hu 棒胡 in Henan, Han Fashi 韓法師 in Sichuan, Li Zhifu 李志甫 in Fujian, Peng Yingyu 彭瑩玉 and Zhou Ziwang 周子旺 in Jiangxi. Those had to be encountered and to be suppressed through the initiative of provincial governors. When the state treasury again was running severely low, Toghtō was recalled to the court. The tribute grain transports could not pass the Yellow River and the Grand Canal, but for the first time in history the grain was shipped along the coastline. Unfortunatley pirates under Fang Guozhen 方國珍 were active there and endangered the transports. Toghtō therefore issued a new paper currency to finance a huge project of diverting the Yellow River to a bed south of the Shandong Peninsula, a gigantic hydraulic project that was engineered by Jia Lu 賈魯 and successfully concluded in 1351. Throughout the history of Yuan dynasty there was always a pending question that was never really decided: if the Mongols wanted to govern a steppe empire with accordingly simple governmental structures, or if they wanted to rule a civilized nation with a highly complex system of bureaucracy, a long administrative tradition and important state rituals. Because this question was never solved, mainly because court factions and cliques of Mongol nobles never ceased to fight for power, the Mongol ruling elite was not able to retain a strong foothold on Chinese soil. A crucial factor influencing court politics was the regular replacement of the whole top echelon of court officials when a new ruler mounted the throne and gave the highest posts only to his own retainers. By these changes in political leadership that took place every few years a continuity in effective politics was not possible. One reason for the fall of the Yuan dynasty is often neglected: The 14th century was full of natural disasters in all parts of the world: droughts, inundations, pestilence, and a decrease in the average temperature. Peasant uprisings were seen throughout Chinese history, many of them were led by Daoist or Buddhist sects and had a millenarian character. In the 1350es there were also many salt workers among the rebels. Still, the Mongol military units were strong enough to handle the problem of bandit rebels, sometimes by recruiting the local population into governmental batallions. The Counsellor-in-chief Toghtō personally commanded campaigns against rebels under the salt smuggler Zhang Shicheng 張士誠 in the Huai River area. When Emperor Shundi suddenly dismissed Toghtō in 1354, the Yuan dynasty lost her military initiative against the rebels in the battle of Gaoyou 高郵 - and also lost the empire. After the dismission of Toghtō the military and political initiative was left over to different factions, many of them regional governors who recruited troops from the local population to defend in first place their own territory, and only then the empire. Yet there were also many loyalists to the Yuan government like the half-Chinese Kökö Temür ("Kuokuo Tiemur" 擴廓帖木兒; Chinese name Wang Baobao 王保保) who controlled the region around Kaifeng 開封, Chen Youliang 陳友諒 in Fujian and He Zhen 何真 in Guangdong. These loyalists were politically not inactive, as is often suggested by Chinese historians. Especially in southeast China local governors tried to initiate a movement of Confucian revival, like under the Tangut Yu Que 余闕. Some scholar-officials advocated the instalment of local warlords as an appropriate means of regional defense that was also in accordance with the principle of the feudal system of the Zhou period 周 (11th cent.-221 BCE). Others supported a centralization of the government with a radical change in ethical standards - away with corruption, favoritism and luxurious expenditure. Leaders of this group of reformist supporters of the Yuan dynasty were Liu Ji 劉基 and the Dilie 敵烈 general Shimo Yisun 石抹宜孫 who vehemently fought against the increasing power of local bandits like Fang Guozhen. When the Yuan central government did not adopt their proposals, both sided with the local warlord: Zhu Yuanzhang 朱元璋, eventual founder of the Ming dynasty, who keenly receicved Liu's proposals for an austere and morally integer government. Enemies of the local governors and warlords were, especially in the areas of modern Jiangsu and Zhejiang provinces, leaders of groups of salt workers and salt smugglers, pirates and "bandits - outlaws", like Zhang Shicheng and Fang Guozhen who even proclaimed their own dynasties. A fourth group of contenders for power in the decentralized Yuan empire were sectarian rebels who were led by messianic personalities that preached synchretistic believes of popular religion, Buddhism, Daoism and Manicheism. The largest of these religious societies were the White Lotus Society (bailianjiao 白蓮教) whose members were also called "Red Turbans" (hongjin 紅巾) and were active in the region of Jiangxi and north across Anhui into Shandong. But the leaders of this movement, including Han Shantong 韓山童, Liu Futong 劉福通, Du Zundao 杜遵道, Luo Wensu 羅文素, and Cheng Wenyu 盛文郁, were not able to unify the different branches among the rebels, even after the conquest of the prefecture of Yingzhou 穎州 (modern Fuyang 阜陽, Anhui) under Han Lin'er 韓林兒 and his brother Han Jiao'er 韓咬兒. Nonetheless, the uprising workers, pirates, smugglers and peasants as followers of pseudo-Buddhist belief could acheive a surprisingly fast victory over the Mongol troops under "Hesi 赫廝", "Tuchi 禿赤", Esen Temür ("Yexian Tiemu'er 也先帖木兒") and "Kuanchege 寬徹哥". The regular Mongol troops were sided by local potentates like the Uyghur Čaqan Temür "Chahan Tiemu'er 察罕帖木兒" and Li Siqi 李思齊. In the region of Hubei, Peng Yingyu 彭瑩玉 ("Monk Peng" Peng Heshang 彭和尚), Zhao Pusheng 趙普勝 and Xu Shouhui 徐壽輝 eliminated the Yuan government and founded their own Buddhist kingdom of Tianwan 天完. From 1354 on, when the regular Mongol armies lost their initative, the southern rebels started to advance to the north, pillaged the countryside and marched even beyond the capital Dadu, like Guan Yi 關鐸 and Pan Cheng 潘誠 (also called "Potou Pan 破頭潘"). It was only local military leaders like Li Siqi and Čaqan Temür, "Dashibadulu 答失八都魯" and Zhang Liangbi 張良弼 who blocked and defeated the rebel armies under Li Wu 李武, Cui De 崔德, Mao Gui 毛貴 until 1362. The disagreement among the different leaders in the different regions and quarrels about leadership of emperorship had been the most important factor for the failure of the rebel armies. At this time, the Yuan dynasty was further weakened by succession struggles. Emperor Shundi favored a nobleman called Hama 哈麻 whom he appointed to the office of Counsellor-in-chief. When Hama tried to undertake a plot against the emperor, there arose two factions at the court favoring different throne aspirants. Prince Ayuširidara was favored by the Kereyid 克烈 Shuosijian 搠思監 and the Korean eunuch Pak Bul-hwa 樸不花, while the emperor himself was supported by "Laodisha 老的沙" and Tulu Temür. Both factions were supported by mighty generals outside the court. Kökö Temür supported the Prince, and Laodisha was supported by "Boluo Temür 勃羅帖木兒" and "Tujian Temür 禿堅帖木兒". Boluo Temür entered the capital and forced the Prince to flee. But only a few months later, Prince Ayuširidara was able to return with the help of Kökö Temür. The mighty general was expected to force Emperor Shundi to retreat, but Kökö Temür proved to be a loyal servant to his emperor. He was highly rewarded but soon stripped off his offices, and the military power was left to the crown prince. In 1362 rebel leader Zhu Yuanzhang, a follower of the rebel Guo Zixing 郭子興, achieved a great victory over the warlord emperor Chen Youliang 陳友諒 during the battle of Lake Poyang 鄱陽湖, and proclaimed himself in 1367 emperor of Wu 吳. His next target were the mighty local governors Zhang Shicheng and Fang Guozhe in the region of Jiangsu and Zhejiang. After his conquest of Fujian province under Chen Youding 陳友定 in 1368 Zhu Yuanzhang proclaimed himself emperor of the Ming dynasty 明. His generals Xu Da 徐達 and Chang Yuchun 常遇春 started to conquer the north that was heavily disturbed by the inner quarrels among the Mongol nobility. It took the Ming armies only half a year to advance to and to take the Yuan capital Dadu. In 1369 Kökö Temür was defeated, the Chinese loyals surrendered to the Ming, and Emperor Shundi died in the next year in Mongolia. Northern Yuan Beiyuan 北元 is the name of the Mongolian Yuan dynasty 元 (1279-1368) after the withdrawal of the Mongol leaders to the steppe in 1368. The dynasty ended in 1402 with the death of Tögüs Temür 脫古思帖木兒 XXX. From then on the Mongols were referred to as Dada 韃靼 "Tatars" (Eastern Mongols) or Wala "Oirats" (Western Mongols). In late summer 1368 General-in-chief Xu Da 徐達, a commander of Zhu Yuanzhang (Emperor Taizu 明太祖, the Hongwu Emperor 洪武, r. 1368-1398), founder of the Ming dynasty 明 (1368-1644), entered the capital of the Yuan dynasty, Dadu 大都 (modern Beijing). Emperor Shundi 元順帝 (Toghon Temür 妥歡貼睦爾, r. 1333-1370) fled with his court to the northern capital Shangdu 上都 (near modern Dolon Nur, Inner Mongolia). Except his own imperial troops, he was supported by the military contingent of Prince Köke Temür 擴廓帖木兒 (in Chinese sources also called Wang Baobao 王保保), who controlled the region of the modern provinces of Shaanxi and Gansu. The region of Liaodong 遼東 (modern province of Liaoning) was still controlled by Prince Naγaču 納哈出, who found support in the kingdom of Goryeo 高麗, a tributary state of the Yuan empire on the Korean peninsula. In Yunnan, the Prince of Liang 梁王, Bazalawarmi 把匝剌瓦爾密, built up the last stronghold of the Mongolian dynasty in southern China. His territory fell to the Ming in 1382. The Mongols had never given up the idea that they might be able to reconquer their empire in China, and therefore constituted a permanent threat on the northern border of the new Ming empire. Emperor Taizu undertook several campaigns into the steppe, with the aim to crush the last hordes of the Mongols. In 1369 Chang Yuchun 常遇春 and Li Wenzhong 李文忠 made an attack on Kaiping 開平 (i.e. Shangdu) and so forced Emperor Toγun Temür to withdraw farther to the north, to Yingchang 應昌 (near modern Dar Nor 達爾諾爾, Heshigten Banner 克什克騰旗, in Inner Mongolia). A year later Xu Da was given the title of "General-in-Chief Smashing the Barbarians" (zhenglu da jiangjun 征虜大將軍). He commanded the western division of the Ming army that defeated Köke Temür and captured a huge number of Mongolian nobles (Yuan dynasty officials) under the Prince of Tan 郯王. The eastern division under Left Vice General (zuo fujiangjun 左副將軍) Li Wenzhong advanced to Yingchang. At that time Emperor Shun was already dead, and his son and successor, Ayuširidara 愛猷識理達臘 (Emperor Zhaozong 元昭宗, Mongolian title Biligtü Khan 必里克圖汗, r. 1370-1378), fled with a small cavalry contingent to Qaraqorum (Chinese name Helin 和林, near 額Kharkhorin or Erdenesant 爾德尼桑圖, Mongolia). Köke Temür also fled to the ancient capital of the Mongols, where Ayuširidara proclaimed himself emperor in 1371, chosing the reing motto Xuanguang 宣光. In 1372 the Ming dispatched an army of 150,000 troops that advanced in three divisions to the north of the Gobi Desert (in Chinese called Mobei 漠北 "north of the Desert"). Xu Da commanded the central division that left from Yanmen 雁門 directly towards Qaraqorum, Li Wenzhong the eastern division that marched via Juyong 居庸 and Yingtian, and the western division by Feng Sheng 馮勝 that headed from Jinlan 金蘭 to the region of Gansu. This time the Mongols undertook a counter-attack. Not far from Qaraqorum Köke Temür defeated the army of Xu Da, and the western division advanced to Guazhou 瓜州 (near modern Anxi 安西, Gansu) and Shazhou 沙州 (modern Dunhuang 敦煌, Gansu), where they were routed by the Mongols. Li Wenzhong's division was likewise defeated somewhere between the rivers Kerülen, Tula and Orkhon. This unexpected defeat was a great lesson for the Ming, and they changed their tactics by advancing step by step to the north, always backed by military garrisons that protected the rear of advancing armies. From Liaodong in the east to Qinghai in the west, a line of border garrisons was built. Each time new land could be conquered, it was secured by a new garrison. With this method the Ming were able to force more and more Mongol princes and commanders to submit. In 1378 Ayuširidara died and was succeeded by his brother Tögüs Temür (Emperor Yizong 元益宗, Mongolian title Uskhal Khan 兀思哈勒可汗, r. 1378-1388), who chose the reign motto Tianyuan 天元. His counselors Lu'er 驢兒, Manzi 蠻子 and Halajang 哈剌章 and Duke of State (guogong 國公) Tokhochi 脫火赤 assembled their fighing forces in Yingchang and Qaraqorum and repeatedly raided the border region to the Ming empire. Having several times urged the Mongols to submit, Emperor Taizu of the Ming finally decided in 1380 to sent out a fresh army under Mu Ying 沐英. At Qara Qoto (Eji Nai 亦集乃 or Heishuicheng 黑水城, modern Ejin Banner in the Alaša Leage, Inner Mongolia) the Mongols were defeated. Tokhochi was captured, likewise XXX 樞密知院 Aidzu 愛足 and XXX 平章 Yuanje Bukha 完者不花. In the aftermath of this victory the Ming sent out troops to bring down the Mongol princes in Yunnan and Liaodong. Bazalawarmi in Yunnan had two times killed Ming envoys who offered him peaceful surrender. "General conquering the south" (zhengnan jiangjun 征南將軍) Fu Youde 傅友德 and the vice generals (fu jiangjun 副將軍) Lan Yu 藍玉 and Mu Ying fought with XXX 司徒平章 Dalima's 達里麻 army at Qujing 曲靖. The Mongol army was defeated, and Kunming fell into the hands of the Ming. Seeing their case lost, Bazalawarmi and his two counsellors Dadi 達的 and Lu'er committed suicide. In 1387 Feng Teng, Fu Youde and Lan Yu attacked the Mongols in Liaodong. Naγaču submitted voluntarily and was rewarded with the title of Marquis of Haixi 海西侯. A year later Lan Yu attacked the Mongol troops at Fishing Lake 捕魚兒海 (today lake Buir 貝爾湖, New Barag Left Banner in Inner Mongolia) and won a major victory over their enemies. Defender-in-chief (taiwei 太尉) Manzi was killed, more than 3,000 princes and XXX 平章 captured, and a whole number of 70,000 commoners, men and women. Emperor Yizong fled with a small number of cavalry, hoping to escape to Qaraqorum, but at the banks of River Tula, he was killed by Yesüder 也速迭兒, one of his generals. The Mongolian empire disintegrated in internal fights for the succession of the throne of Chinggis Khan. It was only in 1400 that Gün Temür 坤帖木兒 (Toγoγan Qaγan 脱古罕可汗, r. 1400-1402) assumed the title of Great Khan of the Tatars. He was killed by the nobleman Guliči 鬼力赤 (Örüg Temür Qaγan 兀雷帖木兒汗, r. 1402-1408). The official dynastic history of the Ming dynasty, Mingshi 明史, says that Guliči was the first Mongol leader who relinquished the title of emperor of the Yuan dynasty, but it seems quite probable that Yesüder had already ceased to use it. Fang Linggui 方齡貴 (1992). "Beiyuan 北元", in: Zhongguo da baike quanshu 中國大百科全書, Zhongguo lishi 中國歷史, Beijing/Shanghai: Zhongguo da baike quanshu chubanshe, vol. 1, p. 44頁. Wang Meihan 王美涵 (ed. 1991). Shuishou da cidian 税收大辭典, Shenyang: Liaoning renmin chubanshe, p. 820. Map and Geography Emperors and Rulers Government and Administration Literature and Philosophy Technology and Inventions
Welcome to our Homework Answers section You can post your homework questions here and get assistance. We have teachers that can easily cover a broad range of areas. If your question is simple, you might get help for free. How does the Homework Answers section work? Post your homework for free and wait for reference answers from teachers. Most likely, more than one teacher will answer your question. You will be able to see a preview of the answers and purchase the one that seems the best for you. After purchase, you will be able to rate the answer. Be thoughtful about your rating, it affects the teacher. What Homework Questions can I post here? Any category that appears in the post form will be valid. It includes Math, Algebra, Biology, Physics, Literature and more. Answers are likely to be purchased by several students |Title||Field of study||Price $||Answers| |2DB Managing High Performance||Human Resource Management homework help||5.00||1| |Administrative Plan||Computer Science homework help||8.00||1| |week 7 Assigment||Information Systems homework help||5.00||1| |Intro to Civilization - EXAM||Reading homework help||35.00||1| |anyone can write a 300 word paragraph about...||English homework help||3.00||1| |2 short answer essay question||Social Science homework help||15.00||1| |3||Marketing homework help||15.00||1| |History assignment.||History homework help||2.00||1| |task||Economics homework help||20.00||1| |Is the president of the U.S black or white?||English homework help||5.00||1| |Title||Field of study||Price in $||Answers| |just a t||Math homework help||28.00||1| |Human Geography||Geography homework help||50.00||1| |Here||Accounting homework help||50.00||1| |'For Hectorx' please||English homework help||5.00||1| |Due Saturday 11/15 at 12pm.||Math homework help||20.00||1| |nancy Carol||History homework help||20.00||1| |Managerial Analysis homework||Finance homework help||10.00||1| |today||Law homework help||15.00||1| |Assignment: Business Formation||Accounting homework help||15.00||1| |Genetics HW||Biology homework help||20.00||1|
Francis to Complete Benedict’s Encyclical Pope Emeritus Will Not Contribute Additional Material to Work on Faith BY Edward Pentin June 16-29, 2013 Issue | Posted 6/13/13 at 1:08 PM Pope Francis is completing an encyclical on faith begun by Pope Benedict XVI, but the pope emeritus is not contributing further to the document, the Vatican has said. Speaking to reporters May 24, Vatican spokesman Father Federico Lombardi denied earlier reports claiming that Benedict XVI was continuing to write the encyclical that would then be signed by Pope Francis. "As is known, at the time of his resignation, Benedict XVI left the encyclical project that had already been started," Father Lombardi said, adding that it "now appears his successor is completing it, even if I couldn’t predict the time necessary for its publication." Earlier reports given by an Italian bishop claimed that Benedict XVI was concluding his work on the encyclical and that Pope Francis would be writing an encyclical on poverty. Bishop Luigi Martella of the Diocese of Molfetta-Ruvo-Giovinazzo-Terlizzi wrote May 23 on his diocesan website that, after the encyclical on faith, Pope Francis was planning to prepare his first encyclical on the poor. The Italian bishop added that it is to be about poverty "understood not in an ideological and political sense, but in the sense of the Gospel." He said Pope Francis revealed this when he and his fellow bishops met the Holy Father on their ad limina visit May 13-16. Father Lombardi said the news about Benedict XVI "finishing off the text is completely unfounded," but he didn’t rule out a future encyclical dedicated to the poor. "Let’s take one encyclical at a time," the Vatican spokesman said. It would not be unprecedented for a pope to complete an encyclical begun by his predecessor. Benedict XVI’s first encyclical, Deus Caritas Est (God Is Love), contained a large section that had been written during the final months of Blessed John Paul II’s pontificate. Benedict XVI wanted to use the encyclical on faith to share his reflections on what it means to be a Christian today and the role of faith in the life of man and society, especially in this Year of Faith. In October, Vatican Insider claimed the incomplete passages had been getting "rave reviews" from those who had already seen drafts. "The text of the Pope is beautiful," a senior bishop in the Curia is reported to have said. "With his simple language, Benedict XVI manages to express even the most complex and very deep truths using simple language, which has a widespread reach that goes beyond all imagination." Many in the Church would welcome papal teaching on the faith at a time when, especially in many Western societies, the faith is in crisis. Dominican Father Paul Murray, professor of literature of the mystical tradition at the Pontifical University of St. Thomas Aquinas in Rome, said that in an "age of great bewilderment, of a dictatorship of relativism," doubts are being sown among ordinary believers "in a way they weren’t 20 years ago." But quoting Benedict XVI, he stressed the "simplicity of the faith," saying, "It’s not that complicated; it’s not just for intellectuals." He believes such an encyclical is also needed at a time when there is a tendency to succumb to fundamentalism. "In an age of bewilderment, people panic and look for clear and distinct ideas; there’s a refusal to live with the complexity and mystery," Father Murray said. Living with that mystery is "part of the faith process," he said, but stressed it is "not an ambiguity that renders everything relative." Rather, communion with God makes you "automatically humbled," he said. "You can be very confident about the truths of the faith, but that confidence is not a fundamentalist confidence; there’s a humble joy that automatically comes from contact with God." "I suspect that will be very important for us to be reminded of," he said. Father Murray said that to have two popes contributing to an encyclical on faith is "wonderful and beautiful." "The genius of Benedict was just marvelous, but the genius of Francis is that he just talks over all our professional Christians and Catholics and speaks to the world," he said. "He speaks in a very direct, humble, Gospel way, and I hope the encyclical will have some of that, as well as all the great theological profundity of Benedict." Copyright © 2013 EWTN News, Inc. All rights reserved.
College Library Books Needed Do you have any books on music, history or business that you don't need anymore? Someone else does! How to donate books to a good cause For the library, Head Librarian Jim Mancuso is looking for good quality books on these topics: • American history • Baptist history and famous Baptists • entrepreneurial work • European history • literature, great classics only (world famous authors of all ages; Shakespeare, Austen, Dickens, etc.) • music, music history, musicology • Western Civilization / history We would also appreciate donations of classical music on compact disc. Note that we cannot use any materials on audiocassettes, vinyl records, microfilm, or VHS videocassettes. Please mail all donations to: J. James Mancuso, V.P. for Library Services Northeastern Baptist College PO Box 4600 Bennington, VT 05201-4600
The fish had lost its tail somehow while alive and it had disc-shaped wounds from cookiecutter sharks, but those injuries wouldn't have been deadly, Walker said. In fact, it's unclear why the creature died, although Walker said it was possible the deep-water fish came too close to the surface, where it may have been knocked around by waves. The oarfish washed up on a beach in the San Diego County coastal city of Oceanside on Friday. Several days earlier, a snorkeler found the carcass of an 18-foot oarfish off Catalina Island and dragged it to shore with some help. The cause of death for the larger fish also remains a mystery. The rarely seen deep sea-dwelling creatures, which can grow to more than 50 feet, may be the inspiration of sea monsters found in literature and throughout history. Photos of the oarfish have circulated widely online, spurring general interest in the mysterious creature but contributing little to scientists' knowledge of the fish.
The African Poetry Book Fund, in conjunction with Prairie Schooner, the literary journal published by the University of Nebraska, has announced three finalists for the inaugural Glenna Luschei Prize for African Poetry. Honors & Awards Lenard Moore has been on the faculty at the University of Mount Olive since 2005. In 2008, Moore became the first Southerner and the first African American to be elected as president of the Haiku Society of America. The honorees at Tanisha C. Ford of the University of Massachusetts at Amherst, Alfreda Brown of Kent State University in Ohio, William R. Harvey, president of Hampton University in Virginia, and Dionne Cross Francis of Indiana University. Mary Frances Berry, former chair of the U.S. Civil Rights Commission, is the Geraldine R. Segal Professor of American Social Thought and professor of history in the School of Arts & Sciences at the University of Pennsylvania in Philadelphia. Marquis Hill is a teaching associate in the jazz program at the University of Illinois-Chicago. He is a graduate of Northern Illinois University and holds a master’s degree in jazz pedagogy from DePaul University in Chicago. Stanley Warren, a retired professor of education at DePauw University in Greencastle, Indiana, and Shaun R. Harper of the University of Pennsylvania, received the Distinguished Alumni Award from the School of Education at Indiana University. Melanie Murry, University Counsel at the University of Memphis in Tennessee, received the 2014 A.A. Latting Award for Outstanding Community Services. Albany State University in Georgia has announced that it is renaming an academic building on campus to honor the institution’s sixth president Billy C. Black. The honorees are Tiffany A. Flowers, instructor of education at Georgia Perimeter College in Decatur, and Serita Acker, the director of the Women in Science and Engineering (WISE) program at Clemson University in South Carolina. Claudia Rankine, the Henry G. Lee Professor of English at Pomona College in Claremont, California, is one of five finalists for the National Book Award in the poetry category. Frank K. Ross, the director of the Center for Accounting Education at the Howard University School of Business, received the 2014 Gold Medal Award for Distinguished Service from the American Institute of CPAs (AICPA). The honorees are Antoine J. Alston of North Carolina A&T State University, Adriel A. Hilton of Western Carolina University, Phyllis Miller of Mississippi State University, and Bernardine M. Lacey of Delaware State University. Robert B. France, professor of computer science at Colorado State University, has been selected to receive the Excellence in Science and Technology Award from the Institute of Caribbean Studies. He is the first faculty member at the University of Connecticut to win the award. The award comes with a $4 million grant to enable Dr. Laurencin to continue his groundbreaking work on regenerative engineering. The honorees at Brandon Keith Brown assistant professor of music at Brown University, William M. Carter Jr., dean of the law school at the University of Pittsburgh, and Robin E. Dock, an associate professor at Winston-Salem State University in North Carolina. Professor Carby has been selected to received the 2014 Jay B. Hubbell Medal for Lifetime Achievement in American Literary Studies. The award is sponsored by the American Literature Section of the Modern Language Association. The award is presented by the U.S. Military Academy’s Association of Graduates to individuals who exemplify West Point’s motto, “Duty, Honor, Country.” Dr. Rice, a former U.S. secretary of state, is now a professor at Stanford University. Jinx Coleman Broussard, a professor in the Manship School of Mass Communication at Louisiana State University in Baton Rouge, received the History Division Book Award from the Association for Education in Journalism and Mass Communication. Patrick Cage of Chicago State University and Chinedum Osuji of Yale University are being honored by professional societies and mystery writer Walter Mosley is receiving an award from the City College of New York. Jimmie James served on the staff at Jackson State University in Mississippi for 43 years, rising through the ranks to chair the department of music. The university honored his service by placing his name on a recital hall in the campus music center. The Before Columbus Foundation of Oakland, California is honoring Emily Raboteau of CCNY, Jonathan Scott Holloway of Yale, Sterling Plumpp of the University of Illinois, Chicago, and Jamaica Kincaid of Claremont McKenna College. Dane Kiambi, an assistant professor of public relations at the University of Nebraska, received the Best Paper Award for Journalism Research from the Association for Education in Journalism and Mass Communication. Dr. Slaughter is professor of education and professor of engineering at the University of Southern California in Los Angeles. He is the former president of NACME and was chancellor of the University of Maryland and president of Occidental College. Kiese Laymon is an associate professor of English at Vassar College in Poughkeepsie, New York. The Saroyan Prize is given every two years by the Stanford University Libraries and the William Soroyan Foundation. Bernard Lafayette Jr., the Distinguished Senior Scholar-in-Residence at the Candler School of Theology at Emory University, is being honored for his book about his time as leader of the Selma, Alabama, voting rights protests. The four honorees are Lynden A. Archer of Cornell University in New York, Gary L. LeRoy of Wright State University in Detroit, Jada Bussey-Jones of Emory University in Atlanta, and Derek Wilson of Prairie View A&M University in Texas. The Sierra Club has announced the establishment of a new award that will honor an individual or a group that has done outstanding work in the area of environmental justice. The award will be named after Dr. Robert Bullard, one of the founders of the environmental justice movement. The citation for the award given to Beverly Daniel Tatum said that “you have engaged the very difficult subject of race relations in the United States, and the impact of such an environment on identity development for African Americans.” Vanderbilt University in Nashville, Tennessee, has announced that it is naming its newest residence hall in honor of Kelly Miller Smith, who served as assistant dean at the Vanderbilt Divinity School from 1969 until his death in 1984. J. Marshall Shepherd, the UGA Athletic Association Professor in the Social Sciences at the University of Georgia, was named a Captain Planet Protector of the Earth by Ted Turner’s Captain Planet Foundation. Professor Ruth Ellen Kocher was honored for her collection of poems, domina Un/blued (Tupelo Press, 2013). She will receive the award, and a $5,000 cash prize, at a ceremony in New York City on September 29. Dr. McCrary is vice president for research and economic development at Morgan State University. He is being honored for his research at AT&T Bell Laboratories, the National Institute of Standards, and the Applied Physics Laboratory at Johns Hopkins University. Adam J. Banks, professor in the department of writing, rhetoric, and digital studies in the College of Arts and Sciences at the University of Kentucky, was named the 2014 Rhetorician of the Year by the The Young Rhetoricians Conference. Edison R. Fowlks, a professor of biology and director of the Biotechnology Laboratory at Hampton University in Virginia, will be honored this December by the American Society of Cell Biology. Babatunda A. Ogunnaike, dean of engineering at the University of Delaware, has been selected to receive the 2014 Eminent Chemical Engineer Award from the Minority Affairs Council of the American Institute of Chemical Engineers. Dr. Spriggs is a professor of economics at Howard and also serves as chief economist for the AFL-CIO. He is the former assistant secretary for policy at the U.S. Department of Labor.
Monday, January 27, 2014 •THE DANIEL PLAN by Rick Warren, Daniel Amen, Mark Hyman and others (Zondervan) is #5 in Advice, How-To & Miscellaneous. •HEAVEN IS FOR REAL by Todd Burpo with Lynn Vincent (Thomas Nelson) is #7 in Paperback Nonfiction; #17 in E-Book Nonfiction; and #16 in Combined Print & E-Book Nonfiction. •THE FIVE LOVE LANGUAGES by Gary Chapman (Northfield) is #9 in Advice, How-To & Miscellaneous. •HANDS FREE MAMA by Rachel Macy Stafford (Zondervan) is #13 in Advice, How-To & Miscellaneous. •THE HARBINGER by Jonathan Cahn (FrontLine) is #17 in Paperback Trade Fiction. •HAPPY, HAPPY, HAPPY by Phil Robertson with Mark Schlabach (Howard Books) is #21 in Hardcover Nonfiction. •FLIGHT TO HEAVEN by Dale Black and Ken Gire (Bethany House) is #25 in E-Book Nonfiction. Amazon Publishing today announced the launch of Waterfall Press, a new Christian imprint that will specialize in faith-based non-fiction and fiction. Waterfall Press non-fiction will aim to provide spiritual refreshment and inspiration to today’s Christian reader, while fiction will include stories in the romance, mystery, and suspense genres. Waterfall Press titles will be published by Brilliance Publishing, part of the Amazon.com group of companies, which currently offers readers self-help and personal growth books under the Grand Harbor Press imprint. “Brilliance has over 12 years of experience serving the Christian market as audiobook publisher of some of the most successful Christian authors writing today,” said Mark Pereira, President and Publisher of Brilliance Publishing. “We are excited to expand our offering to readers of faith-based material by publishing original Christian content with enduring appeal.” Waterfall Press debuts with a selection of fiction and non-fiction in 2014 including: •Mark Buchanan’s The Four Best Places to Live (February 2014), which reveals the surprising truth about how the best places to live are not based on climate, employment opportunities, or cost of living, but rather on places to experience joy, peace, and belonging according to Scripture. •Best-selling, self-published author Cherie Hill’s When You Need a Miracle (April 2014), which discusses the critical steps of faith you need when you find yourself at life’s most challenging crossroads. •The Quiet Revolution by Jay Hein (June 2014). Hein, Director of the White House Office of Faith- Based and Community Initiatives under President George W. Bush, provides an insider’s perspective on how presidents have rallied Americans to serve their nation by volunteering in their individual communities and speaks to the importance of service in improving lives around the world. Waterfall Press will also publish shorter content, including upcoming works by Pastor Bryan Wilkerson (Living Deep, March 2014); Pastor Dan Meyer (Discovering God, April 2014); and the editors of global media ministry Christianity Today (Billy Graham; Leading With Love, April 2014). Editorial oversight for Waterfall Press will be led by Tammy Faxel, who brings 30 years of experience in the Christian publishing industry through prior posts at Tyndale House Publishers and Oasis Audio. Several of the books on the launch list—including The Four Best Places to Live and The Quiet Revolution, will be published in collaboration with Christianity Today. “The breadth of Amazon’s opportunities creates a dynamic bridge between the author and reader that can move the content conversation to a growing global audience,” said Harold Smith, President and CEO of Christianity Today. Brilliance Publishing, part of the Amazon.com group of companies, is a Michigan-based, full-service book publisher, publishing Christian fiction and non-fiction and personal growth and self-help books in print, eBook and audiobook formats under its two imprints. With a growing catalog of titles from over 500 authors (including Tom Clancy, Stephen Covey, Nora Roberts, Rick Riordan, and others), Brilliance Audio provides audiobooks in the popular categories of inspiration/self-help, romance, mystery, suspense and thrillers, science fiction and fantasy, business, and biography; and for children and young adults. Brilliance Audio recordings are available for the retail and library markets on compact disc, MP3- formatted compact discs, and files for download. Waterfall Press joins sister imprints 47North, AmazonCrossing, AmazonEncore, Amazon Publishing, Grand Harbor Press, Jet City Comics, Kindle Worlds, Lake Union, Little A, Montlake Romance, Skyscape, StoryFront, Thomas & Mercer, and Two Lions in the Amazon Publishing family. For more information about all imprints of Amazon Publishing, visit www.apub.com. For more information on Waterfall Press and upcoming titles, visit www.brilliancepublishing.com/waterfall As a writer, don't you dream of touching the lives of children, of offering them hope for a better future? As author Barbara Steiner once said, "Writing for children is the toughest of all writing because children's books change lives. . . . Kids take stories to heart, believe them, and reread them if they have touched their spirits." You, too, can touch a child's spirit through your writing. You can use your writing talent to inspire and help and encourage. One of the best things writers can give children through their writing is a sense of hope. This spring, the Highlights Foundation will repeat the successful workshop "Sharing Our Hope: Writing for Religious and Inspirational Markets." Workshop presenters Kristi Holl and Paula Morrow will help you determine where your own writing fits into the spectrum of religious, spiritual, Christian, inspirational, and crossover writing; learn how to write strong characters who are believable and multifaceted, yet flawed enough for kids to identify with; learn how to infuse tension into your characters, plot, settings, and dialogue; explore inspirational market guides, plus discuss books especially for inspirational writers; participate in discussions on surviving the writing life — and thriving — plus self-care for writers; and understand and learn to deal with "gatekeepers": parents, gift-givers, librarians, editors, and agents. The workshop is a perfect Christmas gift for a writer you know—or for yourself! We hope you will join Paula Morrow and Kristi Holl for "Sharing Our Hope: Writing for Christian and Inspirational Markets." This Highlights Foundation workshop will be held at The Barn, outside of Honesdale, PA, March 27-30, 2014. Paula, long-time editor of children's books and magazines at Cricket Magazine Group and Cricket Books, currently has an independent editing service. She has served as a book reviewer for the national Church and Synagogue Library Association, advisory board member for The Little Christian magazine, and a voting member on a number of awards committees, including the Newbery. Kristi is a Children's Choice Award-winning author, and has written 42 books for children, and much more. She taught writing for children and teens for the Institute of Children's Literature for twenty-five years. She is the author of two books for writers: Writer’s First Aid and More Writer’s First Aid. To register now or for more information, call Jo Lloyd at 570-253-1192 or e-mail her at email@example.com. Friday, January 24, 2014 I have a few copies left of the "2013 Christian Writers' Market Guide," that I'll sell for $13.00--including the postage. This is not yet listed on my Website, but you can order and pay by credit card by phone, e-mail, or through PayPal (to firstname.lastname@example.org.) This special is good as long as I have copies, but I do have a limited number. Phone number is 503-642-9844. You can also order by mail to: Sally Stuart, 15935 SW Greens Way, Tigard OR 97224. An author is looking for stories for a book to be called, "The Orphaned Generation," which will tackle the sensitive issue of older parents who are estranged from their adult children. The stories will need to written in the words of the estranged parents themselves. If interested in sharing your story anonymously, call June at 561-281-9703. Tuesday, January 21, 2014 Hi All--In case you haven't gotten the word. WinePress Publishing is going out of business. If you still have business with them, the only e-mail that works is: email@example.com. Apparently they are bogged down with e-mails from their authors, and indicate it may take up to two weeks to get a response--but they do promise to respond. Don't wait too long to contact them. Sally Thursday, January 16, 2014 Hi All--Just wanted to let you know that I now have copies of the 2014 Christian Writers' Market Guide for sale. I'm still waiting for my Webmaster to update the Website, but you can still order the 2014 guide. Go ahead and order the 2013 (price is still the same), and you will automatically get the 2014 edition. Price is $19.99, and I pay the postage. This new edition has 100 extra pages of resources and information for writers. Go to www.stuartmarket.com.
I'll have several 2012 goals, which I'm currently contemplating. Edit: 2012 Challenge Canceled - Read 100 books in 2012 - Read at least one contemporary non-fiction book each month. - 20% to 25% of my reading should be from the canon of classic western literature, which means roughly two books per month. Achievable. . Shortly after writing these goals, holidays with family and friends interuppted my reading and internet routines. My participation at MR had crossed the line from healthy to addictive, and I used the holiday hiatus to make a cold-turkey break. I stayed completely away from MR for several months. I was reading as voraciously as ever but didn't follow my rules concerning content (non-fiction, western canon). Next year, perhaps.
Return to the Classics: "Moby Dick"Massman Hall - room 241 Monday, November 3, 2014 @ 7 p.m. Return to the Classics, a great books discussion led by Tom Ventresca, '70, will examine Herman Melville’s epic sea story, Moby-Dick. “Call me Ishmael,” one of Western literature’s most recognizable opening lines, begins the Ishmael-narrated story of Captain Ahab and his pursuit of the elusive and enigmatic giant sperm whale, Moby Dick. Melville’s book, his sixth, was considered a commercial failure and was out of print at the time of his death in 1891. It was not until the 1920s, when D.H. Lawrence called Moby-Dick “the greatest book of the sea ever written,” that the novel’s reputation began to engage a 20th century readership. Today, Moby-Dick not only is an American classic, but also is heralded as one of greatest novels in the English language. To reserve a space for the Moby-Dick discussion, contact The Center for Arts and Letters at 816-501-4607 or email email@example.com. The cost, $25 per person, includes a copy of the book (Norton Critical Edition) and refreshments; $10 for the discussion and reception only. Calendars: Cultural, Classics
The proposal essay is often written from doctorate students as a part of their graduation criteria. The beginning of a proposal defines the thesis or purpose of their future research. The dissertation proposal must be original and substantial. Usually the dissertation proposal describes how the graduate student plans to use the scientific method as lists the hypothesis. A proposal usually concentrates on precise principles. The proposal tells the plans of the graduate study in doing the dissertation. Sample Paragraph Proposal Essay Children are being diagnosed with the bipolar disorder more than ever before. "Current estimates suggest that the lifetime prevalence could be as high as 1% by adolescence" (Hamer 2004). Children are experiencing mood disorders that are turbulent and dysfunctional. The bipolar disorder in children affects their academic performance and impairs their relationship with peers. Researching the affects of the bipolar disorder by observing a hundred different children with mental health disorders and at least ten of these children being bipolar is an important research project designed to help children. A survey will be sent to parents of children with mood disorders and a rubric showing various possible problems in their child. A literature review will research what current information is available on children and the bipolar disorder. This is a sample paragraph proposal essay written by a graduate student. The topic is the bipolar disorder in children and the problems it cause these children and their parents. The proposal suggests surveying these children to determine what characteristics are common in their lives. A rubric will be designed to help parents with the survey. When you're stuck on a tough school assignment, let ThePaperExperts.com deliver a quality term paper or essay with all your requirements for a reasonable fee. We even have live phone support for every one of our clients. Order Your Custom Term Paper Today!
Contact: Corliss Lee Scope of Collection The UC Berkeley library collects at a research level in the subject of Ethnic Studies, which includes history, literature, political science, etc. Primary Languages and Formats Materials are purchased in virtually all languages of the world and represent the ethnicities of people from all corners of the world. Ethnic Studies collections are located in multiple campus libraries. Humanities and social science materials are located in the Main (Gardner) Stacks, with additional materials in subject specialty libraries such as Education/Psychology, Social Welfare, Anthropology, Environmental Design, Media Resources Center, etc. The Ethnic Studies Library with its departmental focus, features an Asian American Studies collection, the Chicano Studies Collection, and a Native American Studies Colleciton. The Bancroft Library, in addition to being the UC Berkeley's manuscript and archival colleciton, holds materials relevant to American ethnic groups in California, the Western United States and Mexico; see the Western Americana colleciton description for details. For information about research tools, library guides, and related pages, see the guide to research in Ethnic Studies.
Amiri Baraka (1934-2014) February 10 – April 30, 2014 Amiri Baraka, known early in his career as LeRoi Jones, was one of the most widely published African-American writers, producing provocative poetry, drama, fiction, essays, and music criticism. Baraka’s early writing and publishing involved collaborations with (then wife) Hettie (Cohen) Jones, Diane di Prima, and contributions from Beat notables such as Jack Kerouac and Allen Ginsberg. Baraka’s first collection of poems, Preface to a Twenty Volume Suicide Note, was published in 1961. His award-winning 1964 play, Dutchman, presents a philosophical exploration of black and white relations in New York City through a white woman’s attack on a black male passenger during a ride on the subway. 1. Baraka, Imamu Amiri, 1934- Preface to a twenty volume suicide note / by Le Roi Jones. New York : Totem Press in association with Corinth Books, c1961. 2. Baraka, Imamu Amiri, 1934- Dutchman and The slave : two plays / by LeRoi Jones. New York [N.Y.] : Morrow, 1964 Music permeates both Baraka's creative and critical writing. In 1963 he published the acclaimed study of jazz and blues, Blues People: Negro Music in White America. The drawing "Monk Inventing the Break Dance" was made by Baraka for the cover of The Book of Monk, his collection of essays and poetry on jazz pianist and composer Thelonious Monk. 3. Baraka, Imamu Amiri, 1934- Blues people : Negro music in white America / by LeRoi Jones. New York : W. Morrow, 1963. 4. “Monk Inventing the Break Dance,” Amiri Baraka, circa 2004. Book of Monk collection. With the assassination of Malcolm X in 1965, Baraka took up the cause of Black Nationalism. This philosophy advocated for unity and self-determination of identity among African-Americans, as opposed to the multicultural approach which prevailed during the earlier civil rights movement. Baraka was highly involved with the Black Arts aspect of the group, which viewed literature and poetry as weapons. He grew dissatisfied with the results in the 1970s and began to subsequently define himself as a “Marxist-Leninist-Maoist.” Throughout the 1980s and 1990s, Baraka taught in several different universities. A native of Newark, New Jersey, Baraka was awarded the post of Poet Laureate for the state in 2002. Criticism of Anti-Semitism in his poem on the September 11th terrorist attacks, “Somebody Blew Up America?,” ultimately prompted the Governor and State Legislature to abolish the position as a way of removing him. Baraka stood as a polarizing figure throughout his career, with some critics representing his work as violent, anti-Semitic, misogynistic, and homophobic. Amiri Baraka died on January 9, 2014. Baraka contemporary Ishmael Reed occasionally clashed with the fellow African American writer, but took exception to the many obituaries which focused on the controversial aspects of Baraka’s writing. Reed described Baraka as “the kind of writer who comes along once in a generation or so. I once said that he did for the English syntax what Monk did with the chord. He was an original.” (“Ishmael Reed on the Life and Death of Amiri Baraka.” The Wall Street Journal, January 12, 2014. http://blogs.wsj.com/speakeasy/2014/01/12/ishmael-reed-on-the-life-and-death-of-amiri-baraka/ (accessed February 6, 2012).) 5. “A Guerilla Handbook,” Amiri Baraka. Fair copy typescript, 1974. From Imamu Amiri Baraka collection. 6. Original unused artwork for Malcolm X as Ideology, Ted Harris, circa 2008. From Malcolm X as Ideology collection. 7. Baraka, Imamu Amiri, 1934- Somebody blew up America / by Amiri Baraka. [Newark, N.J.?] : The author, c2001 ([S.l.] : Oakland layout by blackdotpress).
|Transient Admission (summer only)| |Readmission of Former Students| |Enrollment as a Nondegree Student| |High School Parallel Enrollment Program| |Law School Admission| Admission to the University of Texas at Austin is open to all candidates on the basis of academic preparation, ability, and availability of space in the program chosen, without regard to race, color, national origin, religion, sex, age, veteran status, or disability. Prospective students are encouraged to apply early for the enrollment period in which they are interested. Enrollment pressures at the University are such that it may be necessary to admit a limited number of applicants from among those who are qualified. When there are more qualified applicants than can be adequately instructed by the faculty or accommodated in the facilities, the University may control enrollment in specific programs by limiting the admission of new students. Freshman applicants are encouraged to use the resources of the Freshman Admissions Center located in John W. Hargis Hall at the corner of Martin Luther King Jr. Boulevard and Red River Street. Counselors there can provide detailed information about admission to the University and assist prospective students with the application process. Application deadlines. All application materials must be submitted by the following deadlines: |Fall Semester||Spring Semester||Summer Session| |Freshmen||February 1||October 1||February 1| |Transfer students||February 1||October 1||February 1| |Former students||July 1||December 1||May 1| |International students||February 1||October 1||February 1| |Transient students||May 1| Programs that have enrollment limits normally have earlier application deadlines. When space is available, deadlines may be extended. Application processing fee. A nonrefundable fee of $40 is required of undergraduate applicants for admission to the University. A former student who applies for readmission to an undergraduate program must submit the application fee only if he or she has undertaken additional coursework since leaving the University. An applicant who presents academic credentials from any country other than the United States when applying for admission must submit a nonrefundable fee of $85. In cases where the applicant is subject to two fees simultaneously, only the higher fee is required. Students who apply to the professional program in pharmacy after completing prepharmacy coursework must pay a nonrefundable application processing fee of $60; students who apply to the upper-division professional sequence in nursing must pay a nonrefundable fee of $25. In assessing an applicant's record, the Office of Admissions will evaluate, in addition to the ACT and SAT I scores, class rank, writing samples, recommendations, special circumstances, extracurricular achievements, and related factors identified by the applicant in writing. Consideration may be given to students who have received individual honors or have participated in programs such as Advanced Placement and International Baccalaureate programs. No specific class rank, grade point average, test score, or other qualification by itself will assure admission. As a state-supported public institution, the University reserves a majority of its places for Texas residents. Consequently, the admission of nonresidents is more competitive. In those schools and colleges unable to accommodate all qualified applicants, preference will be given to applicants considered to have the best qualifications. (See Additional Admission Requirements for Some Programs in this section.) Applicants who are not offered regular admission will be given the opportunity to be admitted provisionally if they are Texas residents and have graduated from a Texas high school. Nonresidents are not eligible to be admitted on a provisional basis. Recipients of bona fide scholarships designated by the president will be admitted on a regular basis. Summer session and spring semester. Provisional students are required to register for English 306 and Mathematics 301 or 302 without regard to prior credit earned. Students also must register for one natural science course (Biology 301M or Chemistry 304K) and one social science course (Psychology 301 or Sociology 302). Students who complete the prescribed coursework with the minimum grade requirements are admitted on a regular basis in the subsequent semester. Students who fail to complete the prescribed coursework with the minimum grade requirements will be dismissed from the University and may be considered for readmission in a subsequent semester under the rules for transfer applicants. The test schedules printed in this section indicate the dates the SAT I, the SAT II: Subject Tests, and the ACT Assessment are offered. Applicants who choose to submit the SAT I for admission purposes may not take the SAT II: Subject Tests on the same date. Test scores are received by the University (if the student designates the University as a test score recipient) about five weeks after the test date. Since the receipt of an official report from the testing agency begins the application process, applicants should take the SAT I or the ACT no later than December of their senior year. Prospective students who have disabilities may make special testing arrangements by contacting the appropriate testing agency. Information and registration materials may be obtained from the student's high school counselor or by writing to College Board ATP Princeton, New Jersey PO Box 414 Iowa City, Iowa |Domestic Deadlines||Foreign Deadlines| |Test Date ||Registration Postmark Deadline||Late Registration Postmark Deadline||Registration |October 12, 1996||September 13, 1996||September 20, 1996||Test not |November 2, 1996||September 27, 1996||October 9, 1996||September 27, 1996| |December 7, 1996||November 1, 1996||November 14, 1996||November 1, 1996| |January 25, 1997||December 20, 1996||January 2, 1997||December 20, 1996| |March 15, 1997||February 7, 1997||February 19, 1997||Test not available| |May 3, 1997||March 28, 1997||April 9, 1997||March 28, 1997| |June 7, 1997||May 2, 1997||May 14, 1997||May 2, 1997| |Test Date ||Registration Postmark Deadline||Late Postmark Deadline| |October 26, 1996||September 27, 1996||October 11, 1996| |December 14, 1996||November 15, 1996||November 29, 1996| |February 8, 1997||January 10, 1997||January 24, 1997| |April 12, 1997||March 14, 1997||March 28, 1997| |June 14, 1997||May 16, 1997||May 30, 1997| Subject preparation. High school students who intend to enroll at the University should take a college preparatory curriculum. Entering freshmen must have a minimum of 151/2 units of high school work (grades 9 - 12). At least 14 of these units must be from the areas and courses specified in sections A through E below. The number in the column headed "Units" indicates the minimum number of units that must be offered in that subject or area. One year's work in a subject is counted as one unit. A semester's work is counted as a half unit. |Required: Four units of English, one of which may be writing, world literature, speech, or journalism. (English for speakers of other languages may not be used to fulfill the language arts requirement, but may be counted as an elective in area F.)| |Strongly recommended: The fourth unit of English should include the development of writing skills.| |Required: Two units in a single language. American Sign Language may be used to fulfill the foreign language requirement.| |Required: Three units at the level of Algebra I or higher: algebra, plane geometry, trigonometry, analytic geometry, elementary analysis, probability and statistics, solid geometry, calculus with analytic geometry, number theory. (Informal geometry and prealgebra are below achievement level courses and will not fulfill the mathematics requirement, but may be counted as electives in area F.)| |Strongly recommended: Students planning to enter scientific, engineering, or other technical fields are advised to take at least four units of math. The additional unit may be counted as an elective in area F.| |Required: Two units of physical science, biology, chemistry, physics, physiology and anatomy, geology, meteorology, marine science, astronomy.| |Strongly recommended: Students planning to enter scientific, engineering, and other technical fields are advised to take at least three units of science, including chemistry and physics. The additional unit may be counted as an elective in area F.| |Required: Three units of anthropology, area studies, ethnic studies, economics, geography, government (civics), philosophy, social science, psychology, sociology, Texas history (advanced), United States history, world history, work/study programs.| |Required: One and one-half units including (1) any units beyond the minimum required in areas A through E; (2) any units in area G; (3) vocational and other subjects except drill subjects (e.g., driver training, military training) and physical education.| |Strongly recommended: One-half unit of theatre arts, art, music, Applicants who intend to major in architecture, business administration, engineering, or natural sciences are strongly advised to prepare by taking math and science every year of high school. Admission will not be granted to applicants who have not completed the required units listed above. Recipients of bona fide scholarships designated by the president and students whose high school curriculum does not include the courses necessary to complete the unit requirements may apply to the director of admissions for an exception. Students who are admitted by exception must remove deficiencies to graduate. Courses taken to remove a deficiency do not count toward the student's degree. A deficiency in foreign language must be removed by earning credit for foreign language or classical language courses numbered 406 and 407, or 506 and 507 (or equivalent transfer courses), or by earning a passing score on the appropriate placement examination given by the University. A deficiency in mathematics must be removed by earning credit for Mathematics 301 (College Algebra) or Mathematics 304E (Trigonometry), or an equivalent transfer course. For all other subjects, one semester of college credit will be required to remove a deficiency of one year or less of high school credit. To major in music a student must meet University admission requirements and pass an audition conducted by the School of Music. A student who does not pass the audition may not major in music even though he or she is admitted to the University. At the discretion of the music school a student who fails an audition may audition a second time. Admission to programs in the Department of Theatre and Dance requires the approval of the Theatre and Dance Admissions Committee. Information about requirements, procedures, and deadlines is available from the office of undergraduate studies in the department. See chapter 7 of The Undergraduate Catalog for additional information about admission to specific programs in the College of Fine Arts. Admission to upper-division work. In addition to the requirements outlined in the preceding section, some academic programs have established minimum standards for admission to upper-division or professional sequence courses. The student should consult departmental advisers about eligibility to register for upper-division coursework. Next Chapter | General Information Table of Contents | General Information Home Page | Registrar's Home Page | UT Home Page 28 August 1996. Registrar's Web Team Comments to email@example.com
New and Special Course Offerings – Spring 2015 ENG 130-01: Literary Analysis Dr. Lisa Fraustino Are you planning to become a teacher of young children in grades K-6 or an English teacher for older children in grades 7-12? If so, this is the course for you! It was designed especially to introduce the analytical skills you will need to teach literature. ENG 130 will also provide a strong foundation in literary analysis for students hoping to pursue a graduate degree in literature. An introduction to the study of literature in a variety of forms and from different periods and traditions. Emphasis on close reading, interpretation, and analysis of literary works with attention to literary terms, genre distinctions, and formal elements. Recommended for students in the Pre-Secondary English Certification program. - Identify and interpret figurative language and other elements fundamental to literary analysis. - Understand how patterns, structures, and characteristics of literary forms and genres may influence the meaning and effect of a work. - Situate authors and texts studied within historical, cultural, and critical contexts to aid in interpretation. - Engage with others’ perspectives to deepen their understandings of human values and thought. **Date/Time: Mondays, Wednesdays, Fridays 1:00 – 1:50 p.m. ENG 365-01: The Golden Age of the American Tomboy Dr. Allison Speicher According to a recent article in Psychology Today, almost half of American women report having been tomboys as children. Despite the prevalence of tomboys in both fiction and reality, however, there is surprisingly little consensus on what the term actually means. Is the tomboy born or made? Is she a girl who just wants to have fun or a girl who wants to be a boy? Is a tomboy still a tomboy without her fair and feminine foil and her “sissy” best friend? And will she ever grow out of it? This course will explore the “Golden Age” of the American tomboy, from the Civil War into the early twentieth century, in order to understand the historical roots of this figure. Why did this era give rise to gender-bending heroines? Why do their stories enjoy continuing popularity? We will consider foundational tomboys, like Little Women’s Jo March, alongside heroines from the end of the Golden Age, like Little House on the Prairie’s Laura Ingalls and Mark Twain’s “Hellfire” Hotchkiss. Studying the tomboy in her various literary contexts—sensation novels, children’s literature, and regionalist fiction—will help us to understand the figure’s roots not only in shifting conceptions of gender, but also in postbellum views of race, class, and sexuality. As the course draws to a close, we will consider the state of the tomboy in the twenty-first century: with the popularity of fierce teen heroines today, are we currently experiencing a second Golden Age of the American tomboy? This course fulfills the Middle Period requirement. **Date/Time: Wednesdays 4:00 – 6:45 p.m. ENG 365-02: Digital Game Studies Dr. Jordan Youngblood Far from a niche medium only played by kids, video games have taken a prominent place in our national media: according to a 2014 study by the Entertainment Software Association, 59% of Americans engage in playing video games; more than half of American households own a dedicated gaming console, and the average player is around 31. Nor are games just Mario eating mushrooms or soldiers blowing up other soldiers. Games continue to adapt as technologies change. Handheld devices, multiplayer environments, games as protest pieces or performance art, and the growing scope of digital storytelling are proving that the more people are playing games, the more we’re having to reconsider what a “game” actually is. This class is intended to introduce you to the critical study of video games as a steadily emerging scholarly field, one that bridges traditional forms of textual and cultural analysis with an examination of how games actually work as digital objects. (And yes, English majors can totally study video games. We even get jobs doing it!) We’ll both read essays about games and actually play games in the course, with each game serving as a chance to use our growing critical understanding of the medium in different ways. Some days we’ll talk about the way race and economics influence the Grand Theft Auto series; others, we’ll play a round of Super Meat Boy and discuss the pain and pleasure of video game failure. However, this is not a class exclusively for people experienced with games. If you’ve never played even a single round of Candy Crush, that’s no problem at all. In fact, you may find that you’re far more aware of and adaptive to the logic of games than you think. As long as you’re willing to explore and examine a form of play that now contains over 1.2 billion users worldwide, this is the place for you. Date/Time: Mondays, Wednesdays, Fridays: 1:00 – 1:50 p.m. ENG 373-01: Rhetoric of the Graphic Novel Dr. Lauren Rosenberg Is the graphic novel literature? Is it art? What is a graphic novel anyway? How does it relate to fiction? To memoir? How does it overlap with popular comics? Is there more to comics than action? Why have graphic novels had such rapid growth in the last decade, and why is there so much controversy over their inclusion in school curricula? “Rhetoric of the Graphic Novel” will begin with such questions as we investigate the increasingly popular medium of graphic narratives. Our objective will be to explore the graphic novel as a rhetorical form that crosses the boundaries of traditional novels, memoirs, and narrative art to create a hybrid genre. We will consider Scott McCloud’s theories of how we read text and what assumptions we make about writing and pictures when we look at, and assign meaning to, a page. Primary sources will include some of the most celebrated and controversial graphic novels currently available, such as Persepolis, Blankets, American Born Chinese, Fun Home, The Photographer, and Asterios Polyp. In addition to discussing the rhetoric of graphic novels, we will also read critical essays that explore these texts and how graphic novels are relevant to teaching in secondary and college classrooms. Students will be challenged to examine graphic novels as cultural and teachable texts in a series of critical papers. As the final project in this class, we will have a creating comics workshop (you don’t have to know how to draw). This course on graphic novels challenges notions of what constitutes literary and popular texts and calls into question what it means to read and create meaning. This course fulfills the English Major Language requirement and gives you credit towards the Writing minor. Meets Mondays, Wednesdays, and Fridays: 10:00 – 10:50 a.m. New and Special Course Offerings – Fall 2014 ENG 206-01: Multimodal Writing Workshop Dr. Steve Ferruci This course is an introduction to writing multimodal texts. Multimodal texts incorporate different modalities – print, visual, aural – and are usually published on the Web. Multimodal writing is essentially a Web 2.0 mash-up. In this class, we’ll learn how to design and produce a number of multimodal texts, for example a visual essay, an animated “short,” a series of podcasts, and the like. We’ll learn how to use video and sound recording technologies, how to edit such recordings, and how to incorporate them into a text (or use them as the text itself). We’ll also play with various presentation applications (Prezi, Storify, or PechaKucha) and learn how to create animated stories which incorporate print, sound, and visual components. No prior experience in any of these technologies or genres required; we’ll learn them as we go. *This course counts as an elective for the English major and the Writing Minor. Date/Time: Tuesdays and Thursdays 4:00 – 5:50 p.m. ENG/WST 365-02: Queer Theory and Digital Media Professor Jordan Youngblood As we enter an era where the prospect of what and how we love becomes increasingly fused with new media, and more and more erotic negotiation takes place over digital interfaces rather than the bar countertop, the relationship between sex, gender, and technology has become decidedly complex in contemporary discourse. How does an increased reliance on Match.com and mediated relationships alter the idea of what it means to be human, if at all? What can it show us about the already-artificial nature behind the most “natural” of acts? What unexpected desirable avenues for a variety of individuals are now available due to the use of digital media, and what prospects have remained the same (or perhaps regressed)? In what ways can the digital be used as a place of sexual and gendered protest, activism, or archiving? How will we navigate this landscape, and in doing so, how will it continue to change us? Our course grapples with these questions by examining the field of queer theory: a discipline that, from its origins, has focused upon complicating and de-familiarizing traditional concepts of sexuality and gender. We will read a collection of criticism from the field built around seven conceptual units: the “queer,” bodies, performance, public/private, race, history, and family. Each of these is meant to bring crucial foundational texts in contact with recent writings that take a queer angle on digital media. As we move further into the material, you will grow more acquainted with the language and concepts of queer theory while also witnessing how new technologies force these concepts to develop and adjust. By the end of the course every student will construct a project utilizing digital media in order to explore some aspect of gender and sexuality, based on the dialogues we develop in class. In essence, we will both witness and engage in a conversation taking place between theory and media, and how each side has been impacted by the other. No prior experience in either gender studies or digital media is required. All that’s needed is a willingness to tackle these ideas with maturity and respect. While some readings will be decidedly complex, don’t be intimidated. We will address each text and the concepts within them in a manner that allows people from a variety of fields to gain something. Day/Time: Mondays and Fridays 2:00 p.m.— 3:15 p.m. ENG 338-01: Linguistic Analysis Dr. Elena Tapia You need it. You want it. - Fulfills the English major’s Language Studies category - Will be required for Early Childhood Education and Elementary Education majors Explore how languages Work! This is a small class with lots of hands-on practice with various elements of language. We’ll work with English but also with other languages from around the world. Doesn’t seem possible? It is. Trust me. Date/Time: Tuesdays and Thursdays 2:00 - 3:15 p.m. New and Special Course Offerings – Spring 2014 ENG 237-01: Encoding Electronic Texts – Dr. Benjamin Pauley This course explores questions at stake in the digitization of texts that first appeared in print or manuscript form. Students will get a practical introduction to the Text Encoding Initiative (TEI) guidelines, a technical specification of XML that makes it possible to describe a text in ways that enable new kinds of digital presentation and analysis. TEI is widely used in digital humanities research in many disciplines (not just English, but History, Linguistics, Classics, and so on). It has also been adopted by many libraries and museums as they digitize materials in their collections. At the same time that we explore the nuts and bolts of TEI, we’ll also be taking on some very fundamental questions about reading and interpretation. What is “a book”? An abstract intellectual or artistic creation? A material object you can hold in your hand? How do we recognize the various codes by which we human readers make meaning from books? How can we best describe those codes in ways a computer can understand? This is a four-credit course that meets four hours per week: three hours of discussion plus an hour of workshop/lab. No prior experience with XML is expected. You don’t need to be any kind of computer wizard to do the work of this class, but you do need to be willing to experiment and try new things. Date/Time: MWF 1:00-1:50 p.m.; F 2:00-2:50 p.m. ENG 365-01: Women Writers of the Long Eighteenth Century – Dr. Benjamin Pauley This course will examine poetry, fiction, and drama written by British women authors during the “long” eighteenth century (from approximately 1660 to 1800). This period was marked, in part, by the emergence of a marketplace for literature. Rather than writing for small coteries of readers or writing to suit the tastes of elite patrons, authors were increasingly able to direct their works to a broader public of book purchasers. To publish, however—to write for publication—could be a fraught choice for women authors, since courting the public eye ran counter to expectations of feminine modesty and decorum. Among other things, this course will highlight the ways that different women negotiated questions of publicity as they pursued writing, whether as an avocation (that is, a private calling) or as a profession (as many women did). The semester’s readings will include works by authors such as Margaret Cavendish, Katherine Philips, Aphra Behn, Eliza Haywood, Susannah Centlivre, Anne Finch, Lady Mary Wortley Montagu, Charlotte Lennox, Frances Burney, and Jane Austen, as well as the anonymous works of women who may have signed themselves only “A Lady.” **This course fulfills the Middle Period and the Women Writers requirements for the English major. Date/Time: Tuesdays 4:00 – 6:45 p.m. New and Special Course Offering – Fall 2013 ENG/WST 351-01: Feminist Theories – Dr. Maureen McDonnell This course is designed as an introduction to feminist theories and practice. Feminist theories draw attention to the ways in which all our lives are shaped and interlinked by a range of social, economic, and political structures. Although gender plays a key component in these structures, we will also pay attention to different forms that sexual, racial, class and colonial hierarchies take. - This course is required for all students majoring in Women’s and Gender Studies. - Are you a Women’s Studies minor? This elective is strongly encouraged. Date/Time: Wednesdays, 7:00 – 9:45 p.m. New and Special Course Offering – Spring 2013 ENG 348-01: Language & Society – Dr. Elena Tapia We’ll examine the relationships that exist between language and society. - Why does a person’s or a group’s language vary from situation to situation? - What are some attitudes toward languages and dialects that people form about themselves and about others? - Why do we form those attitudes? - How does language form our identity? Each class is organized around a question or questions that tie the readings to theoretical issues, and students should come to class prepared to discuss the questions. ** This course fulfills the English Major “Language Studies” Requirement. Great elective for language lovers! Date/Time: Mondays & Wednesdays 4:00 – 5:15 p.m. ENG 365-01: Classical Comedies – Dr. Miriam Chirico Hello! Join your fellow students in this semester’s reading of comedies, featuring such literary “stars” as the Roman playwright Plautus, the political manipulator Machiavelli, and the playfully romantic Shakespeare. We will read various texts. closely for tricks and turns, to see how wily servants outsmart their masters, how men and women plot for their own advantage, and how fools proffer a philosophy of life. As we delve into the roots of comedy, we will consider the present context as well: - What sit-coms and romantic comedies do we find funny today? - What tricks do we play on others and what masks do we wear? - What is the modern-day equivalent of the fool or the zany? - Does comedy reinforce stereotypes or challenge the status quo? Finally, your instructor is interested in a particular pattern within comedy — the “trope of lost identity.” Thus, we will look for moments where a central character worries about losing his or her identity and wonders aloud “who am I?” In other words, the instructor is doing research for a book and will depend upon you for your creativity, hard work, and ideas. Please join us! On with the Show! **This course fulfills the English Major “Early Period” Requirement. Date/Time: Mondays 4:00 – 6:45 p.m. New and Special Course Offering – Spring 2013 ENG 373-01: Studies in Rhetoric: The Rhetoric of Film – Dr. Stephen Ferruci In ENG 373 we will examine films in order to understand how and why we identify with the characters in the films. We will consider, too, the story being told (the narrative structure) as a reflection of a particular set of cultural assumptions. No previous experience with film or rhetoric required, just a willingness to watch and discuss what you see. “This class will change your life.” – Ebert “A must take!” – L.A. Times “If you take just one class next semester, take this one, but then you’ll be under‐enrolled, so take this one and 4 others.” – The Onion ** This course fulfills the Language Studies requirement and counts for the Writing minor. Date/Time: Tuesdays & Thursdays 2:00 – 3:15 p.m. ENG 358-01: Literary Criticism – Dr. Meredith Clermont-Ferrand In ENG 358 you will be introduced to many of the critical perspectives and theories that enliven contemporary literary and cultural studies. Included on our lit-crit-hit-parade will be Structuralism, Post-structuralism, Postmodernism, Feminist literary studies, Queer Studies, Ethnic and Race Studies, Postcolonialism, Marxism, Psychoanalytic literary studies, and Culture Studies. Sound intimidating? Don’t worry–we will be testing these theories on short stories, novellas, films, pop culture, and each other. As we examine these different ways of reading, and thinking about reading, we will be asking ourselves: What is “literature”? Why do we study it? In what ways, if any, are literary texts different from other types of cultural productions? What is “theory?” Can literary theories be applied to non-literary texts? How do literature and criticism relate to other aspects of culture such as gender, race, class, and nation? What is at stake in choosing one critical/theoretical methodology over another? Date/Time: Wednesdays 4:00 – 6:45 p.m.
Illustrations for the children's book Polishunden Roy, with text by Barbro Lindgren. School assignment 2013 Various illustrations for literature magazine Ordkonst 2011-2013 The Secret History Investigation and exploration of the medium illustration in relation to a text. How does images affect one's reading? And how does the reading affect one's images? These works are based on the novel The Secret History by Donna Tartt. Rundgång is a comic book project where all members of our collective write a text, and then forward it to a fellow member to be interpreted and drawn. It's an experiment to find new ways to come up with visual stories. I've illustrated a text by Nathalie Ruejas, written one for Elisabet Ericson and made the pattern and cover design.
The Victorian Web, 1987-2012 — Why is it unique? Interesting? The Victorian Web, which originated in hypermedia environments (Intermedia, Storyspace) that existed long before the World Wide Web, is one of the oldest academic and scholarly websites. It takes an approach that differs markedly from many Internet projects. Today the Internet offers many excellent resources — and we use them often! — such as Project Gutenberg, the Internet Archive, the Library of Congress, and British Listed Buildings. These sites take the form of archives that quite properly preserve their information in the form of separate images or entire books accessible via search tools. The Victorian Web, in contrast, presents its images and documents, including entire books, as nodes in a network of complex connections. In other words, it emphasizes the link rather than the search tool (though it has one) and presents information linked to other information rather than atomized and isolated The Victorian Web takes a fundamentally different approach to finding and using information than do search-based Internet projects. Internet archives and invaluable Internet tools, such as Google, treat bodies of information as a chaotic swamp that one searches — one can’t say “negotiates” — with a wonderful laser-like tool that penetrates the fog and darkness. If we find what we're looking for, we leave immediately. We relate differently to hypertexts like the Victorian Web, which conceive of information existing within a complex ecology or set of connections, because they allow us to experience the richness of the texts and images we encounter. In the Victorian Web we encounter books, paintings, political events, and eminent and not-so-eminent Victorians in multiple contexts, which we can examine when and if we wish to do so. The Victorian Web also differs fundamentally from websites like Wikipedia and many reference works, such as Britannica, and the Oxford Dictionary of National Biography: Each of these justly renowned sites (which authors of material on this site use frequently) aims to present a single authoritative view of its subject. In contrast, the multivocal Victorian Web encourages multiple points of view and debate, in part because matters of contemporary interest rarely generate general agreement. Originally begun back in 1987 as a means of helping scholars and students in see connections between different fields, the site today has greatly expanded the kinds of connections one can find. For example, on this site commentary on the works of Charles Dickens exists linked to his life and contemporary social and political history, drama, religion, book illustration, economics, and so forth. Similarly, our online edition of Ruskin’s enormously influential The Seven Lamps of Architecture, whose original print version makes its excellent illustrations hard to use, places these images near the text that mentions them, often adding details, photographs of the subjects of the drawings, and connections to a wide range of useful material including secondary materials, Ruskin’s other works, and images of the Gothic and the Gothic Revival. How large is it? 61,408 documents and images as of 19 March 2012, and it grows every day. Approximately 5,000 documents are Spanish translations of the sections on literature and religion created by a team based at the University of Computense Madrid and initially funded by the Spanish government. A small number of documents about Ruskin and gender matters exist in French translation, too. How many people use it? The site now receives 1.5 million page views a month and several hundred thousand on the University of Nagoya server in Japan, which is updated only once or twice a year. What areas does it include? Primary and secondary texts (including scholarly book reviews) in British Victorian economics, literature, philosophy, political and social history, science, technology, and visual arts (painting, architecture, sculpture, book design and illustration, photography, decorative arts, including ceramics, furniture, jewelry, metalwork, stained glass, and textiles, costume and various movements, such as Art Nouveau, Japonisme, and Arts and Crafts). Although the site concentrates on Great Britain in the age of Victoria (1837-1901), it includes much material before and after those years, particularly in sculpture and architecture, and the site also has a good deal of comparative material. For example, one can find railroad stations and other forms of iron-and-glass architecture not only from England but also from Australia, Croatia, France, Italy, India, Malaysia, Portugal, and Singapore. In addition, the section on Aesthetes, Decadents, and Symbolists include European literature and art. What kinds of media does it include? Text, monochrome, and color images predominate, but our section on Victorian music, theater, and popular entertainment includes sound files with performances of both music hall and parlor ballads. In addition, the site also contains a small number of VR images of sculpture and works of decorative art that the viewer can turn and otherwise manipulate. What areas are especially strong? Literature, painting, architecture, sculpture, book illustration, history, religion, though the sections on history and technology include hundreds of documents. Who can contribute? Who has contributed? Chiefly professional scholars from the Americas, Europe, Asia, and Australia, the great majority from the U. S. and U. K. In addition to work by members of the faculty at universities around the world, the site contains several hundred essays on literature by undergraduate and postgraduate students, chiefly from Brown but also from other universities. Is it peer-reviewed? (a) The site has three dozen out-of-print scholarly books, all of which have been peer-reviewed. (b) Since 2010 all submissions from outside the editorial board receive 3 or 4 readings, with the exception of book reviews, which only the editor-in-chief vets. (b) Contributions by undergraduates in courses at Brown and other universities, some of which appear on the site for the importance to the history of hypertext, are clearly marked as such. What about copyright? Who owns what? Authors, including those who contribute out-of-print scholarly books — we have several dozen — and those who contribute photographs and reproductions of art works, generally major museums and galleries, retain copyright. The many thousand photographs by the editors or our contributing photographer bear the following permission line: “You may use these images without prior permission for any scholarly or educational purpose as long as you (1) credit the photographer and (2) link your document to this URL in a web document or cite the Victorian Web in a print one.” (When we use material from the Internet Archive, we request that it be credited, too.) How is it funded? Currently self-funded. The Victorian Web has never received support from Brown University, though it was first housed by the High Energy Physics Group at Brown University, then by Brown’s Scholarly Technology Group. In the latter 1990s Landow funded servers that host the site, and he has done so since 2008. From 2000 to 2008, the National University of Singapore funded servers, a mirror site, support staff, and four post doctoral or senior researchers. Who owns it? George P. Landow, Professor of English and the History of Art, Emeritus, Brown University; former Shaw Professor of English and Digital Culture (Computer Science), National University of Singapore, 2000-2003. email@example.com Who are its editors and chief contributors? George P. Landow PhD, Founder, Editor-in-chief. and Webmaster; Jacqueline Banerjee PhD, Associate Editor, Assistant Webmaster, and UK Contributing Editor; Philip V. Allingham PhD, Contributing Editor, Canada; Andrzej Diniejko PhD, Contributing Editor, Poland; Derek B. Scott PhD, Music Editor; Diane Greco Josefowicz PhD, Science and Technology Editor; Robert Freidus, Contributing Photographer. Asun López-Varela Azcárate PhD of the Facultad de Filologéa, Universidad Complutense Madrid, conceived, organized, and directs the translation of the Victorian Web into Spanish, coordinating more than 100 translators and vetting their work. Montserrat Martínez García PhD, who translated the entire section on religion as well as much of the material on Ruskin, including a complete book, is the single most active of the translators. What honors has it received? More than 4,000 sites link to it. Archived daily by the Library of Congress, it has won prizes and recognition throughout its existence. In 1990 its pre-web version received the EDUCOM/ENCRIPTAL Higher Education Software Award from National Center for Research to Improve Postsecondary Teaching and Learning; in 2000 it won the Art History Webmasters Award in Paris; in 2010 the London Times declared it "an outstanding resource." It has received more than fifty awards both for the entire site and specific sections, such as history, visual arts, evolution, and religion. It has been recommended by Britannica, the BBC, the History Channel, and agencies or organizations in England, France, Italy, Netherlands, Russia, Singapore, Sweden, and the United States. Landow, George P. Hypertext 3.0: New Media and Critical Theory in an Era of Globalization. Baltimore; Johns Hopkins, 2006. Especially Ch. 6, “Reconfiguring Writing” (pp. 144-214) and Ch. 7, “Reconfiguring Literary Education” (pp. 272-320). Translations of this and earlier versions: Italian, Japanese, Korean, Spanish. Last modified 1 April 2012
Services on Demand Print version ISSN 0104-1169 Rev. Latino-Am. Enfermagem vol.16 no.2 Ribeirão Preto Mar./Apr. 2008 The meanings of quality of life: interpretative analysis based on experiences of people in burns rehabilitation1 Maria Cristina Silva CostaI; Lídia Aparecida RossiII; Lívia Mara LopesIII; Caroline Lopes CioffiIII IAnthropologist, PhD, Faculty, email: email@example.com IIRN, Associate Professor IIINursing undergraduate student. University of São Paulo at Ribeirão Preto, College of Nursing, WHO Collaborating Centre for Nursing Research Development, Brazil This research aimed to interpret the meanings of quality of life, taking into consideration the meanings attributed by those who have undergone serious burns, their experiences and social/cultural background. We used the ethnographic method based on modern hermeneutics. Nineteen patients with burn sequelae, already discharged from the Burns Unit of the Ribeirão Preto Medical School Clinical Hospital participated in this study, along with their relatives. Participants belong to the working class, are between 18 to 50 years old and have been in rehabilitation for at least a year. Data were collected by direct observation and semistructured interviews. The analysis was processed through the identification of units of meanings and construction of thematic nucleuses. Patients and relatives reported that quality of life had changed because of physical and psychological limitations caused by the burns. The meanings of quality of life are associated with the performance of social roles and are guided by family, work, normality, autonomy and social integration. Descriptors: quality of life; burns; culture; nursing Since 1970, a growing interest in quality of life assessment has been observed in the health area, possibly due to increased life expectancy and the survival of people with disabilities or with chronic health conditions. The existence of different ways of conceptualizing quality of life can also be noticed, being a complex and comprehensive concept(1), involving a wide array of dimensions: biological, psychological, social, cultural and environmental. Studies on quality of life have been conducted within a naturalistic perspective. As such, the scales that evaluate quality of life do not capture its subjectivity, even when they reflect the multidisciplinary nature of the human focus on its domains and focus on the emotional and health status, social interactions, economic status and physical capacity. The same happens regarding the sociocultural idiosyncrasies of social groups and classes. It cannot be ignored that man is a biological organism, and as such may be an object of study centered on the biologic organism and disease, within the naturalistic perspective. However, the characteristics that make a man a person cannot be ignored and, hence, it is necessary to understand and interpret their motivations, values, believes and what directs the focus towards the cultural dimension. Therefore, studies about the comprehension and interpretation of the meaning of quality of life could complement the studies developed from a naturalistic perspective(1). Regarding the person who suffered burns and aspects related to quality of life, literature reveals a focus on the process of rehabilitation and adaptation after the trauma and the chronic psychological problems involved in the development of posttraumatic stress, by using instruments to assess the health quality and status, such as the Burn Specific Health Scale(2). Studies that focus on the perspectives of people affected by burns and on the meanings of quality of life, referring to a symbolic dimension, are not listed in literature. There is a relevant interpretative focus on the approach of quality of life of people afflicted by burns that, stemming from meanings built by the subjects, is directed towards the symbolic dimensions and promotes the social contextualization of the issue(1,35). This perception encouraged a focused research, aiming to contribute to the interpretation of the meanings of quality of life, and using the experience of people in the rehabilitation process, as well as the meanings they attribute to this experience, as its empirical data. The study is based on the assumption that the meanings individually attributed to quality of life articulate with sociallybuilt meanings, reflecting knowledge, beliefs, priorities, practices, social standards and values adopted at a given historical moment and express cultural characteristics of social groups and societies. Therefore, interpreting the meanings of quality of life among people who experienced the burn rehabilitation process requires their identification among individuals, to analytically insert them in the structures of meaning they are integrated in, and which implies considering the collective production of meanings. Culture, as predominantly conceived by anthropology, is a symbolic universe, or a universe of meanings, a collective construct that universally characterizes human social life. By assuming culture as a "web of meanings" woven by man(6), the fact that man is an active subject of this process in his social life is highlighted. Also, it can be noticed that the "webs of meaning" created by man are not immutable or static, but are in a social process of constant transmission and change, coming to be in different lifestyles, standards, beliefs, values and habits. More than making cultural heterogeneity among peoples explicit, coexistence is subjacent in such cultural conception, in the same society, of several cultural diversities associated to groups and social classes(7). Cultural heterogeneity, expressed by different groups, associated to several conditions of existence, including social inequalities, is manifested by means of behaviors and interpretation of events. Within its own cultural specificities, each group has several ways to attribute meaning to everything, to feeling or being sick, quality of life, among others. The social representations of disease and quality of life consequently reflect the playing of roles and social use of the body, in a perspective that emphasizes the interconnection of action and role performance (where the experiences of individuals and social groups inform and direct the roleplaying)(7). In order to contribute to the interpretation of the meanings of quality of life of a group of people in a process of burn rehabilitation, based on their own experiences, conceptions and values, the objectives of this study were: identifying the priorities established by the subjects for their lives; delimiting the changes introduced in their lives after the burns and their sequelae; distinguishing the meanings attributed to the experience of burns and its sequelae. The research uses the ethnographic method ethnography being understood as a "dense description", a "description seeking for meanings"(6). This kind of research involves a relation of proximity and intersubjective exchange between the researcher and the subjects, in an ethnographic encounter, so that two distinct symbolic universes can interweave and the subjects' cultural logic of the topics can be unveiled(8). Based on modern hermeneutics, this study refers to the interpretation of meanings of practices and reports by subjects who are in rehabilitation due to serious burns, inserting them in the subjects' cultural context(9). The subjects were a group of 19 people, of both genders (12 male and 7 female), living in Ribeirão Preto (SP, Brazil). Interviewees were expatients selected within the age range of 18 to 50, who had been admitted to the Burns Unit of the Ribeirão Preto Medical School Hospital das Clínicas, and who had been in rehabilitation for one year or longer and did not show limitations that would impair their participation. The Burns Unit of has eight beds and admits adult and pediatric patients. Among the 44 identified people who fit the inclusion criteria and agreed to participate in the research, 19 were selected, by the delimitation of the number of participants done a posteriori, using the data saturation criterion, i.e., by verifying that the information obtained did not contain any new data. Eleven relatives of the subjects who were present at the time of data collection also took part in the study. All participants agreed to take part in the study by signing the Free and Informed Consent Term, after being properly informed about the research objectives and their participation, about not incurring in any kind of financial, emotional or physical loss, and about having their identities kept anonymous. The research, carried out in 20042005, as part of a Theme Project funded by the São Paulo State Research Foundation FAPESP, was approved in a meeting on November 11, 2002, by the Research Ethics Committee at the Ribeirão Preto Hospital das Clínicas. The study participants are members of lowerincome social classes, who occupied or occupy subordinate positions in the social hierarchy and experienced forms of social exclusion, revealed by their difficulty in satisfying material existential needs. Although their current social status was not an inclusion criterion in the research, this came to be regarded as relevant information for group definition, probably due to the fact that they are public healthcare service users. Direct observation and semistructured interviews were used as techniques, performed at the subjects' households. The interviews were recorded with the authorization of the interviewees and transcribed. The interview script was elaborated to collect: meanings that the subjects attribute to a good quality of life, associated to happiness, satisfaction, achievement and personal success; the elements activated in the construction of selfimage; meanings of quality of life; associations of the burns suffered and their sequelae with their current life; comparisons between activities, experiences, pleasures, suffering, feelings, before and after the burn; explanations of the determining factors of the burn; meanings attributed to the trauma suffered and its sequelae. The meanings acquired constitute the empirical material for the analysis, whose goal is to interpret meanings, and not to be mistaken by "seeing things from the player's viewpoint"(6), and to integrate them in their social base. It is assumed, therefore, that the differentiation between feeling and meaning, where "feelings" are attached to the concrete experience of the subjects, and "meanings" result from the analytic effort of the researcher(6,9). The process of data analysis covered the following interrelated stages: reading the collected material, identifying and grouping the units of meaning and interpretation by means of central themes. In this process, convergences and divergences of meanings were both considered. A "hermeneutic circle"(9) was configured, where the whole and its parts are identified by dialectic interpenetration. To promote this interpenetration, data from each participant was initially focused on. Afterwards, they were related with those of the group of participants. The analysis assured that the data obtained from distinct participants, initially apart, could be interpreted in the context of the whole array of accounts that, in turn, explained the meanings of the parts. RESULTS: THE MEANINGS OF QUALITY OF LIFE. Trauma is how most subjects define the experience of the burns. The meanings of trauma are usually and predominantly associated with pain, defined as intense and unbearable, but also related to feelings of insecurity, regarding the risk of death, the experience of being an inpatient and the hospital environment. The experience is also highlighted by worries about physical changes, mentioned as deformations, the risks of mobility loss and amputation of the affected limb, and with the possible changes in their daytoday life (particularly work, leisure and domesticrelated limitations). Responses to trauma, insecurity and worries display a wide range of variations, from overloading with affirmative meanings to denying any meaning to the burn experience. One of the interviewees refers to the experience as a moment to reflect about life and her relationship with her family and friends, attributing the meaning of changing values to it. In this case, even though the experience of the burn is still considered a trauma, it is seen as an "evil that caused some good", entailing a higher valuation of life, health and improvement in the relationship with family and friends, since, before the accident, her life was focused only on work. Another participant, when strictly relating the burn with suffering, says: I asked the doc to turn me off. I'd rather die than live in pain, which was intense. When meanings were attributed to good life and happiness, the accounts show correspondence with being healthy, having a job, comfort, good family relationships and more time to rest. Highlights associated with satisfaction include: lack of physical impairment, having friends and good family relationships, health, work capacity and material comfort. Highlights associated to personal success include: work, willpower, life improvement, satisfaction of material needs and autonomy. The meanings of good life tied to personal achievements result in: getting things on one's own, not having to depend on anyone; having a job; health, lack of scars, owning a household, satisfying family needs and accepting the limitations caused by the burn. Most subjects show a highlighted dissatisfaction with their physical appearance altered by the burn sequelae by trying to hide them, due to shame, or to avoid curious inspection and remarks, or by fear of scaring people away, including their own family members. Only one of the study participants affirms not having any qualms about it, and shows it by how she exposes the large scars on her arms. However, she also notices when people are looking curiously, although she reacts differently. She asks people who look at her: Would you like to see it? And she rolls up her sleeves to completely expose her scars. Other aspects reflect on selfimage: work, movement or relationshiprelated difficulties, with difficulties in family and sexual relationships being highlighted. It results in a new selfimage being built after the burn, highlighted by negativity and deprivation, which most commonly affect adult men who are family heads and see the continuity of their social roles impaired. For most participants, the burn is conceived as a milestone that sets a healthy life apart from an unhealthy life, where they are not able to work like before anymore, cannot leave home, cannot go out, cannot do anything else anymore. Among men, an impaired exercise of the role of provider and virility associated to sexual prowess is highlighted. Such impairments are shown to have a deep impact on the selfesteem of those who suffer movementlimiting burn sequelae, restricting their freedom and crippling them for work and for the social and sexual performances that were common before the burn. As to the adoption of new lifestyles after the burn, most report the need to: protect and hide the scars, avoid situations of body exposure; perform massages on the affected areas and use moisturizers. The results of observation, interviews and reports from family members show that the subjects, with rare exceptions, became less communicative within their social group after the burn, or simply withdrew from social life outside home. Most acknowledge being emotionally more fragile, and some refer to their situation as a constant struggle, or as a barrier. For some, the burn sequelae made them become more aggressive, rude, impatient, nonconforming, angry, depressive or anguished. Most of them display a negative selfimage and psychic suffering in their new lifestyle and in their reports. Two kinds of assessment are highlighted among the subjects in the acceptance process of physical changes due to burning. One is an affirmative assessment, established by comparing the trauma and its sequelae with worse conditions in which other people can be found, or because the burn and its consequences could have been worse, or still, because the person, having survived, considers himself/herself victorious. Another evaluation highlights the need to get used to it, meaning that they have to accommodate to an undesired and cumbersome situation. The most significant attributes associated to quality of life are: maintenance of family and friendship bonds, being healthy, having satisfactory hygiene, being able to work, having moments of leisure with family and satisfying family needs of nourishment, livelihood and comfort. The compromising of the subject's quality of life, acknowledged by nearly everyone, is conceived in the reports as an obstacle to being able to perform their social roles. They consider that all changes caused by the trauma result in damages to quality of life, due to disadvantages experienced in their daily life, such as: difficulties to find jobs, to adapt to work previously done, or because they cannot work anymore. They also acknowledge as elements that impair their quality of life: time spent to take care of their burn; the need to develop strategies to bring their lives back to normal; physical limitations, represented as disabilities and demanding changes in the routine of daily activities; damage caused in the relationship with family members, particularly when affective and sexual relationships with spouses are considered; inability to perform onceusual leisure activities and/or with children; loss of autonomy to perform simple activities, which they previously took for granted. When the burn affected the lower limbs, the damages to quality of life, besides being linked to the aforementioned limitations, are also related to discomfort due to not being able to stand for a long time, because the scar itches, the leg swells or it simply hurts; some of the participants reported that they needed to sit with their leg up high most of the time, to avoid swelling and pain, or to constantly move to relieve itching. In order to reach a socalled "satisfactory" quality of life, the elements mentioned by subjects of both genders identify with the following capacities: working, moving the limbs, enjoying moments of leisure with the family, having a satisfactory conjugal relationship, presenting oneself socially without worrying about scars, and defining oneself as a healthy person. In the subjects' conceptions, healthrelated quality of life is subordinated to mental and physical wellbeing and to good performance of social roles: being able to satisfy personal and family needs, not feeling pain, not needing treatment and having full capacity to execute their daytoday activities. Looking back at the roots of the trauma and its causes, the subjects associate them to both mundane and sacred dimensions. Although some report being struck by the burn due to stubbornness, children's curiosity or accident, in most cases, religion is a crucial element to explain the origin of the trauma. The explanations they report involve several beliefs: punishment or God's will; payback of debts incurred in past lives, or fate. Even though the sacred dimension is not associated to the other topics addressed, religion emerges as an important focus of attributing meaning to the origin of the trauma and to the suffering unleashed by the burn and its sequelae. Therefore, the activation of sacred logic allows for the attribution of meaning to events and suffering that would be unbearable otherwise. The interpretative analysis was processed with the elaboration of central themes, built according to relevance and meanings the subjects attributed to quality of life, selfimage, burn experience and lifestyle before and after trauma. Based on the described results, five central themes were elaborated: work, normality, autonomy, family life and social integration, all of them interrelated. In the attribution of meanings to quality of life, among men and women, working capacity is highlighted. Therefore, they reveal the fundamental social representation in the urbanindustrial capitalist society, in which work is the norm for the definition of a healthy and normal condition, adapted to the human being. Normality, subordinated to working capacity, is then understood as an essential condition for social integration, considered important by the subjects and by society as a whole. Normality, defined in relation to an external measurement towards the object it is applied to and considered desirable in a determined historical society, is always somewhat attributed to a preestablished norm, not as a universal, natural attribute; it is also a dynamic and controversial concept. The norm refers to the universe of values, implying preference for an order of values, among many possible ones, and rejection of the inverse order (understood as a disorder, domain of a manifestation understood as pathologic). Normalization, considering the meaning of the Latin word norm, corresponds to imposing demands on the body, mind or lifestyle, which work at odds with these demands, as put by a given society. Normalizing consequently assumes the meanings of controlling and integrating a determined order(10). Sociological and anthropological studies highlight the fact that, in urbanindustrial capitalist societies, with their economic imperatives subordinate to the forprofit production of goods, one of the most relevant aspects, understood as a healthy and normal condition of the human being, is working capacity. Built as a fundamental norm, a demand imposed on the body, mind and behavior, subordination of normality to work permeates common sense, understood as a cultural system, an interesting way to apprehend and build the world based on daytoday experiences(9). Since the economic dimension takes the role of an important focus of meaning production in modern urbanindustrial societies(11), there are many and constant impositions made on their members to perform incomegenerating activities. Any compromising of working capacity is seen as an anomaly and subject to rehabilitation, so that a socalled normal and healthy state, adapted to the performance of social roles, may be resumed. As such, those who cannot work are seen and see themselves as abnormal(12). Overall, the meanings attributed to the condition of normality/health fundamental in the definition of quality of life bring the subjects to their previous state regarding the burn, associated to working capacity, freedom of movement, keeping a sociallyacceptable appearance and health conditions suitable to social and family integration. The burn, conceived as a biographic rupture, comes out as a compromising element of the subjects' health, since it hampers their autonomy and normality. Such perception of loss of normality is related to changes in life after the burn, since living in conditions conceived as normal identifies with the continuity of work and leisure activities, with a healthy physical appearance, full social and family interactions and capacity to move freely. Lost normality, in the evaluation of the burn as a biographic rupture, represents the crushing of the individuals' selfesteem, freedom and autonomy, as well as whatever they consider to be a life wellintegrated to society. That becomes evident in the association of the burn and its movementlimiting sequelae, observed in married male participants, with damage to autonomy and the loss of the role of provider and of virility. Thus, they show the articulation of the meanings of normality with the performance of genderbased social roles. When working capacity is prioritized, overseeing normality and social integration, the subjects of the study generally reveal values of the modern urbanindustrial society in their worldview. This view, characteristic of modern times, is in turn mixed with traditional values, where personality, family and position in the family hierarchy emerge as relevant values. The same combination of elements, which ambiguously refers to traditional and modern symbolic ordinations, oversees the conception of work. For the urbanindustrial society, it is configured as a producer of economic value; for the study subjects, more than being associated to having a salary and acquiring goods, it is conceived as a moral value, which sustains the honor of the workerprovider of the household. Seen as a unit of income and consumption, the family constitutes the end to which work is directed, and at the same time the way individuals show themselves to society as full citizens. Besides work, modern society placed expectations on isolated individuals pushing them to the quest for success, happiness and personal achievement. On the one hand, these perspectives are linked to the capacity of acquiring material goods, measured by visible signs of status: in contemporary societies, we are above all consumers. On the other hand, personal success is subordinated to aesthetic standards, as shown by research on the topic(13). Among the research subjects, it can be observed that normality, connected to working capacity, is also restrained by physical appearance without evidence of rupture of the established standards. They reveal the emphasis placed on being looked at by others, to the critical evaluation of society, with wide repercussions in social integration and selfesteem. They show the correlation of quality of life and established aesthetic standards, which associate physical integrity and an ideal of beauty. As seen in literature, they corroborate it when stating that the burn affects many aspects of a person's life in the world today, and that the individual's appearance, as well as his/her functional capacity, makes reintegration to society difficult(14). The body is evaluated, in our society, by its external dimension, according to what is defined as corporal beauty, with the valuation of certain characteristics over others. As shown by studies on the symbolism of the body in our society, it is expected that people are seen as attractive to be successful, while those who stay too far from the standards of attractiveness are expected to be poor and with few opportunities of social ascension(13). The body, more than simply a means of relating with the world, is the individual's means of identification, a way of showing oneself that, when too far away from the aesthetic standards, this poses as an obstacle to social integration(12). Moreover, there is also a sort of "compensatory logic"(15) in the process of acceptance of physical changes caused by the burn, explained by the comparison with worse situations, the emphasis placed on the ability to endure pain and the elaboration of surviving the burn as a "victory". Such attributions of meaning show the idea of moral compensation, a characteristic of a hierarchical conception of the world. In this interpretation of the burn and its sequelae, these are not seen as signs of inferiority before "normal people" and receive a positive evaluation, becoming hallmarks of moral superiority. The hierarchical conception of the world highlighted in the activation of "compensatory logic" is similarly revealed when the research participants attribute the source of all their suffering to divine intervention, and bring meanings articulated in the orb of the sacred, which assures a place in the cosmic order to all facts. Social integration, an important focus of production of meanings of quality of life to which all the others converge as necessary conditions, is evidently related to working capacity, having (or regaining) autonomy, inserting oneself in family and in society in a satisfactory way, and to normality. The same importance of social integration is revealed in research on quality of life of Spanish people who suffered burns. The study shows that, even when the burn sequelae do not represent a significant impediment to work or personal care, it is seen as an important problem in social and affective relations and activities in general, and, overall, with regard to emotional aspects(16). Family life, social integration, work, normality and autonomy are guiding axes for the attribution of meaning to quality of life among the subjects under study. Seen as important foci for the attribution of meaning to the world order, they permit access to the structures of meaning where their behavior and conceptions are produced and interpreted. The worldview of the group under study is ambiguously articulated by two rationales modern and traditional where evaluations based on economic and pragmatic criteria are combined with others, built on feelings and moral values. This is the cultural context where the meanings of quality of life are built, which is relevant to understand the group and serving as a base for healthcare professionals to work. Mental suffering cannot be underestimated, nor can possible damage caused to selfimage and social integration, besides pains, physical discomfort and functional limitations brought about by the trauma. 1. Rosenberg R. Health related quality of life between naturalism and hermeneutic. Soc Sc Med 1995 November; 41(10):14115. [ Links ] 2. Munster A. Measurements of quality of life: then and now. Burns 1999; 25:258. [ Links ] 3. Rossi LA, Vila VSC, Zago MMF, Ferreira E. The stigma of burns: perceptions of burned patients' relatives when facing discharge from hospital. Burns 2005 February;31(1):3744. [ Links ] 4. Minayo MCS, Hartz ZMA, Buss PM. Qualidade de vida e saúde: Um debate necessário. Cien Saúde Coletiva 2000 abril; 5(1):718. [ Links ] 5. Koch T. Life quality vs 'quality of life': Assumptions underlying prospective quality of life instruments in health care planning. Soc Sci Med 2000 August; 51(3):41927. [ Links ] 6. Geertz C. The interpretation of cultures. New York (NY): Basic Books;1977. [ Links ] 7. Durham ER. A Dinâmica da Cultura: Ensaios de Antropologia. São Paulo (SP): Cosac Naify; 2004. [ Links ] 8. Costa MCS. Intersubjetividade e historicidade: Contribuições da moderna hermenêutica à pesquisa etnográfica. Rev Latinoam Enfermagem 2002 maiojunho; 10(3):37282. [ Links ] 9. Geertz C. O Saber Local. Novos ensaios em antropologia interpretativa. Petrópolis: Vozes; 1999. [ Links ] 10. Canguilhem G. O Normal e o patológico. Rio de Janeiro: Forense Universitária; 2002. [ Links ] 11. Sahlins M. Cultura e razão prática. Rio de Janeiro: Zahar; 1979. [ Links ] 12. Ferreira J. O Corpo Sígnico. In Alves PC, Minayo MCS, organizadores. Saúde e doença: Um olhar antropológico. Rio de Janeiro (RJ): Fiocruz; 1998. [ Links ] 13. Queiroz RS, organizador. O corpo do brasileiro: Estudos de estética e beleza. São Paulo (SP): SENAC; 2000. [ Links ] 14. Gilboa D. Longterm psychosocial adjustment after burn injury. Burns 2001 June; 27:33541. [ Links ] 15. Da Matta R. Conta de mentiroso: Sete ensaios de antropologia brasileira. Rio de Janeiro (RJ): Rocco; 1993. [ Links ] 16. SalvadorSanz JF, SanchezPaya J, RodriguezMarin J. Quality of life of the burn patient. Burns 1999 November; 25(7):5938. [ Links ] Recebido em: 17.1.2007 Aprovado em: 23.9.2007 1 Study funded by FAPESP and CNPq.
Answer: Not the patient. As covered in previous blogs, when navigating the medical system, bully/incompetent doctors are just one of the many hurdles you face. Other huge hurdles that we patients face include those administrators whose job, it seems, is to make life difficult for us. As if dealing with illness and life-threatening conditions weren't enough. I am beginning this posting with a caveat: most of the medical staff I've encountered have been helpful and kind. Most of the time, my doctor visits have been made more pleasant and relaxing -- all because of the administrative staff -- such as receptionists, medical assistants, records people -- who do have a difficult job and often have to deal with rude patients. However, it's more fun for readers if I trash the administrators who have overstepped their bounds. And more than anything, I'm hoping that this posting can help you stand up to rude administrators who seem bent on placing hurdles in your way or being rude and inappropriate during your visit to the office. I speak from experience and will discuss two memorable altercations I had with administrative bullies. Ironically, I'm grateful for these experiences because they taught me the incredible power patients have. Show Me the Money When dealing with a potential or existing medical problem, the last thing you need to hear is a medical staff member discussing money matters with you. This type of insensitivity to your needs is unacceptable. In my case, I was in my surgeon's waiting room only a few days after being told that an MRI revealed something suspicious, and I was scared -- like crap in your pants scared -- that it was a recurrence. Fresh in my memory was my great friend dying of breast cancer only a few months before, and I was deep in thought, wondering if I would share the same fate. My surgeon was going to examine me and schedule a biopsy. The receptionist interrupted my panic-stricken what-if scenarios by calling me up to her desk. Imagine my disbelief when she looked in my tear-reddened eyes and informed me that I owed some money and would I like to pay it now or later. She started talking in a not-so-low voice about the amount I owed. In shock, I stammered something about being billed later. I couldn't psychologically deal with one more stressor. I sat back down, crushed. I was embarrassed, wondering if others in the waiting room overheard this conversation. The tears of humiliation stung my sleep-deprived eyes. Then my fighting spirit took over. I wanted my dignity and self-respect back. I walked back to the receptionist and told her in a not-so-low voice, "You know, I am grappling with a possible breast cancer recurrence, and I can't believe you have the audacity to discuss my bill at a time like this!" Before she could stop stammering, I added, "You and anyone in your office are never, ever to discuss anything bill-related with me in this office." Now it was she who was crushed. I turned around abruptly and got back to thinking my fate. She and the rest of the administrative staff treated me like gold that day. One would think I was a celebutant. And I felt empowered, even though I was bracing for terrible news. The Dreaded Record Keeper In my posting A Train Car Named Quagmire, I discuss how I fought to get records transferred from one physician's office to another. Records departments simply amaze me. They are able to provide services and obtain records lickety-split when a doctor requests them, but not when a patient does. In my case, the enemy was the center where I had follow-up mammograms and any pre-surgery labwork. Interestingly, whichever individual happened to be at the front desk was always rude and cold to me. I found it intimidating and passively tolerated their mistreatment and utter disrespect. Luckily, the technicians were nice, but the technicians unfortunately had nothing to do with ensuring records were delivered when they were supposed to be delivered. My mammogram films and report were supposed to be ready for me to pick up before I saw my doctor who always wanted to see them during my visit (I did call the records department ahead of time and followed all the protocols). Yet, about 50% of the time they weren't ready, and I had to go to the doctor sans mammogram, which arrived a few days later. And for someone who has been through a cancer experience, waiting a few days is like waiting an eternity. I called the center to complain about the mishandling of these mammograms and, after speaking to several impolite personnel, I finally got a friendly staff member. I told her that since I already had breast cancer and very dense breast tissue, my mammograms needed careful inspection by my surgeon on time and that such mishaps could one day cost me my life. She said, "Aw, honey, you're not likely to get breast cancer again." I volleyed back: "How do you know that? You can't tell a patient that! It is vital that your office ensures prompt and accurate delivery of my mammogram films and results." (Turns out that years later after my preventive mastectomy and reconstruction, the labwork indicated I had oodles of precancerous cells and would've had a recurrence in a few years.) I asserted myself to my surgeon -- I politely insisted that, with my history of breast cancer, it wasn't prudent for me to to get follow-up mammograms at an unreliable place and from now on, I wanted my mammograms done at the hospital's far superior breast center. The stakes were too high, I explained, to allow this center to determine my medical fate. He agreed, and I never had such problems again. Victory! Fast-forward a few years later. I needed to go to this center for pre-surgery bloodwork. I was getting my preventive double mastectomy with reconstruction, so it was a stressful time for me. My doctor sent the center an electronic referral so I wouldn't need a hard copy. So I showed up a week before surgery, as directed, without a hard copy referral. By now I was prepared for the staff's lack of respect, and I was determined to not tolerate abuse. Sure enough, the receptionist rudely insisted I needed a hard copy referral -- even though she had printed out the electronic version! She rudely directed me to an intake person at another desk, who coldly said the center couldn't do labwork without a hard copy referral. I told her that I was having major surgery in a week and needed the labwork ASAP. She responded that the center would do the labwork, but only if I signed a form agreeing to pay for the procedure should my insurance not cover it because the referral was electronic. (No, it doesn't make sense to me either.) She shoved the form toward me, and that's where my civil disobedience kicked in. I told her, "You know, every time I come to this office, I am treated rudely and with disrespect. I demand respect. I am having major surgery next week, and I followed the correct protocol. So I refuse to sign it." Her eyes widened in shock, and then she scribbled something on the form. I asked her what she was writing, and she said "Patient refuses to sign form." Pleased with my self-advocacy, I said, "Good!" I got my bloodwork that day and didn't pay a cent. When I relayed this interaction to my friends, they said they never knew they could refuse to sign such a form. Well, now they -- and you -- know. While we want to be civil and treat medical staff with respect, when we find ourselves bullied by them, we don't have to passively comply. Your voice needs to be heard, and you simply cannot tolerate disrespect from administrators. Beth L. Gainer is a professional writer and has published an essay on her breast cancer experience in the anthology Voices of Breast Cancer by LaChance Publishing. She teaches writing and literature at Robert Morris University Illinois in the Chicago area. She can be contacted at email@example.com and firstname.lastname@example.org
I’M VERY DEAF BUT I HEAR Everything (Mar, 1950) Yes, and I’m very blind, but I can see everything. I’M VERY DEAF BUT I HEAR Everything with My New Zenith “MINIATURE” HEARING AID Don’t let deafness kill the joys of living. Let a Zenith home trial prove you, too, can even hear a whisper. Here’s Zenith’s amazing guarantee—if any $200.00 hearing aid outperforms Zenith’s newest, tiny, 6.75 oz. single-unit “Miniature” Ra-dionic Hearing Aid in efficiency or economy, your money back—under our 10-Day Return Privilege. Only $75.00 complete, ready to wear. For authorized Zenith Hearing Aid Dealer in your locality, consult your classified telephone book; or write us for complete coast-to-coast dealer list. Free descriptive literature on request. Address— Zenith Radio Corporation, Hearing Aid Division Dept. 391, 5801 W. Dickens Ave., Chicago 39, III. Makers of World Famous Zenith Radio, FM and Television Sets
New to Typophile? Accounts are free, and easy to set up. Create an account Typophile RSS | More Feeds i have always a problem choosing typefaces that work well together. this is sad. any recommendations on how to go about doing this? vauge question of sorts, but anything would help. thanks! One way to get around racking your brain is by picking typefaces from the same designer can help. Its the easiest way for me. Also from the same period/style/source can help but that's not a guarantee. For example Mantinia and Galliard go very well... by the same author. Or Univers with Egyptienne F by Adrian Fruitger, or Gill Sans and Joanna by Eric Gill, etc.. A lot of designers build their letterforms upon the same skeletal structure, even if not on purpose. So I'd say that is a good direction to start for sure. Even Bringhurst recommends that approach. Here is another way... find printed literature- magazines, books, manuals, etc. and see how others combine different type. I keep a note pad at all times with me when I'm out and about. Soaking yourself into issues of How, STEP & Print will have raring to go. The Font Shop virtual newletters combine type nicely too. browse all the past months with the pull down menu at the right Mike Diaz :-) Looking at the structure of the typefaces is another (related) method of choosing typefaces. For instance, Bodoni is very geometric and has a very vertical stress that matches well with the grotesques and neo-grotesques like Helvetica. But neither of them match something like Galliard because of it's diagonal stress and humanist shape. That's one reason to look at the period in which a typeface was designed, because the era greatly influenced the methods and/or structures on which the letters were built. The best advice, in my opinion, it that of SUF, which is to say, find examples you like. Take them apart and see how they work. For instance, if you think Frutiger is a perfect marriage for Caslon, then you know you can always invite them together to the party. But try to understand for yourself WHY you think they belong together, and you can apply this to other faces. I would avoid any advice that says,"This face and that must never be used together," or "These two faces are perfect together," or even "Just combine faces by that designer." Designing with type has to be a reflection of your own tastes, not prescribed rules. Sure, but that taste has to come from somewhere. Rules can help quite a bit and as long as you can step outside of those rules I don't think there is much harm in them. I agree to avoid the advice that says never do this or always do that... This question often arises and I hope I don't sound like a robot as my answer is always the same: don't worry so match about compatible typefaces. Nearly any two types can work together. Pick typefaces that fit your subject and audience. If they are right for the project, they are right for each other. An exception: when using two distinct typefaces within a single line or paragraph, try to match general proportions (asc/descender length and x-height). Or, pick a font suite. thanks for the great responses! the reason i ask is that i was working on a project- a dialoge book, with 4 simultaneous conversations going on. in some conversations, the opinions contrast so i was thinking of working with the type in that sense but didn't know if the fact that they are completely different to begin with was enough of a difference. If you're creating the impression of simultaneous conversations, then I would suggest choosing faces that represent, at least in your own mind, the different characters of the quadralogue. kostal: certainly. I wasn't saying that no training or understanding of type is necessary. I guess I was suggesting to get the training and the understanding and then let your own vision be the guide. So often, "Never" and "Always" guides are offered as help, when I think that kind of view can be detrimental to good design. I'll add my voice to those who recommend considering the structure of the font, as Robert Bringhurst advocates in The Elements of Typographic Style. Consideration of the structure involves looking at such characteristics as: art/design movement (renaissance humanist and neohumanist/lyrical modernist forms [Venetian, Garalde, etc.], baroque/rococo form, neoclassical/"transitional" form, romantic/"modern" form, realist form [Victorian, clarendon & Swiss gothic forms], geometric modernist form [such as Futura, Memphis and the like], various postmodernist forms, etc.) aperture (degree of openness or closedness of forms such as "c", "e", "a", "s", etc.) direction of axis (humanist [oblique], rationalist [vertical] or variable), Other characteristics less relevant to structure, but still worth considering when choosing compatible fonts, include: stroke (modulated or monolinear), terminal shape (pen-formed, modeled, lachrymal [teardrop-shaped], round [ball-shaped] A great place to start in choosing compatible typefaces is to choose serifed and sans-serifed fonts with basic structural characteristics in common, such as: Geometric modernist fonts: Beton, Candida, Marathon, Memphis, Rockwell or Stymie, etc. or romantic/"modern" fonts: Bodoni, Bulmer, Didot or Walbaum, etc. paired with: Avenir, Futura, or Kabel, etc. Or, Realist-structured fonts: Belizio, Clarendon, Glypha, Serifa, Volta, etc. paired with: Akzidenz-Grotesk, Folio, Helvetica, Imago, Univers, etc. Or, Renaissance-based humanist and neohumanist fonts: Albertina, Aldus, Bembo, Berling, PMN Caecilia, Chaparral, Dante, Garamond, Golden Cockerel, Joanna, Minion, Palatino, Plantin, Poppl-Pontifex, Scala, or many others, paired with: Frutiger, Gill Sans, Myriad, Linotype Projekt, Scala Sans, Syntax, etc. As has been said already, these cannot be hard-and-fast rules. Even within similar structures, some pairings will work better than others, so use your own creative and critical judgement. However, once you have a good grasp of similarly-structured font pairings, you will be better-equipped to try your hand at effectively pairing fonts with contrasting structures. A few "rules" of things not to do. a) don't choose faces that are "too similar" like Helvetica and Univers, for instance. b) don't choose faces that are "too different" like a very fine body text (sans) with a super heavy fatface heading -- basically, you don't want the fonts to fight each other. Different slants on the italics can also do this, if there will be a lot of italics happening. c) Don't mix your focus ... using a grunge heading with a formal script body, for instance. (Unless this is the statement you are trying to make) Set your samples with the options you like ... then put them away for 48 hours. Come back to them and the bad ones will probably stand out and say "Ick". Advertisement vs. book typography What can work in one field does not automatically work in another. Some types which don't seem to work together at similar sizes may work fine when one is much larger than the other. Just remembered: Jonathan Hoefler wrote a pretty good article on this in CA. Forgot which issue. "Some types which don’t seem to work together at similar sizes may work fine when one is much larger than the other." Yes. Often, you will be able to nudge one font up or down several points in size to compensate for different apparent sizes or x-heights/body sizes. You can also find surprising compatibilities between otherwise dissimilar types. For example, Joanna (a neohumanist slab-serifed font) looks beautiful when set with Fournier Italic (a neoclassical/transitional font). And the expressionist Post Mediaeval Italic makes a nice companion for Marathon, a more geometrically structured expressionist roman. And Centaur Roman (or Jenson) works beautifully with the blackletter San Marco used as a contrasting type for emphasis. The pen script El Greco, with adjustments made for size, makes an interesting italic companion for Raleigh, and so forth. Experiment and try new and unexpected combinations, but do it as knowledgeably as you can for the best results. This topic recently came up with a colleague of mine who was trying to find a good supplementary face to work with Bembo. At the same time I was designing a new edition in a series, and the publisher had supplied me with a PDF of a previous edition in that series, which I thought was problematic. Here's what I responded with, which may be useful here: General typographic principle is that serifs don't mix well with other serifs. (For instance, my "problem" with the supplied PDF sample was the combination of Warnock [for body copy] and a clearly Modern type [used for display] -- mixing Renaissance and Romantic proportions = bad news). Such a combination is like mixing a contemporary rendition of classical Italian architecture with some Victorian gothic furniture. Some might call this "eclectic," but to my mind it's just a mess. Thus, in looking for a secondary face for a serif, my instinct (based on the typographic theory that I've read and absorbed) is to go for a sans face (which is what I normally do for supplementary copy [notes, etc.]). But, it can't just be any sans, of course. In my redesign of the series I've stuck with Warnock for the body copy, and selected Quadraat Sans as the second face, because both share similar proporations and also make use of some unconventional hooks and beaks. For instance, here's a comparison of a few glyphs from each where you can see the distinctive "hooks" in a few letters. (The fact that Quadraat will be used at a smaller size [for notes, etc.] will balance the fact that it is quite a bit darker than Warnock.) In [my colleague's] case, you're working with Bembo, another classic Renaissance font, yet one that has become somewhat faceless due to over use. That said, it does have some distinctive shapes to it, and is based on classical proportions, so what you want is a sans that has the same. For my money, if I want to find a partner for something like Bembo (or Garamond or Jenson, etc.) I head straight to Legacy Sans. Here's a glance at Bembo & Legacy: Note some if their similarities, such as a connector of the "g," the bracketed crossbar and curled tail of "t," the understated "J" and "Q". These are just a few glyphs scrutinized, but from here you can see that the two have enough in common to likely work well together. Now, you may not be a fan of Legacy, but this sort of process tends to help for me. I just make a sample (like above) and plunk in a few possibilities to go with my body type, then look to see if they have anything in common both in terms of proportions and quirks. Nice mixes, made nicer still since we can know and see WHY they were chosen, and WHY they work so well together. It wasn't an arbitrary process, or a case of, "Ah -- these look okay together." That's what non-designers do. I often look at sans and serif faces from the same designer - there's usually some sort of unconscious similarity in the letterforms between two faces. Picking agreeable typefaces isn't all that different from choosing wines -- there are some basic rules ("red with beef, white with everything else" and "pick a simpler meal with a complex wine, and vice versa") and the experience to know when you should just pick what you like and tinker a little with each. ;-) I'm with Linda (and others). It is nice to sit down and find similarities in fonts and match them in that way. The sample above is good and those faces do work together. But, if you stick to such a strict way of doing it you will miss out on so many others pairings. A lot of it is experience, as Linda mentions. Until you actually work with the fonts, and play with them, you won't find your own sense of style. Another good technique, if you want to get your eyes dirty, is to pair typefaces side by side using: (Trade Gothic with Filosofia and Gotham with Didot) You can get a good sense for how letters look side by side and how the x-heights, widths, etc. match up. Wow! nice suggestions here! Recently I have been designing a website for a silkscreen studio in Milan and I wanted to merge the two spirits of the city: the slick, commercial fashion-oriented one and the traditional old spirit of Milanesi craftmanship. So I came up with a choice of these two fonts: Maybe for some will be a punch in the eye, but I found the coupling quite agreeable. SCHOOL PROJECT SELL ATYPEFACE AND TELL THE BLA BLA BLA ABOUT IT THE ONLY THING i CAN'T GET ANSWERED FOR MY DESIGN PROJECT IS WHAT OTHER TYPEFACES OR FONTS IT WORKS WITH EXAMPLE IS IT GOOD WITH TAHOMA OR ARIEL i WANTED TO USE ADOBE PRO GARAMOND PUT i CANT FIND WHAT WORKS WITH IT . oh caps sorry= and by the way i can't find the page it was on dut some one wanted the adobe pro garamond for free and you guys jumped on him ! I got it for free on a frre fonts site. Two shool students only want them so they can fininsh projects and are not making a profit and thrree My teacher gave us a project with the optio n of only six type familiys which he had to assume we as non profesionals would have on our computers -I had only two of them and one of them I got from the free down load so i would of been stuck with one font choice which i think i used any ways arieal was boring font. I had helvetica on my computer at my old job I do not know how it got on ther but it is not on my home computer nor optima, and many other that many seem to have and i don't have a bunch of money to buy bunch of fonts . its not stealing when you are not making money of it or are you going to tell me you never lent a book to a friend or gave it to them when you were done or a music cd so they could listen to it or how about a food reciepe that you liked and gave some one -did you make that person go out and by the book or did you write down the recipe. I hope whoever was asking for that font sees this so he knows he has someone on his side the professionals that are making big bucks should willing pay for non free fonts because they can afford it and are using profesional sets. but let us minors learn some stuff withuot giong broke trying to go to school and are laid off and can barely feed ourselfs. get of your fracking high horses. I bet you guys down loaded (which I did not) all that free music when you could before they changed the law Oh but thatwas just file sharing.. How about we send Adobe your info and tell them you ripped of one their fonts: Rene's post reminds me of this. (Shame I can't find the typical image that would go with it.) Ever since I chose to block pop-ups, my toaster's stopped working. Good rant, though. And the passion of the misspellings, but then oh caps sorry=, that sort of lets it down, ain't it? this is surely old news to the vets here but for those who need help: the font finder on linotype looks like a great resource and tool. i particularly liked the find fonts by inspiration, and the form finder seems like the perfect thing to help you (but obviously they're not going to be showing fonts from other foundries, and i wish you could narrow the search more by things for text, display, and exclude certain things, like italics) One feature of super-families that contain both sans and serif, quite apart from any stylistic matching, is that they will generally have matched vertical metrics--which means that if you insert, say, a couple of words of Bold Sans into a phrase of Regular Serif, there will be a nice alignment. Agree with Stephen Coles about not worrying about matching type, to a point. Experiment, yes, but really look at the results. Are they to your liking - or not? We get paid to have opinions. Paul you are right. If you look at that example with Belwe and Helvetica; you’ll those two are pretty ugly together (Well, Belwe is permanently ugly) There was a time when I would have called Belwe ugly too -- back when it was so overused as to make a designer cringe at the very sight of it. But now I see it as it is -- a very late Arts-&-Crafts-era (1926) type that was designed as a creative interpretation of Jenson, and revived in the 1970s when such styles were popular again. As such, it can be a useful choice for period work. It may not be fashionable right now, but I wouldn't call it ugly, any more than I would call other Arts & Crafts or Art Nouveau styles ugly. It's all in how they're used in a design. Believe it or not, young designers, there will come a time when many of today's stylish types will be derided by a new generation. :) Having said that, however, I wouldn't have thought of pairing Belwe with Helvetica. The two have some definite structural incompatibilities, although the x-heights and proportions work together better than I would have guessed. Instead of the Swiss neo-grotesque Helvetica, I might look to other Arts-&-Crafts-era grotesques, such as Monotype Grotesque, Venus, AG Old Face, or Akzidenz Grotesk. Or, since Belwe has a relatively open, somewhat geometric structure, look to other geometric sanserifs like Kabel or even Peter Bruhn's Mercury to pair with with Belwe (those stylized lower-case "g"s look like they were made for each other). Barmeno, Legacy Sans or other Jenson-derived sanserifs might be other options. I thought I'd pass this along: I created a set of combinations as a launching point from only in wide use, so that it would be helpful. I have a resource book about about 300 combinations coming out in 2010, as well as an iPhone app called "Font Combos". Visit the above link for more info on the book or the app. I hope it's helpful! Doug, your recommendations in "19 top fonts" are safe, easy and boring. The typefaces you recommend were almost all designed long ago, (none this century) and are published by corporations. I declare my bias: I am alive, design original typefaces, and own the foundry that publishes them. Get with the tour! Just out of curiosity; what about typefaces that are not the same, but have the same ancestors? - Sabon (Body) and Garamond Premiere Pro (Display/Headline) - Baskerville (Body) and Mrs. Eaves (Display/Headline)
12 April 2011 Geneva – The President of Human Rights Council today appointed three high-level experts as members of the Commission of Inquiry to investigate the allegations of serious abuses and violations of human rights committed in Côte d’Ivoire following the presidential elections of 28 November 2010, as mandated by the Human Rights Council. The Experts are Vitit Muntabhorn, Suliman Baldo, and Reine Alapini Gansou*. Mr. Muntabhorn will serve as Chair of the Commission. The Council resolved by consensus to dispatch the independent, international Commission of Inquiry at the end of its sixteenth regular session on 25 March 2011. The Commission’s mandate is “to investigate the facts and circumstances surrounding the allegations of serious abuses and violations of human rights committed in Côte d’Ivoire following the presidential election of 28 November 2010, in order to identify those responsible fur such acts and bring them to justice”. The same resolution requested the Office of the High Commissioner for Human Rights to provide the full administrative, technical and logistical support needed to enable the Commission to carry out its mandate. The Commission is due to present its findings to the Council at its next session in June. The President of the Human Rights Council, Ambassador Sihasak Phuangketkeow today expressed concern with the continuing violence in Côte D’Ivoire. “The appointment of the Commission underscores the gravity of the situation of alleged violations of human rights,” he said. Ambassador Phuangketkeow urged all parties concerned to extend full cooperation to the Commission of Inquiry in discharging its mandate. (*)The Members of the Commission of Inquiry are: Vitit Muntabhorn (Thailand) will serve as the Chair of the Commission. Mr. Muntabhorn is a professor of law at Chulalongkorn University in Bangkok. He currently also serves as member of the Committee of Experts on the Applications of Conventions and Recommendations of the International Labour Organization. He served as United Nations Special Rapporteur on the Situation of Human Rights in Democratic People’s Republic of Korea from 2004 to June 2010 and as the United Nations Special Rapporteur on the sale of children, child prostitution and child pornography from 1990 to 1994. In 2004 he was awarded the United Nations Educational, Scientific and Cultural Organization Prize for Human Rights Education in recognition of his outstanding contribution to education for human rights and diverse activities at national, regional and international levels in favour of promotion and protection of all human rights for all. Among the various position he has held over his longstanding career as a human rights defender are former Chairperson of the National Subcommittee on Child Rights of Thailand; Commissioner of the International Commission of Jurists; member of the Advisory Council of Jurists, Asia Pacific Forum of National Human Rights Institutions; Co-Chairperson, Civil Society Working Group for an ASEAN Human Rights Body; Representative of Thailand to the High Level Panel on the establishment of the ASEAN Human Rights Commission; and member of the Advisory Group of Eminent Persons, United Nations Refugee Agency. Suliman Baldo (Sudan) is a widely recognized expert on conflict resolution, emergency relief, development, and human rights in Africa. Mr. Baldo holds a Ph.D. in Comparative Literature (1982) and an M.A. in Modern literature (1976), both from the University of Dijon in France. He also holds a B.A. from the University of Khartoum, in the Sudan. He has worked extensively in the Democratic Republic of the Congo, Ethiopia, Eritrea, and the Sudan, and travelled widely throughout the rest of the African continent. In the 1980s and early 1990s, he worked as a lecturer at the University of Khartoum; a Field Director for Oxfam America, covering Sudan and the Horn of Africa; and, later, as the founder and director of Al-Fanar Center for Development Services in Khartoum, Sudan. He also spent seven years at Human Rights Watch as a senior researcher in the Africa division. Most recently, he served as the director of the Africa programme at the International Crisis Group. He now works as the Director for the Africa Programme at the International Center for Transitional Justice. Reine Alapini Gansou (Benin) is a lawyer and the Chairperson of the African Commission on Human and Peoples' Rights since 2009. As a member of the African Commission since 2005, she served as the Special Rapporteur on the Rights of Human Rights Defenders from 2005 to 2009. She has been a professor of Criminal Law and Criminal Procedural Law at the University of Abomey-Calavi and Parakou since 2004, as well as a Barrister-at-Law since 1986. Ms. Alapini-Gansou has extensive experience in the field of human rights. Prior to joining the African Commission on Human and Peoples' Rights, she worked with several human rights non-governmental organizations and, in this context, organized several regional and national human rights workshops. Learn more about the Human Rights Council: http://www2.ohchr.org/english/bodies/hrcouncil/ For more information and media inquiries, please contact Cedric Sapey, Public Information Officer: (+41 (0) 22.917.73.84 or +41 (0) 79.477.44.11 or firstname.lastname@example.org) For use of the information media; not an official record
Sustainable use of biodiversity - a phylogenetic perspective Sustainable use of biodiversity requires integrated conservation of both currently-useful species and broader phylogenetic diversity in press, unedited accepted version of Faith D. P. and Pollack LJ (2013) Phylogenetic diversity and the sustainable use of biodiversity. In: Applied ecology and human dimensions in biological conservation (ed. MC Lyra-Jorge and LM Verdade) Springer, 3. Phylogenetic diversity and the sustainable use of biodiversity Daniel P. Faith The Australian Museum Sydney, 2010, Australia author for correspondence Laura Jo Pollock National Environmental Research Program School of Botany The University of Melbourne Victoria 3010, Australia Sustainable use of biodiversity requires the use of biodiversity in a way that does not foreclose benefits for future generations. Biodiversity option values reflect this capacity to provide future benefits that are often unanticipated. The phylogenetic diversity measure, PD, quantifies the option values represented by different sets of species. PD can be interpreted as counting-up features of species. This allows species-level ecological indices to be converted to phylogenetic indices, including PD-complementarity and PD-endemism, and integrated into systematic conservation planning. PD’s power-law relationship with species counts supports findings that initial species losses may retain high PD. This suggests that occasional loss of current-use species might not reduce overall PD. However, if species that are currently useful to society are concentrated in particular clades on the phylogeny, then their loss may imply high PD loss. Conservation of current-use species can maintain overall PD and option values. However, systematic conservation planning results suggest that conservation of phylogenetically clumped current-use species, within a given conservation budget, can produce a tipping point in which the capacity to retain high PD collapses. In this chapter, we will link one of the most fundamental aspects of biodiversity - the tree of life or phylogeny - to one of the most practical concerns of biodiversity conservation – the sustainable use of biodiversity. This topic contributes another perspective to our book’s overall theme on new directions for integrating applied ecology, human dimensions, and biological conservation. A precursor for this book was the 2009 Biota-FAPESP international workshop on “Applied ecology and human dimensions in biological conservation” (http://www.fapesp.br/5434). The workshop highlighted various new strategies in applied ecology, associated with emerging stronger links to human dimensions and to historical perspectives. We will touch on these themes in exploring how phylogeny helps us to understand and achieve sustainable use of biodiversity. It is timely to consider the challenges of sustainable use of biodiversity. During 2012, the United Nations Conference on Sustainable Development (UNCSD or “Rio+20”) was held in Brazil, marking 20 years since the original conference that gave birth to the Convention on Biological Diversity. The major outcome document from the UNCSD conference refers frequently to “sustainable use of biodiversity” (UNCSD 2012). However, nearly all the references are part of a general call for “the conservation and sustainable use of biodiversity”. This invites some fresh consideration about how conservation and sustainability goals are linked. Article 2 of the Convention on Biological Diversity (CBD; http://www.cbd.int/convention/articles/?a=cbd-02) defines “sustainable use of biodiversity” as: “the use of biological diversity in a way and at a rate that does not lead to the long-term decline of biological diversity, thereby maintaining its potential to meet the needs and aspirations of present and future generations”. Thus, sustainable use of biodiversity presents the challenge of providing uses to satisfy current needs while maintaining the capacity to anticipate and satisfy the needs of future generations, through other uses. The idea that sustainable use of biodiversity requires consideration of possible future needs of society echoes the earliest justifications for biodiversity conservation, based on the idea of future prospective human uses. For example, the World Conservation Strategy (IUCN 1980) called for conservation of diversity “for present and future use”. McNeely (1988) referred to biodiversity conservation as providing a “safety net of diversity” based on its “option values” (see also Reid and Miller 1989). Option values of biodiversity are the biodiversity values that provide benefits and uses, often unanticipated, for future generations. This link means that measures of biodiversity - under the standard definition of living variation across genes, species, and ecosystems - can be interpreted as measures of option values (for review and discussion, see Faith 2012a,b; Faith 2013). Preservation of these biodiversity option values arguably is central to any real sustainable use program. However, option values sometimes are under-appreciated in current debates about biodiversity conservation (Faith 2013). When human benefits are discussed, the term “ecosystem services” typically is used as a catch-all to cover any benefits from ecosystems that range from pristine to heavily human-modified. While ecosystem services consequently might include anything and everything, actual ecosystem services case studies typically have emphasized well-known human uses and benefits, rather than possible future uses that are currently unknown (for discussion, see Faith et al. 2010). The focus on current essential ecosystem services also is apparent in the new Strategic Plan and 2020 Aichi targets of the Convention on Biological Diversity (www.cbd.int/doc/strategic-plan/2011-2020/Aichi-Targets-EN.pdf). These new targets provide a mixed message about the importance of benefits from biodiversity for future generations. The Mission of the Strategic Plan is “to take effective and urgent action to halt the loss of biodiversity in order to ensure that by 2020 ecosystems are resilient and continue to provide essential services.” A related Aichi target calls for maintenance of ecosystems that provide ‘essential” services. This phrasing may encourage conservation actions that focus on continued supply of those services known to be essential now, rather than worrying about future services and uses that are presently unknown and unanticipated. This same issue extends to other Aichi targets. For example, another target refers to preservation of genetic diversity, but the stated focus is on known crop species and their close relatives. Recent characterizations of “biodiversity” reflect this popular focus on current uses. “Biodiversity” is interpreted primarily as a foundation for current uses, and biodiversity conservation sometimes seen as accomplished by ecosystem services conservation. For example, Perrings et al. (2010) suggested that ”what and how much biodiversity should be targeted for conservation depends on what services are important” (for discussion, see Faith 2011). When “important” services define the biodiversity of interest in this way, the adopted definitions and measures of biodiversity may simply re-express services in terms of their ecological basis (such as abundance and species' interactions). Traditional definitions of biodiversity recently have been expanded to include many of these aspects of species-level ecology (for discussion, see Faith 2011; 2013). For example, one ecosystem services study (Díaz et al. 2009) considered biodiversity as "the number, abundance, composition, spatial distribution, and interactions of genotypes, populations, species, functional types and traits, and landscape units in a given system". These ecological aspects may be important to the analysis of current ecosystem services, but may not help quantify option values. Consideration of biodiversity option values sometimes is seen as less practical than strategies that link the biodiversity of interest to the ecology of ecosystem services. For example, Mace et al. (2010) argued that ‘to maintain biodiversity so as not to foreclose the options open to future generations . . .would entail a goal of no overall loss of biodiversity. . . we suggest this is unlikely to be achievable’. Others have neglected biodiversity option values, even when they do acknowledge biodiversity as something distinct from ecosystem services. In such cases, biodiversity may be characterized as primarily all about intrinsic (non-anthropocentric) values, with the human uses largely captured by the ecosystem services (for discussion, see Faith 2012a,b). In contrast, the UNCSD outcome document (UNCSD 2012), did state the importance of biodiversity values extending beyond intrinsic values: “We reaffirm the intrinsic value of biological diversity, as well as the ecological, genetic, social, economic, scientific, educational, cultural, recreational and aesthetic values of biological diversity and its critical role in maintaining ecosystems that provide essential services…” However, one limitation of this affirmation is that it did not explicitly highlight potential future uses or option values of biodiversity. Some of these differences in perspective may be matters of definition (see Redford and Richter 1999). The Millennium Ecosystem Assessment (MA) (2005) has provided helpful guidelines, by distinguishing between ecosystem services and biodiversity, and by highlighting the option values of biodiversity. The MA noted that “a general lesson is that poor measurement of biodiversity reduces the capacity to discover and implement good trade-offs and synergies between biodiversity and ecosystem services. The MA also concluded that “sometimes responses to this information problem may…neglect the difficult problem of finding surrogates for global option values”. Progress on this surrogates problem would help establish clear links between option values and sustainable use of biodiversity, and would complement both the current-uses and the intrinsic-values perspectives on biodiversity. We suggest that solutions to the “difficult” problem of finding surrogates for biodiversity option values depend on effective quantification of living variation. Such measures should include the variation among species in characters or features, because these are elements of biodiversity that might correspond to future uses and benefits (Faith 1992a; 2013). Here, we consider phylogeny, or the tree of life, as a basis for making inferences about biodiversity at this level of features of species. Our premise is that greater phylogenetic diversity, or feature diversity, implies greater option values – a greater number of potential future uses and benefits. Thus, phylogeny has particular relevance to sustainable use of biodiversity. We consider a specific phylogenetic diversity measure PD (Faith 1992a, b) as our measure of feature diversity and option values. The PD measure not only allows us to talk about future uses but also can integrate information about current uses. Conservation of species that are currently used provides some level of conservation of the phylogenetic diversity and option values of the corresponding taxonomic group (e.g., legumes; see below). Therefore, the conservation of currently used species partially satisfies the requirements for sustainable use of biodiversity. However, a theme of this chapter is that there are advantages in integrating or balancing the conservation investments in known current-use species with conservation of broader phylogenetic diversity. We suggest that overemphasizing species that are currently valuable could reduce our capacity to preserve these broader option values – potential future uses - represented by the phylogenetic diversity within a given taxonomic group. Our chapter is structured as follows. First, we review the phylogenetic diversity measure (PD) and the links from phylogenetic diversity to option values. Here, we highlight the need to look at gains and losses of features and PD, not just overall PD values. We show how we can replace many standard indices of species-level ecology with phylogenetic indices that count up features, not species. Second, we describe how PD calculations are relevant to the problem of conservation and sustainable use of biodiversity. Here, we describe the fundamental relationship between PD and number of species, and how this relationship changes depending on the pattern of species gains and losses across the phylogeny (i.e. phylogenetically dispersed or clumped). Third, we describe conservation planning and decision-making that integrates PD, current uses, and additional factors such as costs of conservation. We examine conservation planning scenarios using this framework. We explore the contribution of conservation of current-use species to conservation of PD, and conclude that conservation of currently used species should be complemented by direct PD conservation. We finish by returning to the general call for “the conservation and sustainable use of biodiversity” by describing how these two goals should be inter-linked through conservation planning. 3.2 PD, feature diversity, and a calculus of option values 3.2.1 Evosystem services and PD One limitation of the ecosystem services framework is that it is very place-based in focusing on processes within ecosystems as the basis for human benefits. A complementary perspective can focus more on evolutionary processes (Faith et al. 2010; Hendry et al. 2010). Evolutionary processes, as reflected in the tree of life, generate benefits provided by characteristics or features of species. These current and future benefits for humans have been referred to as evolutionary or “evosystem services” (see Faith et al. 2010). The phylogenetic diversity measure, “PD” (Faith 1992a, b), helps us to quantify these current and potential future benefits derived from the tree of life. The PD of a given set of species is defined as the minimum total length of all the phylogenetic branches required to connect all those species on the tree (Fig 1a). PD provides a natural way to talk about future uses and benefits provided by species because the counting-up of branch lengths links sets of species to their expected relative diversity of characters or features. PD is based on a standard model of evolutionary process that implies that shared ancestry should account for shared features (Faith 1992b). Therefore, any subset of species that has greater phylogenetic diversity, PD, will represent greater feature diversity. Because larger PD values are expected to correspond to greater feature diversity, PD values indicate option values at the level of features of species (Faith 1992a, b). Interpretation of PD as counting-up features for different sets of species means that we also can interpret various calculations based on PD as if they are counting-up features. A family of PD measures extends conventional species-level measures and indices to the features level (Faith and Baker 2006; Faith 2008a; Nipperess et al. 2010). For example, PD-dissimilarities among localities are calculated using phylogenetic tree branches, producing measures analogous to standard Bray-Curtis and other species-level dissimilarities. Because PD implicitly counts features among sets of species, it provides straight-forward measures of complementarity (i.e. number of additional features gained or lost) and endemism (i.e. number of features unique to a species or to an area). Complementarity and endemism values can be calculated for species or for areas. Priority setting for conservation then may focus, for example, on the PD loss if a threatened species is pruned by extinction from the phylogenetic tree (Faith 1992a, 1994). The magnitude of the PD loss from loss of any one species naturally depends on the fate of its close relatives. The loss could be large if the species were the only remaining survivor in a highly distinctive group (on the basis of PD complementarity; Fig 1b). Examples of PD-complementarity calculations are found in Forest et al. (2007) and Faith and Baker (2006). Faith (1994) provides examples of PD-endemism, including PD-endemism of amphipods for northwest Tasmania (see also Faith et al. 2004). The PD measure is now recognised as a basis for setting conservation priorities among species or areas (Faith 1992a; Forest et al. 2007; Mace et al. 2003). Bordewich and Semple (2012) state that “phylogenetic diversity (PD) has emerged as a leading measure in quantifying the biodiversity of a collection of species.” Davies and Buckley (2011) conclude that “The loss of PD, quantified in millions of years, provides a resonant symbol of the current biodiversity crisis”. While priorities properly focus on PD gains and losses, it is sometimes assumed that the total PD of a locality is the basis for priority setting (e.g., Isambert et al. 2011). In fact, PD complementarity and endemism are critical to such planning (Faith 1992a; Faith et al. 2004). For example, PD-complementarity is now recognised as useful for conservation planning based on molecular trees from DNA barcoding (Faith and Baker 2006). Krishnamurthy and Francis (2012) review the use of PD and DNA barcoding in conservation. In this context, Smith and Fisher (2009) document how PD calculations are important in providing robust estimates of complementarity values. We return to PD and conservation planning below. 3.2.2 Phylogenetic patterns of current uses Some applications of PD have explicitly referred to feature diversity and option values. Examples include applications to bioprospecting, where greater PD indicates greater potential for novel discoveries (Pacharawongsakda et al. 2009; see also Saslis-Lagoudakis et al. 2011). Similarly, a study of bioprospecting of piscine venoms (Smith and Wheeler 2006) stressed the utility of phylogeny in providing predictions about unknown characteristics of species (see also Tulp and Bohlin 2002). However, the actual success of phylogeny, and the PD measure, in capturing future uses has had little investigation. Forest et al. (2007) have provided some evidence for the utility of PD as for quantifying estimated feature diversity and option values. They examined the distribution of angiosperms plants with known human uses (classified as medicinal, food, and all other uses) on an estimated phylogenetic tree for nearly 900 genera found in the Cape hotspot of S. Africa. Their information source, the Survey of Economic Plants for Arid and Semi-Arid Lands (SEPASAL), reports on the uses of tropical and subtropical wild and semi-domesticated plants. Forest et al. (2007) labeled a given genus as ‘useful’ if it had at least one species found in the Cape and recorded in this database. Forest et al. (2007) first asked how each use-type was distributed phylogenetically. They found that that each use-type was clumped on the tree: common ancestry often could account for taxa with the same use. This pattern suggests that phylogeny may help predict useful species, at least within any one use-type. This result corresponds to other findings. For example, Saslis-Lagoudakis et al. (2011) have found similar phylogenetic clumping for some use categories in legumes. However, Forest et al. (2007) also found that preserving species of one use-type did not do a good job of protecting species of another use-type. They found that knowledge of which plants were useful in one category would not be a good predictor of which plants were useful under another category. This suggests that protecting species with known uses generally would not be an adequate way to protect species with yet-to-be discovered uses. Forest et al. (2007) also determined that PD was the best general predictor over different use-types. Their conclusion was that current uses would not predict taxa with future uses, but that conservation of PD may effectively preserve options for the future. These phylogenetic predictions about current and future uses highlight the role of phylogeny in capturing option values. To the extent that we are focusing on one use-type, good guesses might be made about which other species provide that use-type, based on any phylogenetic clumping of that use. Predicting which species might generally be “useful” in any of a variety of ways, is more difficult. We agree with the conclusions of Beattie et al. (2011) that “the benefits of bioprospecting have emerged from such a wide range of organisms and environments worldwide that it is not possible to predict what species or habitats will be critical to society, or industry, in the future.” As illustrated in the Forest et al. (2007) study, over a wide range of uses, it is not possible to predict which species will be useful. On the other hand, it is possible to increase our chances that a future useful species will still exist – we can do that by maximising conservation of phylogenetic diversity. Thus, we shift the goals of prediction away from specific instances to predictions about the relative amount of option value retained by different subsets of persisting species. If conservation of PD is desirable as a way to preserve option values, then to some extent this could be achieved by retaining lots of species. In the next section, we discuss the fundamental curve linking species number to PD. We also explain why in decision-making we are interested in departures from this general curve, and how this is facilitated by integrating PD into conservation planning. 3.3 Departures from a basic PD - species relationship 3.3.1 Phylogenetically clumped or dispersed species losses The PD of a set of species will generally increase as more species are added to the set, and it is sometimes argued that conservation priorities based on maximising species richness will also ensure conservation of phylogenetic diversity (e.g. Rodrigues and Gaston 2002). It is important therefore to consider the relationship between species number and PD, and how it varies. Faith (2008a) proposed a power law curve for the PD - species relationship (see also Faith and Williams 2006): “The total PD represented by different-sized sets of taxa defines a “features/taxa” curve, analogous to the well-known species/area curve. Random taxon samples of different sizes from a given phylogenetic tree produced a roughly linear relationship in log–log space.” Morlon et al. (2011) provided empirical support for this proposed power law model, based on estimated PD - species curves for four phylogenetic trees from four Mediterranean-type ecosystems. For each value of species richness (S), they calculated the PD of 100 communities obtained by randomly sampling S species from the phylogeny. This process revealed a power law PD - species relationship for all four phylogenies. This relationship is linear in log-log space (Fig. 2). This relationship reveals some possible implications of species gains and losses on conservation of PD. One is that initial losses of species may mean only small losses in PD. At the other end of the curve, initial gains in protected species can mean large gains in PD. As the size of the protected set grows larger, the rate of gain in PD becomes progressively lower. Those are expected patterns for the basic PD-species relationship - found when the number of species varies through random selection of species from the phylogeny. Real-world losses (and gains) will be non-random. Several studies have examined patterns of loss of phylogenetic diversity for a given number of species extinctions (reviewed in Morlon et al. 2011). The amount of actual PD loss depends in part on whether species extinctions are clumped or well-dispersed on the phylogenetic tree. For example, several studies looking at climate change impacts suggest relatively small PD losses (e.g., Yesson and Culham 2006). The climate change impacts spread out over the phylogenetic trees mean that deeper branches throughout the tree have at least one surviving descendent. Thuiller et al. (2011) similarly found small PD loss given dispersed species losses on the phylogenies for three different taxonomic groups. In contrast, some studies have found that species extinction is concentrated on the phylogeny (“clumped”), resulting in a disproportionate loss of PD. One cause of such disproportionate loss is the occurrence of entire clades in the same threatened location. For example, this kind of clumping accounts for Huang et al.’s (2012) finding that several biodiversity hotspots in southern Asia and Amazonia are likely to lose “an unexpectedly large proportion of PD”. Faith et al. (2010) describe phylogenetically clumped impacts as a “tipping point” problem. Successive species extinctions each may imply only a moderate loss of PD, until the last descendent species from a long branch goes extinct – and the long branch representing a large amount of PD is now lost (Fig. 3). They advocated a form of “phylogenetic risk analysis” (Faith 2008b) to guide conservation decisions that try to reduce risk of these worst case losses, or “tipping point” outcomes. Thus, while random losses of species initially produce values near the top of the line in Fig. 2, non-random losses can produce markedly different results. Phylogenetically clumped losses may result in lower PD outcomes (Fig.2, point a), while phylogenetically well-dispersed losses could result in higher PD outcomes (Fig.2, point b). These scenarios may be relevant to the sustainable use of biodiversity. If current uses are phylogenetically clumped, as found in the study of Forest et al (2007), then loss of those species could imply a large PD loss. 3.3.2 Phylogenetically clumped or dispersed gains in species conservation We considered a scenario above where current use of a species might lead to its loss (through some form of over-use). However, identified current uses of elements of biodiversity naturally also may act as an incentive for the conservation of those elements of biodiversity. For example, Penafiel et al. (2011) reviewed the literature on the contribution of plant and animal species to human diets and found that local food biodiversity is an important contributor of nutritious diets. They concluded that use of this variety of species in the diet has promoted the conservation of this food biodiversity. Conservation of a set of current-use species may or may not imply the preservation of lots of PD within that taxonomic group. The PD – species curve suggests that even a small number of protected species (“gains”), selected randomly, could deliver a large gain in conserved PD. This is related to the scenario referred to above, where a small number of phylogenetically dispersed species remaining under climate change retained lots of PD. This scenario supports sustainable use – conservation of even a relatively small number of currently useful species could at the same time retain lots of PD and corresponding option values. However, another scenario demands consideration. While phylogenetically well-dispersed gains can result in higher PD outcomes (Fig.2, point d), phylogenetically clumped gains may result in lower PD outcomes (Fig.2, point c). Considering again the Forest et al. (2007) study, the finding that current-use species are phylogenetically clumped suggests that conservation of these species may not represent much conserved PD. We know that phylogenetically clumped impacts can imply large PD loss. It appears also that conservation of phylogenetically clumped currently-used species may not greatly help the overall conservation of PD. A solution to this problem is to somehow integrate the protection of currently used species with conservation that represents the entire phylogenetic tree for that taxonomic group. To examine this, we will explore PD, current uses, and conservation costs in systematic conservation planning. 3.4 PD in conservation planning for sustainable use 3.4.1 PD and systematic conservation planning The “phylogenetic sustainable use problem” can be stated as follows: how do we combine conservation of overall PD (and its associated option values) with the conservation of currently valuable species? We will use PD complementarity calculations within systematic conservation planning (SCP) tools to explore this sustainable use problem. SCP typically is recognised as a family of methods for the efficient selection of areas for the representation and persistence of elements of biodiversity (Sarkar et al. 2006). Most SCP studies are based on biodiversity measures at the species or ecosystems levels. However, phylogenetic diversity measures increasingly are considered in conservation, and methods for incorporating the PD measure into conservation planning continue to be developed. Generally, the goal is to increase the representation of PD when selecting species and/or areas for conservation and management. The earliest PD studies (Faith 1992a; 1994) linked PD to the cornerstone of SCP, complementarity (see section 3.2.1). These early studies illustrated how PD-complementarity values could be used to efficiently select species, or areas, to add to a protected set (see also Faith and Baker 2006). The early software for this phylogenetic SCP was “PD-DIVERSITY” (Walker and Faith 1994), within the DIVERSITY package (Faith and Walker 1993). Other early phylogenetic SCP developments included the integration of costs and probabilities of extinction into PD-based priority setting (Witting and Loeschcke 1995; Weitzman 1998; Faith 2008a). Hartmann and Andre (2013) recently concluded that “using PD in a prioritisation process can typically increase biodiversity outcomes by a broad range of 10–220 %”. While PD has been integrated into simple systematic conservation planning algorithms, there are few actual SCP applications (Rodrigues and Gaston 2002; Faith et al. 2004; Sarkar et al 2006; Strecker et al. 2011). One important development to support practical applications will be methods for taking variable costs of conservation into account. The PD-DIVERSITY software (Faith and Walker 1993; Walker and Faith 1994) implemented PD-complementarity for selecting sets of species or areas, but did not enable costs trade-offs (analyses that balance biodiversity and conservation costs). For our trade-offs analyses for this chapter, we adopted another DIVERSITY module, TARGET (for example runs see Faith and Walker 2002). TARGET normally examines species in areas. Here, we shift the input data to features within species. An earlier example of PD systematic conservation planning using this strategy is found in Faith (2008a). The algorithm in this case builds up a list of selected species, by comparing species’ PD complementarity values to their weighted conservation costs. A species is added to the conservation set if its PD complementarity value exceeds its weighted cost. A species is deleted from the set during the course of selections if its PD complementarity value becomes less than its weighted cost. Such a deleted species initially (at an earlier stage in adding and deleting species to build up a set) may have yielded a large gain in total net benefit, but addition of other species might have reduced its biodiversity contribution, or complementarity value. The end result of a series of additions and deletions is that the final solution, for any nominated weighting, includes a species if and only if its PD contribution exceeds its weighted cost. The final set minimizes the sum of un-represented PD and weighted cost. This selection process then is repeated for other nominated weightings, producing a trade-off curve (“efficiency frontier curve“) showing alternative solutions. We present examples of this analysis in the next section. 3.4.2 Conservation and sustainable use scenarios Recent work has illustrated how increases in the magnitude and conservation of estimated ecosystem services can move initial high-biodiversity SCP solutions (sets of conservation priority areas) towards a tipping point in which capacity for regional biodiversity conservation collapses. This problem occurs when the areas offering ecosystem services are all much the same in their regional biodiversity contributions (Faith 2012c). This redundancy in the biodiversity of the ecosystem services areas is analogous to the clumping of evosystem services (currently used species) on a phylogeny. Do increases in the magnitude and conservation of evosystem services analogously move PD-based SCP solutions (sets of conservation priority species) towards a tipping point in which the capacity for PD conservation collapses? Here, we present one example SCP analysis, for a simple hypothetical phylogenetic tree (Fig. 4) and assumed equal (“unit”) conservation costs for all species. We varied the assumptions about the extent and phylogenetic distribution of currently-used species. In Fig. 5a, the black efficiency frontier curve is for the case where there are no currently-used species, and the SCP analysis simply maximises PD for any nominated total cost of conservation. We next introduced species with current uses. If the current use value of a species is assumed to imply that the cost of conservation is 0, then there is a clear gain in the net benefits obtained through SCP. For example, suppose that the first 8 members of the large clade (dots; Fig.4) have current use and are selected for conservation action at 0 cost. The green curve (Fig.5a) is the resulting efficiency frontier curve for this case where there is 0 conservation cost for the currently used species. This clearly is a desirable outcome for the sustainable use of biodiversity because a higher level of PD conservation now can be achieved for any given total cost. However, if there is some unit cost associated with conservation of these currently used species, the trade-offs curve changes (Fig. 5a). The extent of this shift of the curve towards poor solutions depends, for any given number of current-use species, on the degree to which they are clumped on the phylogenetic tree. For example, suppose all 16 members of the large clade (Fig. 4) have current use, and are selected for conservation action, at unit cost. If there is a conservation cost for the current use species, and current use species are phylogenetically clumped, then SCP produces the red efficiency frontier curve (Fig.5a). In Fig 5b, we summarise a range of SCP results where we maintained a constant total conservation cost (“budget”) but varied the number of currently used species. In each case, these species were phylogenetically clumped, as illustrated in Fig. 4. For this fixed budget, the plot (Fig. 5b) shows the PD conservation level identified by SCP, as the number of phylogenetically clumped, currently used, species increases. The curve shows that, for our given budget of 16 units, protecting more currently used species means much reduced overall conservation of PD. Initially, for a low number of currently used species, SCP can find high PD solutions, but as the number of currently used species increases, the capacity to represent PD drops rapidly. We conclude that conservation of currently used species, on its own, does not guarantee the retention of option values that is required for sustainable use of biodiversity. SCP analyses that integrate current uses and option values goals hold promise for achieving sustainable use, but must be monitored for the kind of tipping point we have described here. The PD measure reflects expected patterns of feature diversity among species and so provides a way to quantify biodiversity option values. The potential PD gains (or losses) resulting from conservation actions (or impacts) are relevant to the phylogenetic sustainable use problem. The basic PD – species curve implies that Initial species losses generally retain high PD, suggesting that occasional loss of current-use species might not reduce overall PD. For example, several species in the legume genus Pterocarpus , used in traditional medicine to treat diabetes, are now endangered (Saslis-Lagoudakis et al. 2011). However, other, closely related, species are not endangered. Therefore much of the PD of the group remains secure. Conservation of species that have current known uses can maintain overall PD and option values; if currently used species are spread across the phylogeny, they capture more PD than those that are phylogenetically clumped. On other occasions, current uses may be so phylogenetically clumped that losses can produce tipping points with high PD loss. This difficulty is raised by the Forest et al. (2007) study’s evidence of phylogenetically clumping of currently useful species.. Systematic conservation planning that incorporates PD potentially provides a way to overcome this problem; the relatively low PD captured by conservation of currently used species can be complemented by selected conservation of other species. Overall PD conservation then should be high. However, our systematic conservation planning results suggest an important caveat: if there is a conservation budget, conservation of lots of phylogenetically clumped current-use species can use up the budget without much conservation of PD. Paradoxically, conserving more known-use species can reduce the capacity to conserve PD. Such undesirable sustainability tipping points may be avoided by balancing the conservation of currently-valued species and the conservation of overall phylogenetic diversity (PD). In this way, true “sustainable use” preserves not only known uses but also the sustained capacity to find other uses, in other species. We conclude that there is a need to also preserve PD as part of any program on sustainable use. Our suggestions fit into a broader picture of the sustainable use of biodiversity. It is now well-known that management for current-use species is a major factor in the loss of biodiversity, through associated habitat loss and other factors (e.g., Lenzen et al. 2012). Thus, shared habitat (with the current-use species) is one established factor in considering biodiversity impacts and sustainable use. Here, we have shown that shared evolutionary history (with the current-use species) is another important consideration for sustainable use programs. Brazil provides a potential good example of successful phylogenetically-based sustainable use programs. The BIOTA-FAPESP Program (www.biota.org.br/ ) has defined a goal for further development of a phylogenetic framework for exploration and assessments, in order to provide a solid basis of sustainable use of the biodiversity. The FAPESP Bioprospecta program makes effective use of phylogenies in identifying species that potentially have biologically active compounds. The FAPESP Biota program complements these efforts by also conserving overall phylogenetic diversity in the region – so supporting sustainable use by retaining options for future discovery of useful products in other species (Joly et al. 2010). By recognizing PD as a measure of option values, and integrating conservation and use, such programs can capture the core idea (as quoted earlier from Article 2 of the CBD) that sustainable use “does not lead to the long-term decline of biological diversity, thereby maintaining its potential to meet the needs and aspirations of present and future generations.” DF thanks the Biota Program of the São Paulo Science Foundation (FAPESP), and fellow participants at the International Workshop, in São Paulo, Brazil, on “Applied Ecology and Human Dimensions in Conservation Biology”. DF thanks participants and fellow members of the Scientific Advisory Board for discussions at the evaluation meeting of the BIOTA-FAPESP program, São Carlos, Brazil. Part of this paper was prepared for a keynote talk at the 49th Annual Meeting of the Association for Tropical Biology and Conservation (ATBC), Bonito, Mato Grosso do Sul, Brazil. DF thanks Lúcia Lohmann and the organisers for support, bioGENESIS members for discussions, and DIVERSITAS for additional funding. LP thanks the National Environmental Research Program (NERP) and the School of Botany at the University of Melbourne for support. Beattie AJ, Hay M, Magnusson B, de Nys R, Smeathers J, Vincent JFV (2011) Ecology and bioprospecting. Austral Ecol 36:341-356 Bordewich M, Semple C (2012) Budgeted nature reserve selection with biodiversity feature loss and arbitrary split systems. J Math Biol 64:69-85 Davies TJ, Buckley LB (2011) Phylogenetic diversity as a window into the evolutionary and biogeographic histories of present-day richness gradients for mammals. Phil. Trans. R. Soc. B 2011 366: 2414-2425 Díaz S, Hector A, Wardle DA (2009) Biodiversity in forest carbon sequestration initiatives: not just a side benefit. Curr Opin Environ Sustainability 1:55-60 Faith DP (1992a) Conservation evaluation and phylogenetic diversity. Biol Conserv 61:1-10 Faith DP (1992b) Systematics and conservation: On predicting the feature diversity of subsets of taxa. Cladistics 8:361-373 Faith DP (1994) Phylogenetic diversity: a general framework for the prediction of feature diversity. In: Forey PL, Humphries CJ, Vane-Wright RI (Eds) Systematics and Conservation Evaluation. Clarendon Press Oxford, U.K. Faith DP (2008a) Phylogenetic Diversity and Conservation. In: Conservation biology: evolution in action. pp. 99–115. http://books.google.com.au/books?isbn=0195306783 Faith DP (2008b) Threatened species and the preservation of phylogenetic diversity (PD): Assessments based on extinction probabilities and risk analysis. Conserv. Biol. 22: 1461-1470. Faith DP (2010) Biodiversity transcends services. Science 330:1745-1746 Faith DP (2011) Ecosystem services and biodiversity option values. http://www.sciencemag.org/content/330/6012/1745/reply Cited 10 February 2011 Faith DP (2012a) Biodiversity and ecosystem services: similar but different. Bioscience 62: 785. Faith DP (2012b) Common ground for biodiversity and ecosystem services: the "partial protection" challenge. F1000 Research http://f1000research.com/articles/common-ground-for-biodiversity-and-ecosystem-services-the-partial-protection-challenge/ Faith DP (2012c) Tipping points in systematic conservation planning: conservation of ecosystem services may be accompanied by a collapse in regional capacity for biodiversity conservation Abstract P2.47 in: Planet Under Pressure 2012 Conference information. Faith DP (2013) "Biodiversity", The Stanford Encyclopedia of Philosophy, Edward N. Zalta (ed.), URL = < http://plato.stanford.edu/entries/biodiversity/ >. Faith DP, Walker PA (1993). DIVERSITY: a software package for sampling phylogenetic and environmental diversity. Reference and user's guide. v.1.0. In. CSIRO Division of Wildlife and Ecology Canberra, Australia. Faith DP, Walker PA (2002) The role of trade-offs in biodiversity conservation planning: linking local management, regional planning and global conservation efforts, J. Biosci. 27 (Suppl. 2) 393–407 Faith DP, Baker A (2006) Phylogenetic diversity (PD) and biodiversity conservation: some bioinformatics challenges. Evol Bioinf 2:121-128 Faith DP, Magallón S, Hendry AP, Conti E, Yahara T, Donoghue MJ (2010) Evosystem services: an evolutionary perspective on the links between biodiversity and human well-being. Curr Opin Environ Sustainability 2:66-74 Faith DP Reid CAM, Hunter J (2004) Integrating phylogenetic diversity, complementarity, and endemism for conservation assessment. Conserv Biol 18:255-261 Faith DP, Williams KJ (2006) Phylogenetic diversity and biodiversity conservation (pp. 233–235). In McGraw-Hill yearbook of science and technology. McGraw-Hill, New York, N.Y. Forest F, Grenyer R, Rouget M, Davies TJ, Cowling RM, Faith DP, Balmford A, Manning JC, Proches S, van der Bank M, Reeves G, Hedderson TAJ, Savolainen V (2007) Preserving the evolutionary potential of floras in biodiversity hotspots. Nature 445:757-760. Hartmann K, Andre J (2013) Should evolutionary history guide conservation?, Biodiversity and Conservation, 22:449-458. Hendry AP, Lohmann LG, Conti E, Cracraft J, Crandall KA, Faith DP, Häuser C, Joly CA, Kogure K, Larigauderie A, Magallón S, Moritz C, Tillier S, Zardoya R, Anne-Hélène, Prieur-Richard, Walther BA, Yahara T, Donoghue MJ (2010) Evolutionary biology in biodiversity science, conservation and policy: a call to action. Evolution 64:1517-1528 Huang S, Davies TJ, Gittleman JL (2012) How global extinctions impact regional biodiversity in mammals. Biology Letters 8: 222-225. Isambert B, Bergsten J, Monaghan MT, Andriamizehy H, Ranarilalatiana T, Ratsimbazafy M, Andriniainimanana JR, Vogler AP (2011) Endemism and evolutionary history in conflict over Madagascar’s freshwater conservation priorities Biological Conservation 144 (2011) 1902–1909 IUCN (1980) World Conservation Strategy: living resource conservation for sustainable development, International Union for Conservation of Nature and Natural Resources (IUCN). Joly CA, Rodrigues RR, Metzger JP, Haddad CFB, Verdade LM, Oliveira MC, Bolzani VS (2010) Biodiversity conservation research, training, and policy in São Paulo. Science 328:1358-1359. Krishnamurthy PK, Francis RA (2012) A critical review on the utility of DNA barcoding in biodiversity conservation. Biodiversity Conservation 21:1901-1919 Lenzen M, Moran D, Kanemoto K, Foran B, Lobefaro L, Geschke A (2012) International trade drives biodiversity threats in developing nations. Nature 486:109-112 Mace GM (2003) Preserving the Tree of Life. Science 300:1707 Mace GM, Wolfgang C, Díaz S, Faith DP, Larigauderie A, Le Prestre P, Palmer M, Perrings C, Scholes RJ, Walpole M, Walther BA, Watson JEM, Mooney HA (2010) Biodiversity targets after 2010. Curr Opin Environ Sustainability 2:1-6 McNeely JA (1988) Economics and biological diversity: developing and using economic incentives to conserve biological resources. IUCN, Gland, Switzerland. 232pp. Millennium Ecosystem Assessment (2005) Ecosystems and Human Well-being: Biodiversity Synthesis. World Resources Institute Washington DC, USA Morlon H, Schwilk DW, Bryant JA, Marquet PA, Rebelo AG, Tauss C, Bohannan BJM, Green JL (2011) Spatial patterns in phylogenetic diversity. Ecol Lett 14:141-149 Nipperess DA, Faith DP, Barton K (2010) Resemblance in phylogenetic diversity among ecological assemblages. J Veg Sci 21: 1–12, Pacharawongsakda E, Yokwai S, Ingsriswang S (2009) Potential natural product discovery from microbes through a diversity-guided computational framework. Appl Microbiol Biotechnol 82:579-586 Penafiel D, Lachat C, Espinel R, Van Damme P, Kolsteren P (2011) A systematic review on the contributions of edible plant and animal biodiversity to human diets. Ecohealth 8:381-399 Perrings C, Naeem S, Ahrestani F, Bunker DE, Burkill P, Canziani G, Elmqvist T, Ferrati R, Fuhrman J, Jaksic F, Kawabata Z, Kinzig A, Mace GM, Milano F, Mooney H, Prieur-Richard AH, Tschirhart J, Weisser W (2010) Conservation. Ecosystem services for 2020. Science 330:323-324 Redford KH, Richter BD (1999) Conservation of biodiversity in a world of use. Conserv Biol 13:1246-1256. Reid WV, Miller KR (1989) Keeping Options Alive: The Scientific Basis for Conserving Biological Diversity. World Resources Institute, Washington DC. Rodrigues ASL, Gaston K (2002) Maximising phylogenetic diversity in the selection of networks of conservation areas. Biol Conserv105: 103–111. Sarkar S, Pressey RL, Faith DP, Margules CR, Fuller T, Stoms DM, Moffett A, Wilson KA, Williams KJ, Williams PH, Andelman S (2006) Biodiversity conservation planning tools: present status and challenges for the future. Ann Rev Environ Resour, 31:123-159 Saslis-Lagoudakis CH, Klitgaard BB, Forest F, Francis L, Savolainen V, Williamson EM, Hawkins JA (2011) The use of phylogeny to interpret cross-cultural patterns in plant use and guide medicinal plant discovery: an example from Pterocarpus (Leguminosae). PLoS ONE 6:e22275. doi: 10.1371/journal.pone.0022275 Smith MA, Fisher BL (2009) Invasions, DNA barcodes, and rapid biodiversity assessment using ants of Mauritius. Front Zool 6:31 Smith WL, Wheeler WC (2006) Venom Evolution Widespread in Fishes: A Phylogenetic Road Map for the Bioprospecting of Piscine Venoms, Journal of Heredity 97:206–217 Strecker AL, Olden JD, Whittier JB, Paukert CP (2011) Defining conservation priorities for freshwater fishes according to taxonomic, functional, and phylogenetic diversity. Ecological Applications, 21: 3002–3013 Thuiller W, Lavergne S, Roquet C, Boulangeat I, Lafourcade B, Araujo MB (2011) Consequences of climate change on the tree of life in Europe. Nature 470:531-534 Tulp M, Bohlin L (2002) Functional versus chemical diversity: is biodiversity important for drug discovery? Trends Pharmacol Sci 23:225-231 UNCSD (2012) The Future We Want. United Nations Conference on Sustainable Development Rio de Janeiro, Brazil. http://www.uncsd2012.org/content/documents/727The Future We Want 19 June 1230pm.pdf Cited 1 August 2012 Walker PA, Faith DP (1994) DIVERSITY-PD: Procedures for conservation evaluation based on phylogenetic diversity, Biodiv. Letters 2:132–139 Weitzman ML (1998) The Noah’s Ark problem. Econometrica 66:1279–1298 Witting L, Loeschcke V (1995) The optimization of biodiversity conservation. Biological Conservation 71:205–207 Yesson C, Culham A (2006) A phyloclimatic study of Cyclamen, BMC Evolutionary Biology 6:72 Fig. 1. Hypothetical phylogenetic trees illustrating PD. a) The PD represented by the set of two species, Y and Z, as darker lines. b) Addition of species X increases the PD by the amount shown by the double line segment. This additional length needed to arrive at X is the PD-complementarity value of X. Fig 2. A schematic diagram illustrating the power curve relationship between PD and number of species. In log-log space, this relationship is a straight line (dark line in plot). The power curve is produced by average PD values for random sets of species of a given size. Non-random sets will produce higher or lower PD values. The grey bars represent the range of possible values of PD for each number of species. Points a and c illustrate possible low-PD outcomes and points b and d illustrate possible high-PD outcomes. Fig 3. The plot shows the PD retained as species are lost from a portion of a hypothetical phylogenetic tree having a long branch leading to three closely related species. Loss of 1 or 2 species implies only small PD loss, but loss of the 3rd species also means loss of the long ancestral branch. Fig. 4. A hypothetical phylogenetic tree with 64 species. Species with dots are those assumed to have current uses in our analyses. Fig 5 a) An SCP trade-offs space with vertical axis equal total PD conserved and horizontal axis equal total cost, with lower cost to right. High net benefits solutions are therefore towards the upper right. The black curve is for the case where there are no current-use species, and PD is maximised for any nominated cost. The green curve is the efficiency frontier curve for the case where there is 0 conservation cost for the current use species. The red curve is the efficiency frontier curve for the case where there is a conservation cost for the current use species, and these species are phylogenetically clumped. b) For a fixed budget of 16 units, the plot shows the PD conservation achieved in SCP as the number of clumped current use species increases. Initially, SCP can find high PD solutions, but as the number of current use species increases the capacity to represent PD drops rapidly. Dr Dan Faith , Principal Research Scientist
The Blackwell Reader in Judaism February 2001, Wiley-Blackwell Part I: The History of Judaism:. 1. Defining Judaism: Jacob Neusner. "Judaism: The Religion, Philosophy, and Way of Life of the Jews": Louis Jacobs. "Old Habits Die Hard: Judaism in the Encyclopaedia of Religion": William Scott Green. 2. The Religious World of Ancient Israel to 586: Marvin A. Sweeney. 2 Samuel 6:1-19. 2 Samuel 7:1-16. 3. Judaism and the Hebrew Scriptures: Philip R. Davies. The Habakkuk Pesher from Qumran (1QpHab), cols. 7-9. Josephus, Antiquities I:13 (222-236). Philo, On the Migration of Abraham 1-5 (1-25). Targum Pseudo-Jonathan on Genesis 4. 4. Second Temple Judaism: Frederick J. Murphy. Ezra and Nehemiah. Haggai and Zechariah. The Psalms of Solomon. 5. The Formation of Rabbinic Judaism, 70-640 C.E:Günter Stemberger. B. Git. 56a-b: Yohanan ben Zakkai's Escape from Jerusalem. M. Abot 1:1-18: The Chain of Tradition. Y. Peah 2:6, 17a: Written and Oral Torah. Y. Sanhedrin 1:2, 19a: The Ordination of Rabbis. Y. Yebamot 12:6, 13a: Rabbis in the Service of the Community. Leviticus Rabbah 13:5: The Four Kingdoms. B. Baba Qamma 83b-84b: Biblical Foundation of the Mishnah. 6. The Canon of Rabbinic Judaism: The Mishnah and the Midrash: Jacob Neusner. Martin Jaffee, How the Mishnah Makes a Theological Statement: Mishnah Ma'aserot Chapter One. The Midrash: Genesis Rabbah: The Rules of History Set Forth by Revelation. 7. Judaism and Christianity in the Formative Age: Bruce Chilton. Thomas (sayings 79-85). Justin, The First Apology 1-3. Clement of Alexandria, Paidagogos, 6.32.- 6.35. Origen, On First Principles 2.11.2-4. Eusebius: History of the Church 8.8.1 - 8.9.6. Augustine, The City of God 22.14-22.15. 8. Judaism in the Muslim world: Sara Reguer. A Late Twelfth Century Curriculum of Advanced Study: Joseph b. Judah ibn 'Aqnin, Tibb al-Nufus. Maimonides' Philosophy: Introduction to The Guide to the Perplexed. 9. Judaism in Christendom: David R. Carr. Solomon ben Isaac on Forced Conversion. Judah ha-Levi: Poem on Return to Zion. Moses ibn Ezra: Poem on Worldliness. Moses ben Nahman: The Disputation at Barcelona. Solomon bar Simson on the Mainz Martyrs. Abraham ibn Daud of Toledo on Samuel ha-Nagid. Maimonides regarding a Hebrew Translation of Guide of the Perplexed. Judah ibn Tibbon on Education. Joseph ibn Caspi on Education and Philosophy (1332). Solomon bar Isaac's Exegesis of Torah (1105). Testament of Eleazar of Mayence on piety and charity (c. 1357). Maimonides on Law. Maimonides on Art and Idolatry. Solomon ibn Adret on faith and reason (second half of 13th century). Solomon ben Adret's ban on study of philosophy by youths (1305). The Book of Splendor (The Zohar) (1286). 10. Philosophy in Judaism: Two Stances: S. Daniel Breslauer. Flavius Josephus: Philosophy is Judaism; Judaism is Philosophy. Julius Guttmann: Philosophy is Alien to Judaism. Isaac Husik: Jewish Philosophy in the Past but not the Present. Philo of Alexandria: Jewish Scripture as Philosophy. Saadia Gaon: Defending Tradition. Judah Halevi: The Special Function of the Jews. Maimonides: The Philosophical Function of Judaism. Baruch Spinoza: A Modern Critique of Judaism. Hermann Cohen: Modern Religion out of the Sources of Judaism. Emmanuel Levinas: Translating Judaism into Modern Philosophy. 11. Jewish Piety: Tzvee Zahavy. Rules for a Bar Mitzvah. Dedication of a House. Laws for Visiting the Sick. Laws of Purification (Taharah) and Shrouds. Order of the Wedding Ceremony. Part II: The Principal Doctrines of Judaism:. 12. The Doctrine of Torah: Jacob Neusner. Warren (Zev) Harvey, "Torah". 13. The Doctrine of God: Alan J. Avery-Peck. George Foot Moore, "God and the World". 14. The Doctrine of Israel: Jacob Neusner. Israel as Sui Generis in the Mishnah. Genesis Rabbah: The Metaphor of the Family, "Israel". Israel as Sui Generis in the Yerushalmi's Theory of Salvation. 15. The Doctrine of Hebrew Language Usage: David H. Aaron. The Mishnah and Tosefta: Translations are Appropriate. The Talmud: The Language of Liturgy. The Talmud: Torah Language and Colloquial Speech. The Midrashic Literature: The Preference for Hebrew. Mysticism: The Power of Individual Letters. Part III: Modern and Contemporary Judaisms:. 16. Reform Judaism: Dana Evan Kaplan. Eugene B. Borowitz, "A Liberal Jewish Approach to Ritual". Walter Jacob, "Standards Now". Eric Yoffie, "Moses, Too, Was Once a Marginal Jew". Henry Cohen, "Rabbinic Officiation and Mixed Marriage Revisited". A Statement of Principles for Reform Judaism. 17. Orthodox Judaism: Benjamin Brown. Rabbi Moshe Sofer (The Hattam Sofer): A Testament. Rabbi Samson Raphael Hirsch, "Emancipation". Rabbi Avraham Isaac ha-Cohen Kook on the Unity of Contradiction. Rabbi A. Y. Kook on Ideological Diversity and Unity. Rabbi A. Y. Kook on Secular Zionist Idealism. Rabbi Avraham Yesha'ayahu Karelitz on Israel as a New Torah Center. Rabbi Avraham Yesha'ayahu Karelitz on Extremism. Rabbi Yoel Teitlbaum of Satmar on the Holocaust as Divine Punishment. Rabbi Joseph Baer Soloveitchik on the Objectivity of Halakha. Rabbi Menahem Mendl Schneerssohn of Lubavitch. Yesha'ayahu Leibowitz on Science and Jewish Religion. 18. Conservative Judaism: The Struggle Between Ideology and Popularity: Daniel Gordis. Emet Ve-Emunah-A Statement of Principles. A Responsum on Sabbath Observance. Joel Roth: Faculty Paper Urging the Ordination of Women. Elliot Dorff: Position Paper on Homosexuality and Sexual Ethics. 19. New Age Judaism: Jeffrey K. Salkin. Neil Gillman, "On the New Jewish Spirituality". Arthur Green, "Judaism for the Post-Modern Era". Jeffrey K. Salkin, "What is Spirituality, Anyway?". Jack Moline, "Is Jewish Renewal Good for the Jews?". Part IV: Special Topics in Understanding Judaism:. 20. Ethics of Judaism: Elliot N. Dorff. Jewish Ethics: Aaron L. Mackler, "Cases and Principles in Jewish Bioethics: Toward a Holistic Model". Jewish Morality: Seymour Siegel, "A Jewish View of Economic Justice". 21. Women in Contemporary Judaism: Judith R. Baskin. Tamar Frankiel: The Voice of Sarah: Feminine Spirituality and Traditional Judaism. Marcia Falk, "Introduction of New Blessings". Merle Feld, "Healing After a Miscarriage" and "We All Stood Together". Ellen M. Umansky, "Re-Visioning Sarah: A Midrash on Genesis 22". Susan Grossman, "On Tefillin". Judith Plaskow, Standing Again at Sinai: Judaism from a Feminist Perspective. Rachel Adler, Engendering Judaism: An Inclusive Theology and Ethics. 22. Judaism as a Theopolitical Phenomenon: Daniel J. Elazar. Certificate of Incorporation and Bylaws: Congregation Kehillat Jeshurun, New York (1972). Constitution and Bylaws of Monmouth Reform Temple, Monmouth, New Jersey (1988). The Covenant of Petah Tikva (1878). The Scroll of Independence of the State of Israel (1948). 23. Theology in Contemporary Judaism: Neil Gillman. Eugene Borowitz, Renewing the Covenant: A Theology for the Postmodern Jew. Emil Fackenheim, Quest for Past and Future. Neil Gillman, Sacred Fragments. Arthur Green, Seek My Face, Speak My Name. Irving Greenberg, "Voluntary Covenant". David Hartman, A Living Covenant. Will Herberg, Judaism and Modern Man-God. Will Herberg, Judaism and Modern Man-Faith. Abraham Joshua Heschel, God in Search of Man. Mordecai Kaplan, Questions Jews Ask: Reconstructionist Answers. Franz Rosenzweig, "The Builders: Concerning the Law". Richard Rubenstein, in The Condition of Jewish Belief. Harold M. Schulweis, Evil and the Morality of God. Michael Wyschogrod, The Body of Faith: God in the People Israel. 24. Secular Forms of Jewishness: Paul Mendes-Flohr. Michah Joseph Berdichevski, "Wrecking and Building". Ben Halpern, "Apologia Contra Rabbines". Yaakov Malkin, "The Faith of Secular Jews". 25. Judaism and Zionism: Yosef Gorny. David Vital, "The Future of the Jews: A People at the Crossroads?". Ben Halpern, "Exile-Abstract Condition and Concrete Community". Nathan Rotenstreich, "The Present-Day Relationship". Shlomo Avineri, "Israel-A Normative Value of Jewish Existence". Ismar Schorsch, "Making Israel a Light unto the Nations: Conservative Zionism Reconsidered". Eugene B. Borowitz, "What Is Reform Religious Zionism?". Isadore Twersky, "Survival, Normalcy, Modernity". Henry L. Feingold, "Zionism: A New Course Needed". Eliezer Schweid, "The Major Goal of Zionism Today: To Build the Spiritual Center". Yosef Gorny, "The Need for a New Hibbat Zion". 26. The "Return" to Traditional Judaism at the End of the Twentieth Century: Cross Cultural Comparisons: M. Herbert Danzger. Return: An Unanticipated Development. Religious Authority in Judaism. Action and Study. Why They Return. List of Abbreviations. Alan J. Avery-Peck is Kraft-Hiatt Professor in Judaic Studies at The College of the Holy Cross. His has published widely and is editor of the journal The Annual of Rabbinic Judaism: Ancient, Medieval and Modern. - Presents statements about Judaic life today, as well as foundational texts. - Affords readers direct access to the vitality and power of this living religion. - Provides an apt way of learning about Judaism, since it is a religion that speaks through the 'word'. "The editors set out to produce a work that is open to the educated general reader, rather than being restricted to a scholarly audience, and in this reviewer's opinion they have certainly succeeded. Overall what is presented...is a detailed, balanced, scholarly but approachable work, a source of information as well as a resource for further study." The Expository Times
By ROBERT LEE HOTZ MSN Money Homepage MSN Money Investing • How the Brain Agonizes Over Fairness • Digital Age Makes Space Weather Important MIND & MONEY GAMES: RECOMMENDED READING -- by Robert Lee Hotz In the first full-length book on neuroeconomics, "Decisions, Uncertainty, and the Brain: The Science of Neuroeconomics," New York University's Paul Glimcher argues that economic theory may provide a new way to think about the brain and behavior. * * * In the Journal of Economic Literature, economists Colin Camerer, George Loewenstein and Drazen Prelec lay out the case for using neuroscience to revolutionize traditional economics. * * * In "Nature: An Economic History," Geerat Vermeij, an evolutionary biologist at the University of California at Davis, explores biology, economics and geology to show how processes common to all economic systems govern evolution. * * * The "Handbook of Functional Neuroimaging of Cognition," edited by neuroscientists Roberto Cabeza and Alan Kingstone, explains the imaging techniques used to study the neural basis of cognition. * * * Until the 17th century, people thought the human brain was a curious lump of animate curds. Its discovery as the seat of human consciousness is a whodunit of science history told by Carl Zimmer in "Soul Made Flesh." * * * The Web site for the Canaan Children's Home in Uganda. * * * The web site for the Caltech Imaging Center. SEARCH PAST COLUMNS Search for these words: Display all columns TODAY'S MOST POPULAR 1. Merrill Takes $8.4 Billion Credit Hit 2. Microsoft Inks Deal with Facebook 3. Leopard: Faster, Easier Than Vista 4. BofA's Wall Street Retreat 5. Countrywide's New Scare PEOPLE WHO READ THIS... Also read these stories: People who like this also like... New Status Symbol: Family Mission Statements Business Magazines' Formula Undone 'Lars' Is a Smart, Tender Comedy Europe's Drug Insurers Try Pay-for-Performance Technology Can Even Impress an Intel Founder Sign up to receive our daily newsletter of media and marketing headlines, plus get a weekly update of top stories from the Weekend Edition and Pursuits. Check the boxes, then click below to subscribe. Media & Marketing Edition To view all or change any of your e-mail settings, click to the E-Mail Setup Center Charting the Agony Of a Brain as It Struggles to Be Fair October 12, 2007; Page B1 At the Canaan Children's Home in southern Uganda, the orphans had no idea that a woman inside a brain scanner 9,400 miles away was playing mind games with their food. The children were the focus of a brain experiment under way at the California Institute of Technology to explore the neural anatomy of indecision. With the push of a button, the woman in the Caltech scanner could distribute meals at the orphanage more fairly, but only by taking food off the table, not by serving more portions. While she pondered, the 12-ton fMRI scanner at the university's brain-imaging center traced the synaptic patterns of equity, remorse and reward in her brain. In these riptides of neural currents, the researchers sought clues to human variables missing from the mathematics of conventional economics. NEUROECONOMICS AND DECISIONS Ever wonder why you make such bad investment decisions? What happens in your head when logic and rationality take a backseat? Share your thoughts with Robert Lee Hotz and other readers on the Science forum.The quirky experiment exemplifies the new field of neuroeconomics. Behavioral economist Ming Hsu and his Caltech colleagues combined financial-decision theories and medical brain-imaging tools to analyze the brain as a living engine of economics, one fine-tuned by evolution through eons of foraging for scarce resources. These scientists studied hard choices, documenting how competing networks of neurons unconsciously shape the way we buy, sell, risk and trust. During this test, the scientists wanted to see how synapses valued fairness against the desire to avoid harming others. The dilemma can arise when a limited resource is distributed unequally, and the only way to help one person comes at another's expense -- whether in profit sharing, setting affirmative-action policy, or rationing health care. In the summer of 2006, when they organized the test, Dr. Hsu and his colleagues could imagine no more agonizing choice, within the constraints of medical ethics, than to ask people to take food away from orphans in a war-torn African country. An online search led them to the Web site for the Canaan Children's Home, a one-story green building with a clinic next door, set amid the trees and chicken coops a half hour's drive from Jinja, Uganda. As of April, 100 children were living there, many of them orphaned by AIDS, said Frank P. Crane in Richmond, Va., chairman of the Uganda Missions Action Committee, which monitors the home's finances. It was the winsome faces of those children -- whose photographs had been posted on the Web site to solicit charitable donations -- that caught Dr. Hsu's science eye. Here was the perfect experimental device for stirring the turmoil of indecision, the researchers agreed. The team next contacted Tom Roberts, an attorney in Richmond, who created the Web site. He gave consent for the photos to be used. Because there would be no contact with the children and no actual consequences of the experiment to the orphanage, "I said help yourself," Mr. Roberts recalled. Dr. Hsu wanted the pictures to heighten the realism of the experiment. In the scanner, each volunteer could equalize how a fixed amount of donated meals was shared between orphans -- but only by taking away meals from those who had more than others and thereby reducing the total number of meals given to the orphanage. The allocation of meals was sometimes fair, sometimes not. "We manipulated the allocations and how much could be taken away," Dr. Hsu said. To trigger the brain behavior, the 26 volunteers had to believe their decisions really would affect orphans being denied their seat at a groaning board of plenty where others feasted. So, the experimenters made them all study a 10-page brochure with pictures of 60 orphans. In 36 rounds of testing, each subject had 10 seconds to choose the lesser of two evils: Allow some children to keep more than their fair share of meals or take away their food to eliminate inequity. It was a measure of the economics of morality. Dr. Hsu made the inequities more or less severe by changing the number of meals donated to different groups of children. That provoked patterns of neural activation that revealed the brain's distaste for injustice and its willingness if the disparity was wide enough -- in one case, one child receiving five times more than another -- to punish the rich by putting them on short rations. To redress the extremes, people were willing to confiscate meals even when it hurt the orphanage as a whole, Dr. Hsu, now at the University of Illinois, reported recently at a meeting of the Society for Neuroeconomics in Nantasket, Mass. As a test of economic theory against the benchmark of the brain, the Uganda experiment is one subtle brushstroke in an emerging self-portrait of the mind, generated by floods of new brain data. Indeed, neuroeconomics itself is still so new that cultural anthropologists from the Massachusetts Institute of Technology and New York University are documenting the folkways of this nascent network of scholars. "The payout for this in economics may not come for 20 years," said University of Zurich economist Ernst Fehr. "Economics is a slow science." • Email me at firstname.lastname@example.org . For a discussion on this column, go to the Science Journal forum.
Be a Weather Reporter! by Judie Haynes Young students love to become weather reporters with this "weather turtle." It is guaranteed to produce lots of language and to give students practice in following directions in English. Here is a quick weather lesson for your younger students. It is also a good demonstration of how to bring the TESOL Standards to beginning K-2 students Theme or Lesson Topic: Learning weather expressions Beginning to Advanced Beginning K-2. Goal and Standard: Goal 2, Standard 2: To use English to achieve academically in all content areas. Content Concepts and Skills: - Basic weather expressions: Itís cloudy today; itís a rainy day; itís a windy day; itís sunny today; itís snowing; itís a snowy day; thereís a thunderstorm today; thereís thunder and lightning today. - Building sentences on the basic weather expression. - Relating language to pictures/symbols Materials or Resources: Gilberto and the Wind, Taro's Umbrella, The Cloud Book, The Snowy Day; downloadable weather turtle This lesson was designed to be covered during three days of instruction (30 minutes each day). - Introduce students to basic weather terms through literature and download Weather Turtle. Each student is given a copy of the turtle. The vocabulary taught can be geared to the age and language ability of your students. For example, to beginning kindergarten students, teach "Itís snowing" instead of "itís a snowy day." - Make a copy of the weather icons on the left hand side of the page. Use them as flashcards or to play a concentration game. - Have students color the turtle. They should then cut the turtle out. Fold it lengthwise and make two slits on the white lines. Be sure that students do not cut out the entire black square. - Have students cut out the weather icons in a strip. Thread the strip through the slits so that the black square is covered. - Student should pull the strip through the turtle to demonstrate your sentences. If you say, "It is a windy day" students will show the wind icon. Have them ask one another what kind of day it is. Expand on the basic sentence but having students add how that makes them feel. "Iím happy because itís a snowy day." - Expand the language further by asking, "It's a snowy day today. What will you do? What will you wear." Descriptors and Progress Indicators: During this unit students worked on the following skills: - comparing and contrasting information - listening to and speaking about subject matter information - retelling information - interpreting information presented visually - following oral directions. - formulating and asking questions © 1998-2004 Judie Haynes, www.everythingESL.net
A missionary to South Asia was arrested last night while conducting a Gospel outreach at an Independence Day celebration in Holly Ridge, North Carolina. Jesse Boyd of Full Proof Gospel Ministries told Christian News Network that he had just returned to his home state from a 13-month missions trip two weeks prior, where he had been preaching in Johannesburg, South Africa; Kathmandu, Nepal; Dhaka, Bangladesh and 15 other countries worldwide. Boyd preached in the open air, witnessed one-on-one, and distributed approximately 150,000 pieces of Gospel literature during his mission, which he states is one of many evangelistic trips that he has conducted over the past decade. The center of Boyd’s outreach was in Kathmandu, where he and his wife and three young children lived, along with fellow missionary Ricky Springer from Oklahoma. Boyd says that he and Springer were invited by a local Christian to last night’s Fourth of July celebration in Holly Ridge to share the Gospel with the attendees that would be gathering in the public park. He states that he and Springer distributed tracts to many people, and then Ricky decided to preach the Gospel. As there was loud music playing, Boyd explained that Springer utilized a small amplification device, which was clipped to his belt. “[Y]ou will never look across this world and see a perfectly righteous man. I’m not perfectly righteous; I will guarantee you that,” Springer preached to the crowd, many of which were consuming alcohol. “But, no drunkard will enter the Kingdom of God, and I can assure you of that, too.” Boyd stated that Springer preached for approximately 30 minutes without issue from police. He said, however, that when a man who had been drinking began to take issue with Springer’s message, the police turned against them. “He tried to get me to ‘step outside’ and fight him, but I replied, ‘Sorry sir, I didn’t come here to fight people; I came here to love people,’ Boyd explained. “As soon as I said these words, Sergeant Keith Whaley of the Holly Ridge Police Department made a beeline for Ricky and told him that he would be arrested if he didn’t shut the microphone off and stop preaching.” He states that although he and Springer inquired numerous times as to what law they were violating, Whaley would not provide an answer, and only made threats of arrest if they continued. He reportedly left in a huff of anger. Boyd said that as Whaley departed, the national anthem came over the speakers and the fireworks display began, so they ceased preaching out of respect for the program. “At that time, we were not preaching or anything because fireworks were going off — only standing around and conversing with some local believers we met,” he explained. Boyd said that he also called 911 to request that a supervising officer be called to the scene, as he was concerned that Whaley was violating their constitutional rights. Approximately 10 minutes later, Whaley returned with a man that identified himself as the police chief. Whaley again informed Springer as he was conversing with fellow believers that if he used the amplification device, he would be arrested. Boyd said that he began to discuss the local noise ordinance with the officers in an attempt to ascertain how they could comply with the law. “I continued to press for an explanation of how the law was being transgressed, but these officers scoffed and then rudely walked off, again threatening arrest,” he stated. Boyd explained that he also had outlined to the officers, “I didn’t just come out of the Third World, having battled all sorts smoke, fire, and a beating for the Gospel, just to be treated like this in a country that is supposed to have freedom of speech.” “I called to the officers as they were walking away and openly rebuked them: ‘This is the USA, not the Soviet Union,” Boyd said. “Shame on you, you need to repent . . . I am not disrespecting you; I respect your office, but not your manner. This is America.'” He stated that when uttering the word “repent,” the officers basically turned around and placed him in handcuffs. While Springer was attempting to record the situation with his camera, the man who identified himself as the chief reportedly prohibited him from doing so and grabbed Springer’s arm to stop him. He also threatened that if Springer did not produce identification, he would also be taken into custody. Boyd was then transported to the Onslow County Jail, where he was held for two hours and released on $500 bond. He was charged under North Carolina’s disorderly conduct statute for “making utterances and using abusive language, intended and plainly likely to produce immediate violent retaliation” against the police. “I wasn’t aware that the words ‘repent’ and ‘shame’ are considered abusive language that incite violence,” Boyd told Christian News Network. “This bogus charge is nothing more than a thug policeman venting his hatred for the Gospel and abusing his authority, and a police chief choosing to back said officer instead of respecting the law and someone’s freedom of speech,” he added. A hearing is scheduled for August 30th. “[I spent] 13 months in Communist, Muslim, and various other countries without freedoms, and only in America on Independence Day do I get arrested and charged with some bogus charges over preaching the Gospel,” Boyd said. “Sheer profundity.” Chief Maiorano and the Holly Ridge Police Department refused comment. However, Mayor Elmer Padgett, who was reached at his home, remarked that the attendees did not come to hear Boyd speak, but to see the fireworks. When asked about the government’s duty to protect freedom of speech, Padgett stated that police have “the right” to stop people from speaking “if someone complains.” Boyd and Springer were beaten by an angry crowd earlier this year while preaching on the Ten Commandments in Nepal. They suffered multiple injuries from being battered with boards, stones and bare fists. Editor’s Note: Those wishing to express concern may contact Mayor Elmer Padgett at [email protected], the Holly Ridge Police Department at 910-329-4076, Police Chief John Maiorano at [email protected] and arresting officer Sergeant Keith Whaley at [email protected]. District Attorney Ernie Lee, whose office will decide whether to pursue prosecution, may be reached at 910-478-3699 and via email at [email protected]
University Symphonic Band Large Ensemble Experience The University Symphonic Band is an ensemble of approximately 50 musicians. The band performs contemporary and traditional band literature and meets during the spring semester of each year. About the Director: William Plenk Dr. William Plenk joined the music faculty of the University of Nevada, Reno in July, 2011. He currently serves as Director of Marching/Athletic Bands, overseeing the University of Nevada Wolf Pack Marching Band, Pep Bands and Symphonic Band, as well as teaching courses in marching band techniques and conducting. Academic Band Resources at UNR There are over 389,000 search results for the key phrase "Campus Band" in the Mathewson-IGT Knowledge Center. There are over 18000 item results for the key phrase "Band Music" in the Link+ California and Nevada library lending system. Ensemble Performances at UNR Faculty and student ensemble performances occur frequently througout each semester. Check the Department of Music Events Calendar for upcoming recitals and concerts.
Ben Kirtman -- The Diversity of ENSO in the NMME Prediction Experiment -- The longitudinal position of the center of maximum sea surface temperature anomaly (SSTA) associated with El Niño has become the subject of considerable scientific interest and debate. Much of the debate centers on whether there are two kinds of El Niño - the canonical El Niño that has its maximum close to the coast of South America and the second kind that has its maximum in the central Pacific – or whether there is simply a continuum of events. This second kind of El Niño has several different names in the literature, e.g. “dateline El Niño”, “El Niño Modoki”, “Central Pacific El Niño” and “Warm Pool El Niño”. The above debate is important because there appears to be largely different teleconnections associated with the two types of El Niño and there is some evidence that the relative frequency of these two types changes with a changing climate. In this work, we are agnostic with respect to whether there are two kinds of El Niño or a continuum. We simply acknowledge that there is considerable variability in the central longitude of the maximum SSTA, and we ask whether the current generation of climate prediction systems can capture this variability. Our approach is to assess whether current models capture the variability in the location of maximum warming within the context of the North American Multi-Model Ensemble (NMME) prediction experiment. The NMME experiment includes nine state-of-the-art coupled ocean-land-atmosphere models in which retrospective forecast have been initialized each month of 1982-2009, and six of the nine models continue to make forecasts in real-time. Our analysis focuses on the retrospective forecasts in the tropical Pacific, and we assess the forecast quality in terms of SSTA and rainfall anomalies. This large ensemble also allows us to assess whether the NMME models detect predictability differences associated with the variability in the longitude of maximum SSTA. Here we propose two simple measures of predictability that can be applied on a forecast-by-forecast case basis. The first predictability metric is a signal-to-noise ratio where we define the signal as the square of the ensemble mean anomaly and we define the noise as the deviation about the signal. The second predictability metric measures how well correlated the individual ensemble members are to the ensemble mean. Vasu Misra -- Global Seasonal Climate Predictability in a Two Tiered Forecast System vis-a-vis NMME -- In this talk we examine the seasonal climate predictability for summer and winter starts from the Florida Climate Institute Seasonal Hindcasts at 50km (FISH50) and compare them with the National Multi-Model Ensemble Project (NMME) models. FISH50 is a two-tier forecast which takes the multi-model SST forecast from two of the NMME models (CCSM3 and CFSv2) and applies a bias correction to it, with no implied cheating. In other words, the observed climatology used for the bias correction of the SST does not include the hindcast period of the NMME (viz., 1982-present). We will focus on the seasonal prediction of global precipitation and surface temperature and also show some results specifically focused on the Asian summer monsoon. Kathy Pegion -- Forecasting Forecast Skill: Can An ENSO-Conditional Skill Mask Improve Seasonal Predictions? -- The contribution of the CFSv2 forecast to the Climate Prediction Center’s official seasonal forecast products is dependent on the month and lead-time dependent skill of the retrospective forecasts. If the skill for a given lead-time and month is less than 0.3 in the retrospective forecasts, the model is considered not skillful at that location and the model forecast is not used in making the official forecast. It would be beneficial to have a skill mask that is conditional on a priori identification of times when the skill is expected to be higher. For seasonal prediction, it is likely that such a skill mask is dependent on the phase of the El Nino Southern Oscillation (ENSO), although other large-scale modes of climate variability may also play a role. We investigate the potential for improving the skill of seasonal predictions by exploring the relationship between the Nino3.4 index and perfect model skill of the CFSv2 re-forecasts for temperature over the continental United States with the goal of developing a conditional skill mask for U.S. seasonal temperature and precipitation forecasts. Duane Waliser -- Intraseasonal Variability Hindcast Experiment (ISVHE) -- Intraseasonal Variability (ISV) serves as a crucial source of predictability, providing a bridge between the predictability of weather and seasonal climate prediction. Notable components of ISV include the well-known eastward propagating Madden Julian Oscillation (MJO), which impacts a wide variety of weather and climate phenomena, and the northward propagating intraseasonal oscillations that strongly dictate the onset and breaks of the Asian summer monsoon. To better quantify the predictability of ISV and exploit it for operational forecasts, the ISV Hindcast Experiment (ISHVE) was launched jointly in 2009 by the CLIVAR Asian-Australian Monsoon Panel (AAMP), the WCRP-WWRP/THORPEX YOTC MJO Task Force, and the Scientific Steering Committee of Asian Monsoon Year (AMY). The ISVHE project is the first attempt to produce a long-term hindcast dataset that specifically targets the needs and themes associated with intraseaonal prediction research. The objectives of the ISVHE are to: 1) better understand the physical basis for intraseasonal prediction and estimate the potential and practical predictability of ISV, including the MJO, in a multi-model framework, and 2) develop optimal strategies for a multi-model ensemble ISV prediction system, including optimal initialization schemes and quantification of prediction skill with forecast metrics under operational conditions. This presentation will briefly summarize the results of the ISVHE to date and use the venue to describe the experiment and encourage additional utilization of this unique and valuable multi-model experiment. ISVHE has been supported by Asia-Pacific Economic Cooperation Climate Center and the NOAA Climate Test Bed.
The stresses of not knowing where the money for college is going to come from can add even more burden to an already stressed existence. That is why the Dale E. Fridell Scholarship would be such an incredible blessing to me. By helping to ease the burden of tuition expenses I will be better equipped to deal with the other stresses of college life. By helping me to balance the load, I will be more able to pursue the demanding goals that I have set for myself and for my future. It has been said that the pen is mightier than the sword, and I am a firm believer in that. Through writing one has the power to help a person overcome obstacles, and has the power to influence people to make a difference through inspirational stories of dedication and selflessness. Words carry with them all those powers and more, and it is there that I intend to make a difference. There are many ways that people can influence, inform, or entertain, but few of them are as widely under appreciated as writing. Everyday we read hundreds or thousands of words, in both our work lives and our free time, for both information and entertainment. Without that valuable source the world we know would be a far different place, one not even recognizable to us today. All of my life my strength has been in my words. From a very young age I knew that my word was my bond; it was the only thing I had complete control over. I also realized that the way things were said or written could have a dramatic and lasting effect on the people receiving them. This perception practically demanded that I make an effort to pursue an education in the English language and literature. I would spend hours and hours...
As I pondered this past week what I might post here for Arts in Education Week, I thought about something one of my mentors John Michael once said, “What we are today is determined to a great extent by what we were yesterday.” John felt strongly that the better we understand the past, the better qualified we are to perceive the present and possible to shape the future. He instilled in his many graduate students, myself included, an appreciation for those who have contributed to the advancement of the field of art education over the years and who have worked to elevate its status in the general school curriculum. So, as a way of acknowledging those who have helped shaped what Art Education is today, I would like to share the following 20 quotes that I gleamed from art education literature sitting on my shelves. This is certainly not a definitive inventory, it’s simply intended to highlight some of the aims, concepts and voices that has defined art education over the years. Effective progress in composition (art) depends upon working with an organized and definite series of exercises, building one experience upon another, calling for cultivated judgment to discern and decide upon finer and finer relations. Arthur Wesley Dow Admitting that the teaching of art should be the strengthening of the sense of beauty, there are certain by-products which must not be obscured. These by-products are an interest in order and the habit of using the imagination. Art in the School (1924) From the standpoint of the school curriculum, art should serve to motivate and enrich the entire curriculum, and it should contribute generously to the integration of school experience. The Integrated School Art Program (1939) Generally speaking, the activity of self-expression cannot be taught. Any application of an external standard, whether of technique or form, immediately induces inhibitions, and frustrates the whole aim. The role of the teacher is that of attendant, guide, inspirer, psychic midwife. Education Through Art (1943) An art training which is presented through home problems brings art very near to everyone and makes it a part of everyday living. Mable Russell & Elsie Wilson Gwynne Art Education for Daily Living (1946) It is true that art does not help many of us to earn a living, but it is also true that art can help all of us to live more happily while we are earning a living. Florence W. Nicholas, et al. Art for Young America (1946) Art education that recognizes artistic activity as a general attribute of human nature and that aims at the unfolding and developing of man’s latent creative abilities will then contribute its share to the great task which faces all of us, the resurrection of a humanized world. The Unfolding of Artistic Activity (1948) I am submitting the hypothesis that art, or the arts, adequately taught, are perhaps in our day the most central and important means of education. Art Education Today (1951) The concepts from the behavior sciences, cultural history, and philosophy suggest a new frame of reference for teaching through the arts. A Foundation for Art Education (1955) We have to regard it as our sacred responsibility to unfold and develop each individual’s creative ability as dim as the spark may be and kindle it to whatever flame it may conceivably develop. Creative and Mental Growth (3rd Ed, 1957) A philosophy of art education for our time, therefore, must take cognizance of social forces and beliefs in addition to marshalling its own special claims and interests if it is to be educationally effective and of utmost worth for the individual and for contemporary society. Italo L. De Francesco Art Education, Its Means and Ends (1958) Leading art educators believe that creative expression is the best basis for art education because it is the method that does the most to develop the child as an individual and as a member of a democratic society. Teaching Art to Children (1963) To make art education more effective, the teacher must recognize other kinds of learning outside of school that may be in contrast to goals for education in school. June King McFee Preparation for Art (1970) Simply providing art materials to children so that they may occupy themselves on a rainy day or discovering and training those few children who show artistic promise does not constitute art education. Approaches to Art in Education (1978) We believe that the natural core that can integrate work in a school is an attitude, not a subject area. We define that attitude as curiosity, aided by increasing perceptual awareness of and sensitivity to the world around us. The development of such an attitude is a natural by-product of a strong art program. Elaine Cohen & Ruth Gainer Art, Another Language for Learning (1995) Mining artifacts and performance for meaning and creating culturally aware expressions interculturally and cross-culturally should be the point of postmodern art education. Toward a Postmodern Approach to Art Education (1997) Philosophical inquiry is not something separate from the day-to-day experiences in the artroom; rather it is an integral part of being a reflective, involved student of art, who thereby learns skills that can enhance the overall character of life. Thinking Through Aesthetics (1997) A major aim of arts education is to promote the child’s ability to develop his or her mind through the experience that the creation or perception of expressive form makes possible. The Arts and the Creation of Mind (2002) Just as physics education is about the movements of bicycles as much as the movements of planets, art education is about the objects, meanings, purposes, and functions of the visual arts students make and see every day as much as the art in museums. Teaching Visual Culture (2003) . . . art education’s humanistic mission can better be fulfilled in the promotion of change, and the quest for social justice. Flavia M.C. Bastos Art Education Journal (2010) Be sure to check out these other art education blogs that have Arts in Education Week postings: The Teaching Palette Wonder Brooks Extraordinaire Mrs. Gillespie’s Blog The Carrot Revolution More Art 24/7
Bryn Mawr Classical Review 2008.06.36 R. Drew Griffith, Robert B. Marks, A Funny Thing Happened on the Way to the Agora: Ancient Greek and Roman Humour. Kingston: Legacy Books Press, 2007. Pp. 234. ISBN 978-0-9784652-0-9. $32.95 (pb). Reviewed by Timothy Saunders, University of Tromsø (firstname.lastname@example.org) Word count: 2671 words In this witty and winning book, R. Drew Griffith and Robert B. Marks have pulled off the remarkable, and strangely pioneering, feat of making ancient humour seem, well, actually rather humorous. Engagingly written and greatly enlivened by a wealth of clear and entertaining illustrations, A Funny Thing Happened on the Way to the Agora is a book to be enjoyed and chuckled over in the library, the classroom, the armchair and the bathtub alike (to mention just four of the venues that spring immediately to mind) and should appeal to anyone with either a professional or a general interest in antiquity, humour or simply in having a jolly good read. With the evident aim of being as inclusive as possible, the authors quote generously from a wide range of sources and translate all passages in a style that is nothing if not modern and lively (I don't recall too many translations of the Bible, for instance, that represent Sarah reacting to the news that she and her senior citizen husband Abraham are soon to have a child with the exclamation 'Yeah right!' ). As the subtitle suggests, the focus of this book is on humour. Humour is, of course, a far broader category than, say, comedy and the authors take full advantage of this as they encourage us to find examples of it not only in such comic playwrights as Aristophanes and Plautus (both of whom, and especially the former, are nonetheless reasonably well represented), or even in such evidently 'comic' texts as the Homeric Battle of Frogs and Mice, Attic satyr plays, Roman satire, Apuleius' Metamorphoses and Petronius' Satyricon; but also in epics such as Homer's Iliad and Odyssey, in tragedies such as Aeschylus' Prometheus Bound and Euripides' Orestes, in philosophical dialogues such as Plato's, in public speeches such as Cicero's (see, for instance, p. 37, where he is said to represent the prosecution's account as a kind of 'Keystone Kops adventure') and in the, often vindictive, lyrics of a poet like Catullus. In order to explicate and, to some degree, contextualise these Ancient Greek and Roman examples, moreover, the authors employ a broadly conceived comparative approach, discussing the role and presence of humour in a wide variety of other times and places, which range from Ancient Egypt, Mesopotamia, the Hebrew Bible and the 'German barbarians' (there is a fine coda, entitled 'A Funny Thing Happened on the Way to the Longship', that surveys instances of wit in Anglo-Saxon and Norse culture) all the way up to such staple modern fare as The Simpsons, South Park and American Pie. Sharing elbow-room at this veritable feast of material, meanwhile, is an equally impressive roster of theorists, among whom one is just as likely to bump into the likes of St. Augustine, Charles Darwin, Mary Douglas, Freud, Hobbes, Kant and Pirandello, as one is to squeeze the grape with those ancient analysts of wit, Plato and Aristotle. As this array of literary and theoretical sources suggests, for all its light-heartedness and charm, this book is grounded in a depth and breadth of learning that should cause even the most unforgiving of lexicographers to experience an occasional twitch at the edges of the mouth. Particularly helpful, I found, was the deft use of etymology to explain and explore such key terms as 'character', 'hilarity', 'hysteria', 'jokes', 'sarcasm' and 'humour' itself. While the largely synchronic view of humour adopted in the book does at times lead to a, perhaps inevitable, tendency to oversimplify certain historical and cultural differences (some examples of which I shall give below), taken as a whole it unquestionably succeeds in giving a strong sense of the scope, vitality and, indeed, continued currency of this topic, as well as its enormous value and suitability as a subject of academic research. Towards the beginning of the first chapter, entitled 'What is Humour?', the authors argue that, for the most part, 'Greeks and Romans would call humour the ridiculous--that which makes you laugh' (8). This definition would seem to inform their own understanding of the concept as well and it is this, perhaps, that helps account for the book's welcome breadth. Taking their cue from the etymology of the word, they illustrate how 'humour' was in the first instance a medical term that served to describe the distribution of 'humours' within any given person (8). From this observation, they subsequently derive one of their many valuable assertions--that humour is not simply cerebral, but physiological too (18-19), i.e. it involves the body as well as often being about the body. At the same time, they also observe that the use of the word 'humorous' to describe somebody 'weird and funny' is a distinctly modern development (7). Indeed, it is through the different ways in which the ancients and the moderns describe what constitutes a 'humorous situation', they continue, that we can begin to discern certain key differences between ancient and modern senses of humour. 'It is very interesting,' they suggest, 'that English describes a humorous situation from the perspective of the individual, "he or she is humorous, i.e. has an imbalance of humours," while the ancients describe it from the perspective of society, "he or she is ridiculous, i.e. we laugh at him or her"' (8). This particular distinction between ancient and modern senses of humour re-emerges in a number of guises throughout the book and finds perhaps its most important expression in the claim that '[i]n modern humour, comedy lies in the situation. In ancient humour, it lay in the individual' (65). While there is an admirable clarity about the manner in which this differentiation is expressed, one wonders whether it can in practice always be quite so clearly sustained. Does the humour of Mr Bean, for instance, lie primarily in the situations in which he finds himself or in the character and behaviour of Mr Bean himself? Admittedly, the authors do seek to explain the differences between these two kinds of humour by positing an intriguing, and largely plausible, equation between humour and the social environment in which it appears, but their actual accounts of those societies remains far too generalised to render this explanation either entirely convincing or sufficiently complete. Here, for instance, is how they distinguish the wit of the Ancient Greeks and Romans on the one hand from that of their German counterparts on the other: Greek and Roman humour was based on character, or more specifically, people acting in ways that go against the norms of society. Laughter is, to the Greeks and Romans, a corrective. This is perfectly reasonable in a culture where the society is all-important. However, the Germans did not have such a society, suggesting that the humour is very unlikely to be character based. Instead, it is more likely to be situational (195). Quite apart from anything else, passages such as this lead one to wonder whether Margaret Thatcher's famous remark that 'there is no such thing as society; there are individual men and women' was not so much a statement of political faith, or even (as some might be tempted to allege) simply a joke, but rather a bid to re-instantiate one comic tradition over and above another. At any given moment and in any given place, that is, different types of humour, like different visions of society, are just as likely to share the same billing as they are to play to a different kind of house. Indeed, perhaps the main criticism one could level at this book is its lack of situational and historical context. For even though the very first chapter begins with the observation that '[t]here are many types of humour in the world' (5) and even though other remarks of this kind recur throughout, taken as a whole and in this respect at least, like the English and Spanish national football teams, it tends to talk a better game than it actually plays. In particular, it is surprising how little attempt is made to distinguish Roman humour from its Greek relative. Only about 25 pages from the end, for instance, at the beginning of chapter XII, do the authors admit that they have been using the term 'Classical' 'to refer to both Greek and Roman culture, suggesting that the two were the same, or at least similar enough to warrant using the same word for each' and confess that '[i]n many cases, there are similarities, but this really is an oversimplification' (185). They do then proceed to list a few distinctions, but these are neither entirely persuasive (can we really contrast the 'oral' tradition of the Greeks with the 'literate' culture of the Romans and argue from this that only the latter made any significant use of word-play? ), nor do they address any of the more obvious points of contact and contrast between the wit of the two cultures. They observe on a number of occasions, for instance--and not least in their closing remarks to chapters VI, VII and VIII--that women frequently played a different role in comedy from men and that this reflected the different roles they held in society more generally. What they do not do, however, is take any account of how Greek and Roman women actually lived rather different lives from one another and, as such, they miss the opportunity to discuss how the playing out of gender types might similarly have differed in the comic traditions of Greece and Rome. Likewise, it seems somewhat odd that they do not use Plautus as an example of how Greek humour was--and perhaps needed to be--adapted for the Roman stage. (Terence, incidentally, receives hardly any mention at all). The willingness of the authors to express themselves in such clear and synoptic terms, however, does nonetheless bring with it a number of advantages in return. Not the least of these are that it makes their account both accessible and thought-provoking in a way that overly nuanced readings might not and it also provides the book with much of its clear structure. Their observation that ancient humour lay primarily in the individual and in his--or, within a more limited scope, her--relationship to society, for instance, perhaps explains why Part II surveys in turn the various character types who are the common objects and vehicles of ancient humour, ranging from parasites, flatterers and quacks, to suckers, ironists, gluttons, shrews, cuckolds and adulterers. Indeed, particularly valuable in this regard--and especially conducive to the overall coherence of the book--are the numerous ways in which the authors illustrate how some of these character types give rise to others. A good example of this can be found on page 114, where they argue that '[t]hrough trying to get something for nothing, and thereby preventing everyone from getting his due, a man becomes a flatterer, causing a chain-reaction that brings into being the buffoon, the quack and the ironist.' Perhaps the primary value of this book, though, lies in its ability to find examples of ancient humour in a variety of different places and, by implication, in its encouragement to us to try to do the same. (For some examples, see again my second paragraph above.) What it does not do, however, is indicate how we are to try to understand or respond to such instances of humour when they appear in contexts one might not immediately expect. When, for instance, the authors cite a rather striking messenger speech from Euripides' Orestes--and certainly one that has an unquestionable 'comic potential'--they rather disappointingly follow this up with the, admittedly honest, remark that '[w]e do not know for sure how comic Euripides intends this slave to be' (91) and simply leave it at that. Likewise, having engagingly observed that 'the title-character of Aeschylus' Prometheus Bound... spends lines 561-912 of the play nailed to a rock listening to the whining ramblings of Io, the talking cow,' they at once proceed to make the even more winning admission, '[c]all us heartless, but we find this pretty funny' (94). It is a shame that on neither occasion does this lead into a discussion either of why these examples might now seem funny to us, but not, perhaps, to anyone in antiquity, or--and this surely is more pertinent still--of how such insertions of humour at such unexpected moments might tell us something about the destabilising and often unpredictable potential of humour itself--whether for a playwright, an audience, a work of literature, a society or a cultural critic. While they do indeed make the point on numerous occasions that humour can often be abusive and even aggressive (see esp. pp. 9-10), for the most part they leave aside the question of how uncomfortable it can be to those who are not directly in its line of fire as well. Thus, in their otherwise wholly useful account of how Odysseus' lashing of the deformed plebeian Thersites in Book 2 of the Iliad constitutes an example of how people like to laugh at another's misfortunes (11-12), they do not really say enough about how we now (and perhaps ancient audiences before us) might still feel somewhat uncomfortable when confronted with this kind of mirth. This, though, is perhaps to ask for a different kind of book, and it should in no way be allowed to detract from what the authors certainly have achieved in the book they have produced. For written as it is in clear and eloquent prose, and with a verve and wit uniquely its own, A Funny Thing Happened on the Way to the Agora offers an enjoyable and always thought-provoking tour through the multifarious texts, characters, gaffes and jokes that seem to have made people laugh in the ancient world and that still, when choreographed by such vivacious and genial compères as these, have the capacity to continue to do so in our own. This book is far more than just an introduction to the topic of ancient humour, but I can nonetheless think of no better way of introducing fellow academics, students or anyone of any stamp or humour whatsoever to this compelling, entertaining and, yes, vital subject. In fact, it's so good, it's the sort of book you could even consider giving to your step-mother on her wedding day. At just over 200 pages in length and with so much to divert and delight her along the way, it should be able to keep her from the herbal garden for the first few hours of your acquaintance at least. The volume is handsomely produced and at $32.95 should be within the reach of most academics, students and members of the public alike (not to mention those aforementioned step-children as well). The typographical errors are relatively few and never significant, but I include a few examples in the list below in the hope that it might convince the authors and all concerned that I have not entirely invented everything I have said above. Nevertheless, in response to their claim that anyone who points out such errors 'will be hunted down and ... thanked. Yes. That's it. Thanked' (211), I think it worth pointing out that they would need to travel all the way to the land of the long ships to which they themselves so judiciously refer and that they would find me there surrounded by friends who are all at least 7 feet tall, who consume prodigious quantities of brown cheese and who are by no means averse to what Beowulf so coyly describes as 'a sharing of hands' (197). With such formalities dispensed, here is a selection of errata: 'the' instead of 'they' (45);'like' instead of 'lie [down]' (140); 'in' instead of 'is' (152, n.3); 'cloud-gather' instead of 'cloud-gathering [Zeus]' (157); 'recommend' instead of 'recommended' (157, n. 19); there's a rogue comma after '49-60' and an equally suspect 'l' in 'biblliography' (176 n. 19); while something seems to have gone terribly wrong on p. 182, n. 23: 'The Inhterpretation of Nestor's Cup Resonsidered.' There are a couple of others besides, but since my 'friends' seem to have disappeared off on holiday all of a sudden...
Ruffed Grouse - Bonasa umbellus FWP Conservation Tier Sexes similar; the long, fan-shaped tail has a broad black band just below the tip (in females, the band is often broken in the central tail feathers). Both sexes have black neck ruffs (less conspicuous in females), crested heads, and brownish bodies. Males have a small orange-red eye comb. Feathering reaches about halfway down the legs; in winter, birds develop conspicuous fringes (pectinations) on the sides of their toes. Two color phases exist: red (or brown) and gray. Adult males and females range from 16 to 19 inches in length; adult males range from 21 to 23 ounces in weight, and adult females, 18 to 21 ounces. No other grouse has the fan-shaped, distinctively banded tail and black ruff. Summary of Observations Submitted for Montana Number of Observations: (Click on the following maps and charts to see full sized version) Map Help and Descriptions (direct evidence "B") (indirect evidence "b") No evidence of Breeding (regular observations "W") (at least one obs. "w") (Records associated with a range of dates are excluded from time charts) Ruffed Grouse are found in dense, brushy, mixed-conifer and deciduous tree cover, often along stream bottoms. In the Bozeman area they are mostly in deciduous thickets in the foothills and mountains; also in riparian areas to the lowest elevation (Skaar 1969). Mussehl (1971) says they inhabit the denser cover of mixed conifer and deciduous trees and brush, and are often along stream bottoms. Ecological Systems Associated with this Species - Details on Creation and Suggested Uses and Limitations How Associations Were Made We associated the use and habitat quality (high, medium, or low) of each of the 82 ecological systems mapped in Montana for vertebrate animal species that regularly breed, overwinter, or migrate through the state by: - Using personal observations and reviewing literature that summarize the breeding, overwintering, or migratory habitat requirements of each species (Dobkin 1992, Hart et al. 1998, Hutto and Young 1999, Maxell 2000, Foresman 2001, Adams 2003, and Werner et al. 2004); - Evaluating structural characteristics and distribution of each ecological system relative to the species’ range and habitat requirements; - Examining the observation records for each species in the state-wide point database associated with each ecological system; - Calculating the percentage of observations associated with each ecological system relative to the percent of Montana covered by each ecological system to get a measure of “observations versus availability of habitat”. Species that breed in Montana were only evaluated for breeding habitat use, species that only overwinter in Montana were only evaluated for overwintering habitat use, and species that only migrate through Montana were only evaluated for migratory habitat use. In general, species were associated as using an ecological system if structural characteristics of used habitat documented in the literature were present in the ecological system or large numbers of point observations were associated with the ecological system. However, species were not associated with an ecological system if there was no support in the literature for use of structural characteristics in an ecological system, even if point observations were associated with that system. High, medium, and low habitat quality was assigned based on the degree to which the structural characteristics of an ecological system matched the preferred structural habitat characteristics for each species in the literature. The percentage of observations associated with each ecological system relative to the percent of Montana covered by each ecological system was also used to guide assignments of habitat quality. If you have any questions or comments on species associations with ecological systems, please contact Bryce Maxell at email@example.com or (406) 444-3655. Suggested Uses and Limitations Species associations with ecological systems should be used to generate potential lists of species that may occupy broader landscapes for the purposes of landscape-level planning. These potential lists of species should not be used in place of documented occurrences of species (this information can be requested at: http://mtnhp.org/requests/default.asp ) or systematic surveys for species and evaluations of habitat at a local site level by trained biologists. Users of this information should be aware that the land cover data used to generate species associations is based on imagery from the late 1990s and early 2000s and was only intended to be used at broader landscape scales. Land cover mapping accuracy is particularly problematic when the systems occur as small patches or where the land cover types have been altered over the past decade. Thus, particular caution should be used when using the associations in assessments of smaller areas (e.g., evaluations of public land survey sections). Finally, although a species may be associated with a particular ecological system within its known geographic range, portions of that ecological system may occur outside of the species’ known geographic range. - Adams, R.A. 2003. Bats of the Rocky Mountain West; natural history, ecology, and conservation. Boulder, CO: University Press of Colorado. 289 p. - Dobkin, D. S. 1992. Neotropical migrant land birds in the Northern Rockies and Great Plains. USDA Forest Service, Northern Region. Publication No. R1-93-34. Missoula, MT. - Foresman, K.R. 2001. The wild mammals of Montana. Special Publication No. 12. Lawrence, KS: The American Society of Mammalogists. 278 p. - Hart, M.M., W.A. Williams, P.C. Thornton, K.P. McLaughlin, C.M. Tobalske, B.A. Maxell, D.P. Hendricks, C.R. Peterson, and R.L. Redmond. 1998. Montana atlas of terrestrial vertebrates. Montana Cooperative Wildlife Research Unit, University of Montana, Missoula, MT. 1302 p. - Hutto, R.L. and J.S. Young. 1999. Habitat relationships of landbirds in the Northern Region, USDA Forest Service, Rocky Mountain Research Station RMRS-GTR-32. 72 p. - Maxell, B.A. 2000. Management of Montana’s amphibians: a review of factors that may present a risk to population viability and accounts on the identification, distribution, taxonomy, habitat use, natural history, and the status and conservation of individual species. Report to U.S. Forest Service Region 1. Missoula, MT: Wildlife Biology Program, University of Montana. 161 p. - Werner, J.K., B.A. Maxell, P. Hendricks, and D. Flath. 2004. Amphibians and reptiles of Montana. Missoula, MT: Mountain Press Publishing Company. 262 p. - Commonly Associated with these Ecological Systems Forest and Woodland Systems Shrubland, Steppe and Savanna Systems Wetland and Riparian Systems - Occasionally Associated with these Ecological Systems Forest and Woodland Systems In the winter they eat deciduous tree buds and shrubs. In summer, they subsist on a mixed diet of insects, green plants and berries, with young birds eating primarily insects (Mussehl 1971). Gray phase birds occur in Montana (Johnsgard 1986). Adult birds may spend most of their lives in less than two square miles of habitat. Males are generally found within one-half mile of their drumming logs (Mussehl 1971). Egg dates for the Fortine area are from May 1 to June 5; hatching dates are usually during June, but sometimes as late as July 10. Drumming has been heard in the Bozeman area as early as April 25 (Skaar 1969). - Additional ReferencesLegend: View WorldCat Record View Online Publication Do you know of a citation we're missing? - Aldrich, J. W. 1963. Geographic Distribution of American Tetraonidae. J. Wildl. Manage. 27:529-545. - American Ornithologists' Union. 1998. Check-list of North American birds. 7th edition. American Ornithologists' Union, Washington, D.C. 829 pp. - Anonymous. 1959. Ruffed grouse. Montana Wildlife. November. - Atwater, S., and J. Schnell, eds. 1989. Ruffed grouse. Stackpole Wildlife Series. 384 pp. - Brenner, F.J. 1989. The essentials of habitat. P. 311-326 in S. Atwater and S. Schnell, eds. Ruffed Grouse. The Wildlife Series, Stackpole Books, Harrisburg, PA. - Cade, B. S., and P. J. Sousa. 1985. Habitat suitability index models: ruffed grouse. U.S. Fish Wildl. Serv. Biol. Rep. 82(10.86). 31 pp. - Casey, D. 2000. Partners in Flight Draft Bird Conservation Plan Montana. Version 1.0. 287 pp. - Champlin, M. R. 1979. Structural characteristics of territorial male ruffed grouse (Bonasa umbellus) habitat in western Montana. MS Thesis, Univ. of Montana, Missoula. 159 pp. - Ehrlich, P., D. Dobkin, and D. Wheye. 1988. The birder’s handbook: a field guide to the natural history of North American birds. Simon and Schuster Inc. New York. 785 pp. - Gullion, G. 1989. The ruffed grouse. NorthWord. 144 pp. - Hungerford, K.E. 1951. Ruffed Grouse populations and cover use in northern Idaho. Transactions of the North American Wildlife and Natural Resources Conference 16(1951): 216-224. - Hutto, R. L. and J. S. Young. 1999. Habitat relationships of landbirds in the Northern Region, USDA Forest Service. General Technical Report RMRS-GTR-32. U. S. Department of Agriculture, Forest Service, and Rocky Mountain Research Station, Ogden, UT. 72 pp. - Johnsgard, P. A. 1973. Grouse and quail of North America. U. of Nebraska, Lincoln. 553 pp. - Johnsgard, P. A. 1992. Birds of the Rocky Mountains with particular reference to national parks in the northern Rocky Mountain region. Lincoln: University of Nebraska Press. xi + 504 pp. - Lehtimem, S. A. 1983. Movements and habitat use of ruffed grouse in the Bridger Mountains, Montana. M.S. thesis, Montana State University, Bozeman. 96 pp. - Lenard, S., J. Carlson, J. Ellis, C. Jones, and C. Tilly. 2003. P. D. Skaar's Montana Bird Distribution, 6th Edition. Montana Audubon: Helena, MT, 144 pp. - Marshall, W. H. 1946. Cover preferences, seasonal movements, and food habits of Richardson's grouse and ruffed grouse in Southern Idaho. Wilson Bull. 58:42-52. - Montana Bird Distribution Committee. 2012. P.D. Skaar's Montana bird distribution. 7th Edition. Montana Audubon, Helena, Montana. 208 pp. + foldout map. - Mussehl, T.W. P. Schladweiler, and R. Weckwerth. 1971. Forest Grouse. pp. 142-152 in T.W. Mussehl and F.W. Howell (eds.), Game Manaqement in Montana. Montana Department of Fish and Game, Helena. 238 pp. - Rusch, Donald H., Stephen Destefano, Michael C. Reynolds, and David Lauten. 2000. Ruffed Grouse (Bonasa umbellus). Species Account Number 515. The Birds of North America Online (A. Poole, Ed.). Ithaca, NY: Cornell Laboratory of Ornithology; Retrieved 3/25/2008 from The Birds of North America Online database - Scott, M. D., and S. A. Scott. 1991. Autumn foods of Ruffed Grouse in the Bridger Mountains, southcentral Montana. Northwest Science. - Scott, M. D., and S. A. Scott. 1991. Winter roosting habits of Ruffed Grouse in southcentral Montana. Acta Zool. Fenn. - Stearns-Roger Inc., 1975, Environmental baseline information of the Mount Vernon Region, Montana. January 31, 1975. - TVX Mineral Hill Mine, Amerikanuak, Inc., Gardiner, MT., 2002, Yearly summary of wildlife observation reports. 1990-2002 Letter reports. - U.S. Forest Service. 1991. Forest and rangeland birds of the United States: Natural history and habitat use. U.S. Department of Agriculture, Forest Service Agricultural Handbook 688. 625 pages. - USDI Fish and Wildlife Service., 1961, A Detailed report on fish and wildlife resources affected by McNamara Dam and Reservoir, Blackfoot River Project, Montana. June 1961. - Western Technology and Engineering, Inc., Helena, MT., 1989, Reconnaissance of the wildlife resources in the vicinity of the Kendall Venture Mine. January 1989. In Kendall Venture North Moccasin Project: Amendment to Operating Permit 00122, Fergus County, Montana. Vol. 2, App. A, Feb., 1989. - Zackheim, Karen, 1973?, Exhibit H: Wildlife Study. In Ash Grove Cement Co. files.
I'm developing a simple, 2D physics system to complement an entity/component game object framework. So far, I have implemented some basic, tutorial-level physics. An entity that is affected by physics must have two components: - Transform (translation, rotation, scale; may have parent transform) - Rigidbody (mass, list of forces) The physics engine currently uses Verlet integration to move entities - that is, velocity is derived from the current and previous positions of an entity, and is not explicitly stated anywhere. I would now like to start implementing some joints, starting with the basics and perhaps expanding as I grow more familiar with the concepts. The first joint I attempted to implement was extremely simple - the fixed joint, whereby two entities are 'fixed' together and their transforms may not change relative to each other. My approach was to make one entity an immovable child of the other - that is, to set the transform of A as a local transform relative to B and disable movement of A by passing all accumulated forces of the rigidbody of A to the parent, B. Already this seems hackish and inflexible and has issues with gravity (B ends up with two gravity forces acting on it) - I'm clearly heading in the wrong direction. I have searched for some literature on the subject but have only found either very basic tutorials that only cover what I've already done, or articles with advanced mathematical formulae that are difficult to follow or relate to simulation in any meaningful way. This leads to two questions: - How are fixed joints normally implemented? - Are there any good 2D physics simulation tutorials aimed at those without a degree in physics or mathematics?
LIVE: LIVE: WOLF PARADE (Cargo Records/Canada) SUPPORT BAND: The Gassies Aktuelles Album: “Expo 86” BAND ON STAGE: 20:30 EINTRITT: VVK €15.- /AK €17.- VORVERKAUFSTELLEN: JugendInfo Wien (1799) und Ö-Tickets What is it?! What ISN’T it? It’s two (2) things! It’s the name of Wolf Parade’s third LP, out June 29, 2010. And it’s the catchy name of the World’s Fair held in Vancouver, summer of 1986, where five young boys first became friends, just outside the Cars of the Future exhibit, and made a SECRET PACT (whoa!) to meet up in the early 2000s (wha?)—somewhere cool, like Africa or even the moon by then—to form a rock band! ROCK BAND! With guitars and guitar solos and synthesizers! They would call it Wolf Parade! What a bodacious name! It went like this: Li’l Spencer Krug, who was getting super into neon colors at the time, seemed to know even at that tender age that he would never be cool, and so volunteered to play piano, and let the other boys have the more radical instruments. “But if I play piano then I get to sing,” he said. “Okay, but I want to sing too,” said wee Dan Boeckner. “I’ll sing with you like Goose and Maverick in Top Gun. Top Gun rules.” And then, as if to enunciate his point, he pulled from his K-Way pouch a Lego fighter jet that was really well-assembled. “I get guitar!” exclaimed Dante DeCaro, the youngest. “No,” replied Dan, “I do. I get guitar.” “But I’ll get really good at it!” Dante yelled up. “Shut up,” said Dan, “You’re just little.” In the end it was decided both boys would get to play guitar, on the condition that between then and the 2000s, Dante would practice “lots of wicked solos.” The remaining two, Arlen Thompson and Hadji Bakara, used a nearby game of Whack-a-Future-Mole to decide who would make the better drummer. Strapping young Arlen won easily, and then just continued to lick his rocket pop with a devil-may-care attitude. But Hadji didn’t lose heart. “I’ll just do cool sounds with a computer,” he said. “Yeah, right,” replied everyone, “Music on a COMPUTER. As if you could ever even GET a computer.” Why was it made? WHY NOT! How was it made? It was made QUICKLY. The band started writing songs in November, 2009, and recorded and mixed them at Montreal’s Hotel2Tango, with Howard Bilerman, in late February and early March of 2010. “BANG IT OUT!” they said over and over, until it was done. Why such stress-ness for quickness? Because the first album, Apologies to the Queen Mary, made and released in 2005, took approximately 50 years to complete. You see, everything went real slow for the first one, because Dante DeCaro never showed up. He messed up the pact, screwed up the timing, and was still busy with some other band… Hot… Hot something. So the other four guys had to make due without him, and in the end it all worked out okay, but it took FOREVER. Then, finally, Dante showed up. They got him up to speed by playing some live shows, and then in the summer of 2007 the five little pact-makers got down to work on their second LP, At Mount Zoomer. However, forgetting that they weren’t SAVVY (smart), they decided to record and produce it themselves, in their own homemade studio, and consequently spent almost 100 years finishing it (100 YEARS!). So for this 3rd record, still (STILL!) on Sub Pop, Wolf Parade wanted to move fast. They made a plan: “If we take a one year hiatus, “ they said, “Then all our musical ideas will get crammed and swollen up in our brain-holders, so that when we start jamming again, after such a long time, we can LITERALLY just PUKE THE SONGS RIGHT OUT OF OUR HEADS, RIGHT ONTO OUR INSTRUMENTS!” Everyone clapped and nodded in agreement. “And also,” they said, “by that time, people will have ALMOST forgotten about us, so we’ll have no choice but to puke QUICKLY! HOORAY!” The groundwork had been laid. They took a year off and their brains swelled up. But there was one snag—Hadji Bakara’s brain got so big that he accidentally got accepted into the University of Chicago to pursue a DOCTORATE DEGREE in English Literature. What a DRAAAAAG. It turned out that he wouldn’t be able to play any shows with them later in the year, and so in the end, he didn’t play on the record, either. The remaining four were still able to make the fast record they wanted. In fact, everyone added a small synthesizer to what they already did and poked at it intermittently in attempts to make up for Hadji’s absence, and it seemed to work not bad. They decided to call the new record EXPO 86, in remembrance of the pact that all five of them had made so long ago, back when they were less than 10 years old, and to honor the promise’s short, but fun, realization. How does it sound?! Local man-about-town and reputable tastemaker “Saturday Night” Jones can be quoted as saying the new Wolf Parade record, “has a rad-ness,” and is also rumored to have told the band, “good job,” via email. And it’s not just him. Various stoppers-by at the studio, as well as staff, were heard contemplating how the record is, “sort of like INXS, but also, and mostly, not like INXS at all.” Engineer / producer Howard Bilerman says the band was, “well-organized.” Furthermore, one member of the band has talked at length about how the songs remind him of the cartoon musical notes that float playfully from speakers in Archie comics. Still unclear as to what this thing sounds like? Perhaps this completely true anecdote will help clarify: In an effort to realize a “music video for every song” sort of concept, the band sent rough mixes to eleven different video directors, all of whom varied in style, genre, and professional circle. Each director was given just one of the eleven songs on the album. However, upon receiving the various treatments back in response, the band was surprised to discover that, though every director was given a different song, each video contained a similar, if not identical scene. Each filmmaker wanted the bulk of the video to feature a red Ferrari speeding through a dry, sunny desert, creating great billows of dust, with the driver having his/her right hand on the wheel and the other hand jutting out the window giving the “middle finger” to the camera and the surrounding world. Sometimes the treatment would use a Corvette, not a Ferrari, maybe black, maybe red. Sometimes the driver would be a man, sometimes a woman, and sometimes a bottle of whisky would be lying on the passenger seat. But that’s about as far as the variations went. In each and every treatment the same three images dominated the screen: a fast car, the desert, and the middle finger. When the band asked each director why having such a scene in the video was so important, each one answered pretty much the same: “It’s what the music WANTS.” The band was perplexed, and disappointed, really, and in the end abandoned their “music video for every song” idea. They would, in all probability, just have a friend make a video for them a year or more after the record was released, as per usual. But hey, at least they had something to write in their bio.
- Eat Stop Eat - Weight Loss Program The Author, Brad Pilon is a bodybuilding athlete that was particularly interested in finding ways to lose body fat without damaging muscle. His experience in the diet supplement industry and his exposure to internationally renowned nutrition specialists allowed him to have access to high-tech physiology equipment which he used to run multiple body composition tests on top athletes and bodybuilders. Brad started studying intermittent fasting for his research during graduate school; Eat Stop Eat is a book based on over 240 peer-reviewed studies published in Medical Journals Worldwide. Many people get “sucked in” to the obsessive nutritional regimen that accompanies natural bodybuilding, which at some point results in the measuring, cooking and timing of meals to take over their lives entirely. Their social life, the amount of time they have available, the money they are spending on special ingredients and, ultimately their emotional state goes on a downward spiral. This has led a lot of people to wonder if there could possibly be an easier option, which is why the Eat Stop Eat diet is so attractive. How This Fasting Method Was Discovered The Author, Brad Pilon, started studying intermittent fasting for his research during graduate school. After obtaining his degree he started working for the diet supplement industry and traveled to Europe and Asia to meet with internationally renowned nutrition specialists. He designed some very popular supplements which are still being sold by the companies he worked for. Being a bodybuilding athlete himself, he was particularly interested in finding ways to lose body fat without damaging the muscle. His work in the industry allowed him to have access to high-tech physiology equipment which he used to run multiple body composition tests on top athletes and bodybuilders. He subsequently left the industry to pursue graduate studies in human biology and nutritional sciences. The book is based on over 240 peer-reviewed studies published in Medical Journals Worldwide. Does It Work? The results are scientifically proven. The scientific data and logic to support Brad Pilon’s work appears to be accurate. The author explains in his book that during a 24 hour fasting session there is an increase in growth hormone, insulin levels are low, cortisol levels are balanced and the adrenal glands function well. These factors put together, plus the reduction of the overall weekly calorie intake, make people lose body fat without losing muscle mass. There is also an increase in testosterone levels, which is helpful for muscle growth. Other reported benefits are that it: - Does not cause crankiness or low energy - Leaves you free to eat what you like on non-fasting days - Does not affect workouts negatively - Improves your metabolic rate - Increases growth hormone levels - Does not require the use of costly supplements, cleansers or laxatives Although the fasting plan is very simple, the author advises not to try intermittent fasting without having read the book, since this particular style of intermittent fasting is unique. Some of the publications and TV exposure which have given the program positive reviews: Independant Studies on Intermittent Fasting Research indicates that the medical profession does not view intermittent fasting in a bad light. It makes sense that intermittent fasting is not damaging to the body, as in the prehistoric age there was no guarnetee that food would be available at every four hour interval, and so it stands to reason that the human body is designed to accommodate for this. Some of the medical studies I used as a reference are: Caloric restriction and intermittent fasting: Two potential diets for successful brain aging and Dietary Factors, Hormesis and Health, found on the US National Library of Medicine Site, Cardioprotection by Intermittent Fasting in Rats on the American Heart Association Site and Effect of Ramadan intermittent fasting on aerobic and anaerobic performance and perception of fatigue in male elite judo athletes from the Journal of Strength and conditioning research. They all speak favourably of intermittent fasting. Eat stop Eat Reviews Many people reported online that they finally felt freed from the mental addiction to food. Bodybuilders who had followed strict ‘bodybuilder style nutrition’ for years, reported that it was a relief for them to do away with “such a difficult, restrictive, expensive and time consuming way of eating.” We did not find negative comments from people that had actually tried it, but only from people that were skeptical about fasting on the whole. Here are some intermittent fasting reviews from people that have tried it, taken from the company website: I am a physical therapist, and follow nutrition research closely. I purchased your e-book. Usually, I have been unimpressed with the literature/programs that I see, but when I read your book, the logic and science behind the program clicked for me. I really feel like this is something that I will do for the rest of my life. Since I have a family history of Diabetes I feel like that it might give me some protection against that. I’ve experienced a complete paradigm shift in my relationship to food. I know it sounds cliche, but I truly do no longer “live to eat,” but rather “eat to live.” It’s incredibly liberating. Hi Brad, I’ve been following the ESE lifestyle since it came out in 2007. I will not go back to my compulsive eating again. No more good & bad foods. No more thinking about food more than living life. Life is more than food & getting enough protein (loved the book by the way). That is what this ESE is about. The flexibility of fasting to control calories is just an added bonus. Dr. Geoff Dover - Gainesville, Florida I could not believe how much free time I have now on my fasting days. The biggest problem I had on my first day of fasting was not that I was too hungry, but I was too bored. Dr. Patrick Lowry I am now down to my target weight and eat almost freely on my eating days. It is a real pleasure to be able to eat almost anything that I want without guilt. My physical health has dramatically improved. I have not even had a cold for the last three years. Roland Fisher – Personal Trainer I’m a trainer and deal with more false information each day than I thought I ever would in a month. One such “truth” is that people just cannot gain muscle and lose fat at the same time. Not only is it possible, I’ve done it with people for years now, with the program it is easy, ridiculously easy. Reported Side Effects We were not able to find any peer-reviewed medical studies that reported negative side effects of intermittent fasting. The main negative aspect of the system depends on your goal in terms of build. This kind of eating regimen appears to promote a lean build and defined muscles, and is not ideal for those looking for a big, bulky build. See Brad Pilon’s photo to get a better idea of the proposed build. Some people have reported mild to medium strength headaches during the fasting days and this could have something to do with the level of accumulated toxins in the fatty tissue. Irritability has been reported and also bad breath. Another negative aspect is that instead of eating normally during the rest of the week, people might binge and this is not healthy. On the whole, in our opinion, Brad Pilon tends to brush off any physical or psychological side effects of the initial fasting days a little too easily, probably because over the years his body has become accustomed to fasting. It is fair to say that people might experience some initial reaction but that within a few weeks the body will adapt. Younger people will probably adapt more easily than older people, but once the body has ‘learned’ how to handle intermittent fasting, then this eating regimen is reportedly safe. Pdf Download – How and Where to Buy A new scam on the internet consists of creating totally false copies of popular e-books and selling them at a reduced price (or even giving them for free in exchange for your e-mail address). We strongly recommend that you to use our link to visit the official Eat stop Eat Website, – remember that this is the only reliable and truthful program, and the only place where the 100% money back guarantee if you are not totally satisfied is valid. You pay an initial deposit of $9.99 for a three day trial period and pay the rest 3 days later, only of you like it. The download is immediate. Seeing as intermittent fasting is backed by third party National Medical Institutions, there are many endorsements for the system and few negative side effects are reported, and considering that people who have actually tried it have obtained excellent results, we honestly feel this product can be safely recommended. Already an Eat Stop Eater? We want to know your experience with the Eat Stop Eat; Is it value for money? Did it work quickly? How dififcult is it to follow? Please share your experience; use the rating stars below and give us a small description of your experience with the product.
Huntington, Ind.—Dr. Todd Martin will finish Huntington University’s Forester Lecture Series this semester at 7 p.m. April 27 with a topic titled, “Race, Gender, Feminism and the Case of Edwidge Danticat.” The lecture will take place in the Zurcher Auditorium of the Merillat Centre for the Arts. Martin is a professor of English at Huntington University. He teaches courses in 19th and 20th century British and American literature. He has published works on a variety of authors, including E. E. Cummings, John Barth and Clyde Edgerton. His recent interests lie in postcolonial literature, particularly the works of Haitian-American author, Edwidge Danticat. During his lecture, Martin will explore some of the stereotypes of feminism and some of the limitations of a strictly “Western” feminism. He will then conclude that in the right context feminism can and does promote equality for all. Huntington University presents the Forester Lecture Series each semester. The lectures are designed to bring interesting individuals and topics to the attention of students and the regional community. The Forester Lecture Series is free and open to the public. The Forester Lecture Series is coordinated by Dr. Jeff Webb, professor of history at Huntington University. For more information, contact Webb at (260) 359-4243.
1320 Shockingly Different Abidemi talks about how being from Nigeria made her different and interesting at the same time. Jeremy: So you were 12 when you came to Canada. Abidemi: That’s right. Jeremy: Do you remember anything that was either really similar or really different from how teachers taught or from the classroom experience? Were they more or less the same or were they shockingly different? Abidemi: Actually, I think they were different in a lot of ways. For some reason, I had finished my grade 6, which is like primary 6; they called it in Nigeria, which is the end of high school—no, sorry. The end of elementary school in Nigeria. So when I came to Canada, they put me into grade 7 thinking it’s the next level. But my level was higher so they put me into grade 8 after that. So I got to skip a grade, which was really great. But I remember in terms of the way of thinking; in my English literature class, we had a conversation and we had to finish a story. And it was like, “Suddenly, something appeared in the sky. What is it?” And all my classmates were, “It’s a UFO.” For me, I’d never heard of a UFO. So they were like it’s a UFO. It makes somebody disappear, it picks up somebody, and one of their classmate and another person disappears. But in my essay, I’m like—it was just weird. I had a totally different way of thinking and processing things. And that really surprised my teachers because when they wrote my composition, they compared it to the rest of the class, to my classmates and they were like, “Wow, this is interesting that you’re the same age and we’re all speaking the same language, but the way we view things is very different.” And I guess, to me as well, it was my first exposure to cultural differences. And then after that, many years later, coming to Japan and being different again, in a different setting, it made me think back to that time thinking, wow, you can’t always expect the same things. Differences come in weird places sometimes. Jeremy: I see. Abidemi: So yeah, that’s one thing I remember. But a lot of things were the same. We are the same, and yeah, different. Jeremy: So Abidemi, just in terms of sort of the simple things in life, when you came to Canada, were there any foods or drinks that you were particularly fond of right away or thought were particularly strange? Abidemi: Hmm, very good question. Food, a lot of food was all right, right off the bat, like we didn’t have any difficulties with that. But one thing I do remember was nacho chips. We were not used to cheese, the taste of cheese. So my sisters and I, what we would do is we would buy nacho chips, like, Doritos—I don’t know if everyone knows that—and we would wash it because the cheesy taste was strange. So we would wash it before eating it and then we would eat it. And I have some friends who will just stare at us, like, “What’s the point? Why would you buy that flavor of chips? That’s the whole point, to taste that.” But we were like, “No, we can’t eat this.” But eventually now, I love Doritos. I have grown accustomed to the taste. Jeremy: You probably made it healthier though. Abidemi: That’s true. End of Transcript Learn vocabulary from the lesson below. Were they shockingly different? Something shockingly different surprises you greatly. It shocks you. Notice the following: - London can be shockingly expensive. - Shockingly, the pub was closed on Friday night. Differences come in weird places sometimes. Here, weird means unexpected and different. Notice the following: - The Internet has lots of weird information. - The downtown area can be a weird place. In terms of the simple things in life, what was different? The simple things in life are things people do every day like eating, getting around, etc. Notice the following: - Food is one of the simple things in life. - We often overlook the simple things in life. Right off the bat, we didn’t have any difficulties. Right off the bat means at the beginning. Notice the following: - At work, right off the bat, we had troubles. - Yesterday, right off the bat I was in a bad mood. I have grown accustomed to the taste. To grown accustomed to means to get used to. Notice the following: - I have grown accustomed to eating raw fish. - She is now accustomed to using chopsticks. Answer these questions related lesson.
Thursday, April 27, 2006 Mark Twain, The Innocents Abroad , chapter 31: After browsing among the stately ruins of Rome, of Baiae, of Pompeii, and after glancing down the long marble ranks of battered and nameless imperial heads that stretch down the corridors of the Vatican, one thing strikes me with a force it never had before: the unsubstantial, unlasting character of fame. Men lived long lives, in the olden time, and struggled feverishly through them, toiling like slaves, in oratory, in generalship, or in literature, and then laid them down and died, happy in the possession of an enduring history and a deathless name. Well, twenty little centuries flutter away, and what is left of these things? A crazy inscription on a block of stone, which snuffy antiquaries bother over and tangle up and make nothing out of but a bare name (which they spell wrong)--no history, no tradition, no poetry--nothing that can give it even a passing interest. What may be left of General Grant's great name forty centuries hence? This--in the Encyclopedia for A. D. 5868, possibly: "URIAH S. (or Z.) GRAUNT--popular poet of ancient times in the Aztec provinces of the United States of British America. Some authors say flourished about A. D. 742; but the learned Ah-ah Foo-foo states that he was a cotemporary of Scharkspyre, the English poet, and flourished about A. D. 1328, some three centuries after the Trojan war instead of before it. He wrote 'Rock me to Sleep, Mother.'"These thoughts sadden me. I will to bed.
6. How do you analyze these prints? One of the prints in the series is called The Know-it All which depicts a woman reclining, reading a book. The positioning of the body is interesting here because shes shown lying down with her head propped up with a book in front of her. And the fact that shes reading a book is reflective of the fact that Japans urban areas are becoming increasingly literate. Higher status women would be literate and be able to enjoy the print culture. This woman is depicted negative in some ways, not completely. Shes reading a book called the Ehon taik-ki, which is a military tale, one of the common genres of popular literature during the time. The commentary depicts a woman who becomes engrossed in matters that the artist views as being irrelevant to her life and neglects household affairs, losing her sense of discretion and propriety. So the traditional responsibilities of a woman are described here as devotion to parents, devoting ourselves to the exchange of letters, needlework, and so on. These are conveyed as the right responsibilities of the woman, yet she is abandoning these in her interest in other things. And yet her cleverness allows her to disguise her neglect of these other duties. Within both these prints and early modern Japanese literature in general, theres the strong assumption that people are going to get these allusions, and once you call the allusion to mind, then everybody knows what it is, and they know all the implications of it. Thats what makes reading these rather difficult, because we dont understand exactly where the allusions come from and what the message of those allusions would be to this contemporary audience. Therere two prints which illustrate this point, one of which is this Know-it All print. Its a mass-produced book that was read widely. The fact that the artist would assume that the viewer would be familiar with the book illustrates the shared set of common reference points. The print on the Wanton womanher kimono displays the trademarks of different saké brewers. And again, the artist would assume that the viewer would be able to pick up on that visual clue. The viewer knows their trademarks at first glance. So it reflects this increasing commercialization of society, the growth of a commercial market and a consciousness of that commercial market. It also reflects the growing body of shared visual knowledge, textual knowledge, and cultural knowledge. The growth of that shared body of knowledge was really instrumental in the relatively rapid creation of a shared national identity during the Meiji period in the late 19th century.
Welcome to the official website of the West Virginia Association of Physician Assistants (WVAPA). WVAPA serves the needs of Physician Assistants and Physician Assistant Students who work or reside in the state of West Virginia. WVAPA’s website serves its members and the public by providing a forum for services and ideas designed to strengthen and promote the PA profession throughout West Virginia. WVAPA will strive to publicize the contributions of PAs to patients, employers, and policy makers. As the voice and advocate of PAs in West Virginia, WVAPA promotes continuing education for its members, provides PA employment information to PAs and physicians, and strengthens the role of PAs by supporting and encouraging membership in WVAPA. Posted by Nick Vance, Monday, July 21st, 2014 @ 3:18pm West Virginia Center for Drug and Health Information WVU School of Pharmacy A Statewide Service Providing Drug, Drug Therapy, and Health Related Information at No Cost for Health Professionals The West Virginia Center for Drug and Health Information (WV CDHI), operated by the WVU School of Pharmacy in Morgantown, has been a regional resource for health professionals in WV for over 35 years. The WV CDHI’s mission is to provide health care professionals and others with: Specific answers to questions about medications (prescription, nonprescription, natural products), including but not limited to dosage/administration, therapeutic uses, adverse effects, contraindications, drug interactions, toxicity information, drug-drug parenteral compatibilities and monitoring guidelines Current guidelines for the treatment of various disease states Evaluative information from the medical and pharmaceutical literature Consultations regarding an individual patient’s drug therapy Facts about newly marketed drugs, those currently waiting approval, and investigational agents The WV CDHI staff analyzes published information to provide relevant, specific answers to questions. All answers provided are fully referenced, with references provided as desired to the health care provider for their review. Resources used by the WV CDHI to research and answer questions include: Many textbooks, including specialized references Numerous medical and pharmacy journals Comprehensive information services including the Micromedex Information System Computer databases, such as PubMed (MEDLINE) and International Pharmaceutical Abstracts Various other print and electronic resources such as Clinical Pharmacology, Facts and Comparisons, Lexi-Comp, AHFS Drug Information, Meyler’s Side Effects of Drugs & others Contact WV CDHI: 800-352-2501 (in WV) 304-293-6640 (local, out-of-state) If you have a mobile device, you can create a shortcut to this form on your Home screen. With an iPhone or iPad, go to the page through your browser and click the button that looks like this (either at the bottom with iPhone or the top with iPad): Tap “Add to Home Screen.” This creates a shortcut directly to the question form that looks (and works) like an app. WV CDHI Staff: Marie A. Abate, B.S., PharmD., Director; email@example.com; 304-293-1463 Matthew L. Blommel, PharmD., Assistant Director; firstname.lastname@example.org; 304-293-1467 Christopher Isabella, PharmD., Drug Information Resident, email@example.com; 304-293-6640 Senior Doctor of Pharmacy degree candidates (4th professional year) on rotation in the WV CDHI Please contact us if you would like stickers with our contact information to place by your phone. Please do not hesitate to contact us with your questions. Posted by Nick Vance, Thursday, June 12th, 2014 @ 3:27pm CMS issued new rules in May that decreases practice barriers for PAs in Rural Settings at Rural Health Clinics & FQHC. This will allow better access to care for patients in rural communities throughout the country specifically WV.
Massive Participation of Mormons in Salt Lake City Pride Pamela Koldewyn Johanson: “If this sounds like a testimony, it’s because it is” by Hugo Salinas With an interfaith service, an LDS social, two marches, and a popular booth known as “The Mormon Hugging Booth,” tens of thousands were moved by the participation of Mormons, LGBT and straight, at Pride celebrations held in Salt Lake City on the first weekend of June. On Thursday, April 31, LGBT Mormons, families and friends participated in an interfaith service held at Congregation Kol Ami in Salt Lake City. “Through God’s transformative power, anger and disappointment with our adversaries can become love and encouragement,” said Erika Munson of Mormons Building Bridges during the service. “This is not easy–it is a formidable act of faith. But we all know that when God tells us to love our neighbor, he’s talking about the neighbor who’s hardest to love.” The One Voice Choir provided some of the music. On Friday, over 75 LGBT Mormons, families, and friends participated in an LDS social hosted by Jamison Manwaring. After a rooftop barbecue, there was some terrific community singing led by Christian and Dan. A counselor in a Salt Lake City stake presidency came with his wife. From Affirmation and Family Fellowship to BYU’s USGA and Reconciliation, many LDS LGBT-supportive groups were represented. On Saturday, a group of transgender Mormons and allies participated in the Trans Rally and March. Leanorah-Loreli Grace, a Latter-day Saint who recently came out as transgender, rode the bus from Ohio to be there. She reported that singing “A Whole New World” during the Saturday events made her cry. “Luckily I was sitting between two remarkable and wonderful friends [who] wrapped their arms around me and I truly felt loved, for one of the first times in my life.” On Sunday, hundreds of Mormons joined the main parade. Mormons for Equality marched with the ACLU and with the Unitarians. Curtis Penfold, a BYU sophomore who recently organized an event in Provo for marriage equality, led the ACLU group. One of the signs carried by the group read, “I SUPPORT MARRIAGE EQUALITY AND I’M A MORMON.” Some 400 Latter-day Saints marched with Mormons Building Bridges. Several LDS families reaffirmed the selected theme, “Families Together,” by carrying signs with their family’s surname and the names of all the family members. “I have marched in the Pride parade twice now,” wrote Pamela Koldewyn Johanson on the Mormons Building Bridges Facebook page. “Each time I was buoyed by a strong witness that I was where I was meant to be. I count both experiences as two of the most spiritual in my life. If this sounds like a testimony, it’s because it is.” The Moore-Allgood Family marched with their transgender 18-year-old son Grayson. “I want other parents to have the rich experience we have had at supporting our kid,” Grayson’s mother Neca Allgood told KSL5. “Having a supportive family behind me all the way has just made such a huge difference to me,” Greyson added. “I’ve had a so much happier life because my family has been there for me every step of the way.” Sherri and Bill Park were part of a team of Mormons who hugged thousands of LGBT folks as they marched in the streets of Salt Lake and then at the booth. By Saturday evening, the day before the main event, they had already run out of “HUGGED BY A MORMON” stickers. At the site nicknamed “The Mormon Hugging Booth,” the hugging team embraced thousands of LGBT folks. Bill later reported that one of the LGBT folks he hugged, whispered in his ear something the person was too shy to say aloud: “I am a Mormon, too.” Matthew Haws wrote about seeing his Mormon mother, who had once declared that she could never walk in a parade to support gay rights, stand up from her chair on the sidewalk and join the Mormon Building Bridges group. “As she walked she turned and blew me a kiss and waved goodbye, I could see in her eyes what she couldn’t say, ‘This one is for you son,’” Matt wrote on the No More Strangers blog. “She turned back and marched on. I was not expecting the emotions of that moment… I cheered her on with a smile and the tears started to come, my sister came up gave me a hug and we wept together.” » Mormons Building Bridges Marching In SLC Pride (YouTube clip) » KSL5 Story (features Keith Trottier, Erika Munson, Neca Allgood, and Greyson Moore) » View complete interfaith service (YouTube) Equality Utah Event in Murray Affirmation Conference to Feature Authors, Allies, Celebrities Dancing Star Benji Schwimmer to MC Friday Dance by Randall Thacker Please join us September 13-15 for Affirmation’s annual conference to be held in Salt Lake City. These are some of the remarkable people who will be featured: Dance with Benji Schwimmer! Benji Schwimmer, winner of Season 2 of “So You Think You Can Dance,” will MC the opening event on Friday evening and spend time teaching us all some of his dance moves and some fun line dancing. A former BYU student and a returned missionary, Benji struggled for years as he tried to repress his same-sex feelings. When he was 17 he started an online Yahoo group for gay Mormon youth. After years of attempting to fit into the Mormon model of heterosexuality, Benji finally accepted his sexual orientation as a gift rather than a curse. He came out in a 2012 interview with Mormon Stories founder John Dehlin. Daniel Parkinson: God’s Affirmation Led by Daniel Parkinson, this plenary session will feature highlights from the No More Strangers blog, the Gay Mormon Stories podcast, and the Far Between project. “As we have been conducting interviews for Gay Mormon Stories and the Far Between project,” says Daniel, “we have been impacted by a phenomenon that has been striking and consistent: if we are open to it, God will affirm us as LGBT individuals and give us a confirmation of his love and approval of our relationships. “How do we know it? You can’t hear these stories and not be impacted by the profound experiences that these individuals describe. They come to the issue broken. They come to the issue with openness. They come to the issue with a willingness to obey God’s will and they are surprised at the answer received.” Daniel Parkinson was born and raised in Utah to a Mormon family with a thick Mormon Heritage. He comes to this issue as a psychiatrist, with a strong sense of activism, and a desire to help the two communities that he inherited as his birthright: the Mormon community, and the gay community. Daniel was married to Diego, his partner of 12 years in Canada as soon as it became legal there in 2004. Unfortunately, they are unable to live in the United States due to discrimination. Since their marriage is not recognized in the USA, Daniel can not sponsor Diego for immigration, so they are forced by this to live abroad. However, they have made the most of this situation and divide their time between two cities they love: San Jose, Costa Rica, and Montreal, Quebec. In this presentation we will hear and see excerpts from Far Between interviews and Gay Mormon Stories interviews where the participants describe these life-changing events. We will then follow with excerpts or live descriptions of these events by some of the people who were interviewed and other people who have had this affirming experience. We are anticipating a very moving program as we stand as witnesses to the loving response that God has given to the prayers of these seekers. Carol Lynn Pearson: A Hero’s Journey Carol Lynn Pearson will speak on the vital themes that appear in her recent book The Hero’s Journey of the Gay and Lesbian Mormon, encouraging us to embrace our calling as LGBT members of the Mormon Tribe as a gift rather than a problem. She will encourage us to realize that we are a special part of the healing that must occur in our families, our society, and our church. The healing can only come when we have healed our own hearts and stepped into the grandeur of who we really are, confident in ourselves and in our God, able to bless and forgive all those we meet along the way. Judith Finch’s story is featured on the LDS Church’s new official MormonsAndGays.org website (see “Judy’s Story”). An Affirmation board member with a gay son and two gay grandchildren, Judy will also speak at conference. Judy will talk about how it is no mistake for our children to be gay and how Latter-day Saints can practice what they have been taught about love, respect, and inclusion of all, including LGBT people, in their families and the Church. Wendy & Thomas: New “Families Are Forever” Video The Family Acceptance Project will screen its new film “Families are Forever,” a moving short documentary about a devout Mormon family’s journey to support their young gay son. Caitlin Ryan of the Family Acceptance Project will outline more about the video and the Family Acceptance Project. The Wendy Williams and Thomas Montgomery family –the family featured in the documentary– will take questions from the audience. Robin Linkhart and the Community of Christ Robin (Kincaid) Linkhart, president of Quorum Six of the Seventy in the Community of Christ (formerly known as the Reorganized Church of Jesus Christ of Latter Day Saints) will also speak at our conference. On April 21, the National Conference for Community of Christ in the U.S. recommended to the First Presidency that the Church start marrying gay couples in states where same-sex marriage is legal. For states which do not have marriage equality, the Conference recommended blessing same-sex couples with commitment ceremonies. The same conference recommended allowing priesthood ordination for lesbians and gays who are in monogamous, committed relationships. An Invitation to Support Affirmation With Your Help, Amazing Things Are Happening in Affirmation and the LDS LGBTQ Community Dear LGBTQ Mormons and Friends: My name is Tina Richerson, Outreach Coordinator and Vice President of Affirmation. I am writing this week to invite you to a fundraising challenge we have been given by some generous Affirmation donors. As you may already know, our scope of work is widening as we involve straight allies along with a growing number of LGBT Mormons who are seeking information and advice on how to reconcile their sexuality with their faith. While others of our group have long understood their place in creation and become comfortable with it, all of us, whether active, inactive or ex-Mormon, appreciate the warmth and support of the friends and “family” we find in Affirmation. With your help, amazing things have happened in Affirmation and the LDS LGBTQ community. And without your support, they wouldn’t have. With that in mind, we want to update you on our recent activities. Affirmation is: - Helping to increase understanding and build awareness of LGBT and Questioning (Q) individuals within Mormonism. We do this by supporting LGBT Mormon events worldwide. - Continually improving our online image (website, social media) to be seen as a resource for not only LGBTQ Mormons but for parents, families, friends, and church leaders. One of our most recent offerings is a packet for individuals to share with their church leaders, family members and friends. - Experiencing enormous growth in our global reach and receiving an overwhelming number of requests for our website and materials to be translated into a variety of languages. - Answering hundreds of emails, Facebook messages and phone calls to help groups and individuals reconcile their sexuality and spirituality and find a place of healing. We are holding video and phone calls with individuals and groups looking to talk to someone. - Sponsoring and participating in an increasing number of forums for dialogue among LGBTQ Mormons, church members and leaders, both locally and in Salt Lake City. These groups are helping to create increased understanding and build positive relationships. - Expecting a record number of attendees at our Annual Conference “New Frontiers” in Salt Lake City this September 13-15. To promote broader participation, conference registration is below cost at only $99, a significantly lower price than usual; and, we will provide many half scholarships to those needing financial help, including a number of college students. - Working closely with other like-minded groups such as Mormons Building Bridges, BYU’s USGA, LDS Family Fellowship, and Mormons for Equality, in order to provide more resources for support, awareness and outreach. Thank you for supporting LGBT Mormons, their families, and allies in the past. In order for us to continue the growing amount of work we are doing, including expanding our international reach and offering more half scholarships to our annual conference, we are asking you to help us raise $10,000 by August 31, 2013. If we meet this challenge goal, some generous friends of Affirmation have committed to give an additional $5,000!!! If you donate $100, $50, $25 or even $15 we can meet this goal and help fund Affirmation’s increasingly bright future, making an impact on the lives of LGBTQ Mormons, families, friends, and church leaders worldwide. Please visit our donation page to show your support today. Those who donate $25 or more can choose to also receive Affirmation membership benefits. Visit our conference website to learn more about this year’s annual conference and to register. Receive a discount on conference when you renew your membership at the same time. If you are looking for ways to connect with a LGBT Mormon group locally or via Facebook, want to receive our newsletters, or participate in an upcoming group teleconference with other LGBT Mormons, families and friends, please contact Todd Richardson at email@example.com. If you have an interest in being involved in international leadership team initiatives, contact Randall Thacker at firstname.lastname@example.org. Thank you in advance for your contribution and involvement. Outreach & Vice President P.S. Many employers will also match tax-deductible charitable contributions made by their employees, retirees and employees’ spouses. Contact your employer now and double or triple your impact! Mormon Pride in DC: A Report from Our Booth People are marching–not only in parades across the country, but by spreading this message of love (as well as education) to others within the LDS community by James Brinton On June 8-9th I had the amazing experience of marching with the Mormons in DC’s pride parade with messages of love! In Utah, there were Mormons Building Bridges. In DC, there were Mormons for Equality. I also helped staff and coordinate the booth for Affirmation–LGBT Mormons. So much has been going on in the intersection of Mormonism and LGBT topics in the last few years, that it was time to update our presentation with posters and material of current web resources for youth and families, current research, and information about ally groups fostering dialogue within and without our faith community. Altogether, this information let people know they are not alone, promoted evidence-based education on LGBT issues, helped individuals navigate pathways of faith and sexuality, informed of growing numbers of straight allies in the church, and fostered faith in Jesus Christ. On Saturday we marched in the Pride parade. After a tremendously moving experience at last year’s Pride parade, I could hardly wait to go again. My cousin, her husband, and two kids drove all the way from Boston to show love and support in word and action, saying that if others in the family weren’t ready to show unconditional love and support, that they (my cousins) were there to represent the whole extended family for now. The group of marchers made amazing signs and the crowd cheered as we walked through the neighborhoods of Washington DC. Once more, I was flooded with feelings of love and joy as I walked and held a poster that said “Love: The Most Important Part of an Eternal Family.” An overwhelming trend, still all too common, is that when an LGBT Mormon comes out of the closet, they often face tremendous misunderstanding, opposition, and hostility from LDS family and friends. Many are kicked out of their homes and faith community, ostracized by family members, and are at great risk of committing suicide. Numerous stories have been told of lives and families ripped apart because of teachings of the church and actions of church leaders and LDS families of LGBT Mormons. Slowly, with more dialogue happening about these tragedies, some are starting to respond with increased listening, empathy and love to LGBT individuals. One quote from the church’s official website, www. MormonsAndGays.org states that, “Jesus Christ commanded us to love our neighbors. Whether sinner or saint, rich or poor, stranger or friend, everyone in God’s small world is our neighbor, including our gay and lesbian brothers and sisters. Latter-day Saints believe that our true commitment to Christian teachings is revealed by how we respond to this commandment.” Demonstrating this commitment in action, people are marching–not only in parades across the country, but by spreading this message of love (as well as education) to others within the LDS community. My friend Maggie made a sign that said “Free Hugs from Mormons 4 Marriage Equality” and we hugged hundreds of people throughout the weekend! Some people shouted, “I’m one of you! I’m from Utah too!” Others blew kisses, thanked us for our support and work to increase dialogue in our community. Gabe kept the crowd’s energy high by running in her super hero cape and giving hugs to onlookers reaching out to us. On Sunday we set up our Affirmation DC Chapter booth along Pennsylvania Avenue between the White House and the Capitol Building. Many people came by to attend the Capital Pride Festival. A taste of who came by: - A man and woman with their 5-year-old son, members of the Church. When I asked what brought them to the pride festival, they confessed that they were only walking to a nearby museum, but wanted to see the festival before it got crowed. They were surprised, but so tremendously happy that Mormons were there to show kind faces and love to everyone passing by. - A gay Mormon man who left the church over 20 years ago, very upset and wanting to talk to someone about navigating a path in his life. - A recent convert, whose leaders treated her and her children poorly because she is a lesbian. We let her know that some congregations are opening up their doors to lesbians and gays, and that she is not alone! - People who have Mormon neighbors—“Do you have something [reading materials] we can give them?” - Straight members of the church coming to check in and help give hugs and support. - A recent LDS convert from Colorado, with his father, expressing faith in the Book of Mormon and Jesus. - A gay married couple who grew up Catholic and are now LGBT activists, thanking Mormons for Marriage Equality for their courage. - A lesbian Methodist couple telling how they have navigated their life paths of faith and sexual identity. - A straight couple, one being a former member of the LDS church, saying that she has wrestled for years with the Church’s treatment of LGBT individuals. - LGBT former Mormons stopping by to say hi and wish us well, and many other LGBT and straight people coming by to express love and thanks. - A mom of two gay sons, who left the Mormon church years ago. She expressed heartbreak that while the church is all about “family first,” many in the church and family did not love her sons, and ultimately they all decided they must leave. She began to weep as she shared that one of us in the parade ran up to her unannounced, and wrapped arms around her in a big hug. She knew the Spirit must have led that person right to her. She wept and expressed gratitude for the work we were doing. - People who wanted a free Mormon hug! “The World Needs Paradigm Pioneers” “God Is Love” “Que os améis unos a otros” “Hugged by a Mormon” Stickers The Abhau Family Free Hugs from Mormons for Equality “You Don’t Have to Push a Handcart to Be a Pioneer” The Affirmation Booth DC Pride: When the Baxters Joined In We were determined to participate and show solidarity with our LGBTQ brothers and sisters by Grant and Amanda Baxter On Saturday, June 8, our family marched in Washington DC’s Capital Pride Parade for the first time. We joined our fellow Mormons under the Mormons for Marriage Equality banner. The logistics of travelling into the city on the Metro from our home in the suburbs with our five young children and all the accompanying gear were daunting. However, we were determined to participate and show solidarity with our LGBTQ brothers and sisters and express our belief that God loves, accepts, and rejoices in ALL of His children equally, without condition, and without exception. As soon as we stepped out of the station and into the crowds, we felt an atmosphere of joy and unity, with people gathered together in a celebration of life and humanity. That feeling of unity only intensified as our group entered the parade route and began marching. We were overwhelmed and touched by the cheers and encouragement from the crowd. The love was palpable and flowed freely back and forth between the marchers and the spectators. We shared hug after hug, high-fives, waves, and smiles. Our children were cheered and felt the energy and the love, and had a wonderful experience. After the parade ended, we shared the rest of the evening at a social hosted by the group organizers, and attended by most of the marchers, as well as a few others. It was a wonderful opportunity to relax, celebrate, and build new friendships. The glow from the whole experience stayed with us for the rest of the weekend and made us wish we had been able to enjoy the Pride Festival the following day. We are already excited for next year’s parade, and are determined to participate every year from now on. Over 30 people attended, both members and non-members, straight and LGBT Tom and Wendy Montgomery hosted the first “All Are Alike” LDS Support meeting in Bakersfield, California on June 9. Over 30 people attended, both members and non-members, straight and LGBT. People attended from as far away as Tehachapi (1 hour away). Wendy spoke of the Montgomery Family’s journey with their oldest son Jordan coming out in 2012. Tom spoke of the unprecedented, positive developments within the LDS Church moving in support of LGBT members. The Church website MormonsAndGays.org establishes a clear acknowledgement regarding choice (“individuals do not choose to have such attractions”) and sets an inclusive, loving tone toward LGBT members. Tom commented: “One of our greatest challenges locally is connecting members with the messages on the website. The vast majority of local members are relying on the direction of Church leaders from 30-50 years ago. The current leadership of the Church has seemingly outpaced the majority of the membership on LGBT issues. With the support of the Church, the Boy Scouts have now paved the way for Jordan to receive his Eagle Scout in the next year. We never could have imagined this level of change when Jordan first came out.” Mitch Mayne speaking to the group. Backdrop: Diane Oviatt’s Pride Parade sign Bay Area Group Holds First Meeting Another evening is planned for late July By Diane Oviatt On June 2nd we had an LDS LGBT fireside/social at our house in the San Francisco Bay Area. It was a great evening starting with desserts on the patio while we socialized. We then came inside to hear Judy Finch (whose story is seen on the Mormons and Gays website) and Mitch Mayne (who is the executive secretary of the Bay ward in San Francisco). Judy talked about her journey as a Mormon woman with a gay son and two gay grandsons. Mitch spoke of the mission LGBT LDS people have to help their fellow church members increase understanding, love and Christ-like compassion. The speakers were followed by a lively discussion amongst the twenty or so people attending. There was a warm feeling and new friendships were formed between the group members which included many straight allies as well as gay church members. Another evening is planned for late July with details to follow. Lesbian Mormon Identities: A Conversation with Jeanna Jacobsen by Hugo Salinas Jeanna Jacobsen recently finished a dissertation titled “Mormon Women’s Experiences with Same-sex Sexuality.” A Ph.D. in social work, Jacobsen conducted interviews with 24 women who have experienced some kind of same-sex sexuality (thoughts, feelings, attractions, behaviors, affections, or relationships) and are or have been members of the LDS Church. Jacobsen, who identifies as a lesbian of Mormon background, describes in her dissertation how these women’s experiences affected their religious and sexual identities. My impression is that a number of causes combine to make LDS lesbian women virtually invisible. Would you agree with that statement? I think there are a number of reasons that LDS lesbian women do not have more visibility. First of all, there are simply less women than men who identify as primarily same-sex attracted, so male voices tend to dominate LDS LGBT communities. Women experience both sexism and hetero-sexism. Another issue is that many LDS women, regardless of sexual orientation, who are not married to a man feel invisible or like second-class citizens in their Mormon wards due to the Church’s emphasis on priesthood and family. Experiencing same-sex sexuality is just one more reason why women feel like they do not belong and this may create a situation where women leave the Mormon Church for welcoming feminine spaces or hide within the Mormon community. You quote studies suggesting that lesbians who accept their identity and disclose it to others tend to have more self-esteem and be happier. Does this mean that it is good for lesbian Mormon women to come out? Not necessarily. Women should actively work on self-acceptance and self-worth. But, accepting oneself does not mean that it is safe to come out. One needs to consider family and community impacts. The potential loss of social supports may be too difficult to endure during certain times of one’s life without first building an accepting community. This does not mean hiding one’s sexual orientation is the best option. Most women I spoke with felt drained from hiding this important aspect about themselves from others, especially family. For this reason, they eventually came to a place where hiding produced more pain and coming out was a step in fully accepting themselves. Coming out is a personal experience and the right time is unique to the circumstances of the situation. You say that most of the women you interviewed felt as though they had to choose between their sexual and religious identities. What are the outcomes of this choice? The outcomes are as varied as the women with whom I spoke. In the end, the women chose the lifestyle and belief system that created the greatest sense of happiness in their lives. The Mormon Church often teaches in black and white, so many women did feel as though they had to choose between their religious identity and a same-sex relationship. Half of the women in my study left the Church and no longer identified as Mormon. Two of these women went on to identify with other religions, although several others connected with their spirituality through other means (such as nature or meaningful work). Re-establishing a belief system after losing the rigid, structure of Mormonism is difficult and spirituality can suffer. Twelve women continued to identify as Mormon. These women attempted to find some balance between their sexual and religious identities, such as believing the core tenets of the Mormon religion but changing beliefs about God’s acceptance of their sexuality. Most these women were not active because they choose to pursue a same-sex relationship and did not feel comfortable in Mormon communities given the negative messages about their sexuality. Only four continued to actively participate in the Mormon Church. Two chose celibacy. The final two women participate in services to the extent they are able given their same-sex relationship status and are welcomed in their wards. Can you think of specific things that bishops or Relief Society presidents could do to make it easier for lesbians to feel loved and welcomed in their wards? Creating a welcoming environment for any single adult female would help. Women need to hear messages beyond just the importance of a heterosexual family and having a priesthood holder in the home. When they don’t or can’t fit the ideal, they leave. Bishops and Relief Society presidents need to show their love. Demonstrate acceptance, recognize the difficulty she might be experiencing due to internal conflict, and do not diminish or dismiss her sexuality. Letting women know that they are welcome in church regardless of her relationship status (including involvement in a same-sex relationship) goes a long way in maintaining someone’s desire to stay. Two New Titles Enrich Gay Mormon Fiction “Elder Petersen’s Mission Memories” and “Companions: Nich’ooni” by Hugo Salinas Two recent titles, Elder Petersen’s Mission Memories and Companions: Nich’ooni,have recently been added to the world of gay Mormon fiction, and two Affirmation members have reviewed them especially for us. “Jeff Laver is a good storyteller and produced a very readable book,” writes Alan Blodgett about the novella Elder Petersen’s Mission Memories. “I particularly enjoyed his mastery of the Mormon language, his depiction of missionary life and his descriptions of a gay man’s feelings and emotions. This novella is 53 pages and easy to read in one day.” Companions: Nich’ooni is the story of two gay missionaries on a Navajo reservation in Arizona. The story “is mixed with adventure, raw truth, and irresistible love,” writes Karin Hendricks. “Based in part from Jed’s own missionary story, the characters reflect a sense of veracity yet eccentricity that made me shake my head in disbelief from time to time – until I remembered how very possible these stories of forbidden love, adventure, betrayal, and devotion really are.” Fans of gay Mormon fiction will have another title available very soon, as University of Rochester professor Gerald S. Argetsinger, along with Johnny Townsend and Jeff Laver, prepares to publish an anthology of gay Mormon literature. Titled Latter-Gay Saints: An Anthology of Gay Mormon Fiction, the book is due out in July from Lethe Press. Argetsinger will be at the Sunstone Symposium this August to tell us more about the rich and the ever-growing world of gay Mormon fiction. Posted on the Affirmation Website and Blog: |LDS LGBT Summer Social/BBQ to Be Held in Utah||LGBT Mormons, Allies Celebrate Boy Scouts’ New Inclusive Policy| Posted on the No More Strangers Blog: |Why Mormon Support of the BSA Decision Is a Good Thing for Gay Mormon Youth||History and #42|
Steven Raichlen updated his book, 'The Barbecue! Bible,' to reflect a decade's worth of changes in the barbecue landscape Make no mistake, he can preach for hours about the difference between Memphis and Kansas City barbecue styles, carefully explaining the subtle differences between the two with wonder and awe. What makes this soft-spoken guru of barbecue different from you and me is his ability to tell you not only if something is good, but also the history of why it was good in the first place. Raichlen is the author of "The Barbecue! Bible" (Workman Publishing; $22.95). The book has sold more than 4 million copies and has been printed in 14 languages. It is an exhaustive tome that includes recipes and cooking insight from around the world. If you could only buy one book on how to grill, smoke or barbecue, this would be it. Within its bindings, you will find virtually everything you need to know about the grilling arts, and a few things you didn't think you needed to know. When the publicist called a few weeks back to ask if I would be interested in chatting with Raichlen, I jumped at the opportunity. How, I wanted to know, did somebody start out to write such a book? Raichlen, 55, admits quickly that it wasn't his intention at the outset to write the definitive book on grilling and barbecuing. His stated intention was to put together a modest book of about 100 recipes, along with some tips and techniques for the novice back-yard cook. But that changed when Raichlen, who has a degree in French literature from Reed College, had what he calls an epiphany ? a vision of a grander book, a tome that offered a complete worldview of the art of fire, smoke and man. "I figured somebody should travel around the world and study barbecue in different cultures, and that somebody ought to be me," he said. All that, and it's a wonderful how-to book on a wide range of barbecue basics and a fun read, to boot. The book was well-received by a barbecue-hungry public, as well as the critics who awarded it the prestigious James Beard Award. To mark the occasion of the book's 10th anniversary this year, Raichlen went back in and updated the book "from beginning to end." The changes reflect changes in the barbecue milieu, as well as some changes to recipes to reflect new ingredients that are available. He also added several full-color photographs. The grilling landscape has changed much in the 10 years since the book was first published, not the least of which is the popularity of back-yard cooking. "People now have a much greater understanding of barbecuing and grilling. When I first wrote the book, I had to go into great detail to explain indirect cooking; now it's pretty much common knowledge," he said. As for what we're cooking over an open fire, Raichlen said that's also become pretty much an open-ended question. Where before folks would be content to limit grilling to steaks or some other protein, now they are equally comfortable cooking vegetables, fruits and even desserts on the grill. "Now, the whole meal is on the grill," Raichlen said. Likewise, people are spending more on outdoor cooking than before. "Thirty percent of American families own more than one grill. They have a gas grill for quick weeknight meals, a charcoal grill for weekends and a smoker for larger cuts of meat," he said. In thumbing through the book, I found the section on pork to be especially enlightening and informative. In our section of the world, pork rules on the grill and Raichlen agreed that it may be the perfect meat for the pit. He said that pork has a "flavor profile" that allows it to be cooked one of two ways. "It can be cooked with a savory treatment (traditional rubs or spices) but it also marries up equally well with fruit (pineapple, for instance)," he said. In the final analysis, Raichlen said the state of barbecue in America is very healthy and he pledges to continue his quest for the ultimate outdoor cooking experience. "I think we're going to keep doing what we've been doing, only doing it better," he said. Since it is two days from the Fourth of July and it would be criminal not to cook some ribs to mark the occasion, here is Raichlen's recipe for Memphis-style ribs. Raichlen admits that he's partial to Memphis-style ribs because "Memphians don't mess around with a lot of sugary sauces. Instead, they favor dry rubs ? full-flavored mixtures of paprika, black pepper and cayenne, with just a touch of brown sugar for sweetness," he writes in the lead-in to the recipe. Memphis-Style Ribs (6 servings) 3 racks baby back pork ribs (about 7 pounds), or 2 racks pork spare ribs (6-8 pounds total) 1/4 cup sweet paprika 4 1/2 teaspoons freshly ground black pepper 4 1/2 teaspoons dark brown sugar 1 tablespoon salt 1 1/2 teaspoons celery salt 1 1/2 teaspoons cayenne pepper 1 1/2 teaspoons garlic powder 1 1/2 teaspoons dry mustard 1 1/2 teaspoons ground cumin For the mop sauce: 2 cups cider vinegar 1/2 cup yellow (ballpark) mustard 2 teaspoons salt Prepare the ribs and rub: Remove the thin, papery skin from the back of each rack of ribs by pulling it off in a sheet with your fingers, using the corner of kitchen towel to gain a secure grip, or with pliers. Combine the paprika, black pepper, brown sugar, salt celery salt, cayenne, garlic powder, dry mustard and the cumin in a small bowl and whisk to mix. Rub two thirds of this mixture over the ribs on both sides, then transfer the ribs to a roasting pan. Cover and let cure, in the refrigerator, for 4-8 hours. Prepare the mop sauce (if using): Mix together the cider vinegar, mustard and salt in a bowl and set aside. Set up the grill for indirect grilling and place a large drip pan in the center. If using a gas grill, place all the wood chips in the smoker box and preheat the grill to high; when smoke appears, reduce the heat to medium. If using a charcoal grill, preheat it to medium. When ready to cook, if using a charcoal grill, toss the wood chips on the coals. Brush and oil the grill grate. Arrange the ribs on the hot grate over the drip pan. Cover the grill and smoke cook the ribs for 1 hour. When the ribs have cooked for 1 hour, uncover the grill and brush the ribs with the mop sauce. Recover the grill and continue cooking the ribs until tender and almost done, 1/4 to 1/2 hour longer for baby back ribs, 1/2 to 1 hour longer for spareribs. The ribs are done when the meat is very tender or has shrunk back from the ends of the bones. If using a charcoal grill, you'll need to add 10-12 fresh coals to each side after 1 hour. Fifteen minutes before the ribs are done, season them with the remaining rub, sprinkling it on them. To serve, cut the racks in half or, for a plate-burying effect, just leave them alone. This recipe represents the international flavor of Raichlen's book. It's from Australia, but Raichlen writes that it reflects the "huge influx of Asian immigrants to Australia in the 1970s and 80s." It may be from Australia, but I bet you it would be excellent with some fresh Alabama wild shrimp. Honey Sesame Shrimp "On the Barbie" (4 servings) 1 1/2 pounds jumbo shrimp, peeled and deveined 5 tablespoons Asian (dark) sesame oil 3 tablespoons rice wine, sake, or dry sherry 3 tablespoons soy sauce 4 1/2 teaspoons honey 4 1/2 teaspoons sesame seeds 1 tablespoon Thai sweet chile sauce (see note) 1/2 teaspoon Chinese five-spice powder 2 cloves garlic, peeled and crushed with the side of a cleaver 2 slices (1/4 inch thick) peeled fresh ginger 2 scallions, trimmed, white part flattened with the side of a cleaver, green part finely chopped and set aside for garnish Lime wedges, for serving Rinse the shrimp under cold running water, then drain them and blot dry with paper towels. Combine 3 tablespoons of the sesame oil, the rice wine, soy sauce, honey, sesame seeds, chile sauce (if using), and five-spice powder in a large bowl and whisk to blend. Stir in the garlic, ginger, scallion whites and shrimp and toss to coat, then cover and let marinate, in the refrigerator, for 30 minutes to 1 hour. Set up the grill for direct heating and preheat to high. When ready to cook, brush and oil the grill grate. Arrange the shrimp on the hot grate and grill, turning with tongs, until nicely browned on the outside and firm and pink inside, about 2 minutes per side. Brush the shrimp with the glaze as they cook. Transfer the shrimp to serving plates or a platter, sprinkle the scallion greens on top and serve with the lime wedges. Note: Thais use sweet chile sauce like Americans use ketchup. Many supermarkets carry it (one good brand is A Taste of Thai), but if it's not available, simply omit it.
China to Vietnam: Ethnic People of the Border Although this trip from North Vietnam to the base of the Tibetan Plateau in China seems like the ultimate in adventure, curious people of all ages and physical abilities can enjoy this most unusual program. The itinerary certainly takes you off the beaten track, but the trip is not difficult. The travelers you meet, the scenery, and the variety of cultures make this the vacation of a lifetime. Beginning in Hanoi, you will head up north to the hill tribe towns of Sa Pa and Bac Ha in time to visit the villages and enjoy the less visited Coc Ly Market. Then, crossing the border between Vietnam and China by car, you will head to Kunming, stopping in rarely visited villages and visiting the third largest Confucian temple in China. A flight takes you to Dali and on to Lijang, to see the Bai and Naxi of the area. After exploring Lijang, you head north to the Tibetan plateau to Gyalthang, the area aptly named by the Chinese, Shangri-La! Dates and Land Cost Starting at $6995.00 per person (based on 4-6 people) Dates: Tuesday, April 14, 2015 - Friday, May 1, 2015 and Tuesday, September 22, 2015 - Friday, October 9, 2015 Please note: Custom dates and prices available This is not just a slogan - it's the way we do business. If this trip itinerary isn't exactly what you want or if the group departure dates don't quite fit your timeframe, we would be thrilled to create a personalized trip that matches exactly what you, your friends or your family wish to do. Since its inception in 1988, Myths and Mountains has been a pioneer in the field of customized and solo travel. We know that there's no such thing as "one itinerary fits all," and we're committed to matching your particular trip to your dreams. So, go back and look at the itinerary carefully. Check what you like and don't like and give us a call. We'll ask you lots of questions designed to help us understand your travel style, budget, interests, and wishes, and then we'll channel all our global connections, in-depth destination knowledge, and decades of travel planning experience into creating an extraordinary adventure filled with unforgettable experiences. Our custom trips are not just standard "packages" adjusted to fit your travel dates - they're individually tailored itineraries, as unique as you are. Here's how we will collaborate with you: 1. Read through the itineraries that interest you and think about what you like and don't like, the dates, other places you might want to visit or other activities. 2. E-mail us at firstname.lastname@example.org or call us at 800-670-6984 to let us know your thoughts. 3. Talk with us about what worked and did not work in the programs you were considering, where you want to go, your timeframe, travel companions, budget, special interests and travel style. 4. We will send a brief sketch and approximate land cost based on our discussion, for you to review that includes the suggested changes we discussed. 5. Based on your feedback of the sketch, we will rework your itinerary according to your guidelines. Should you wish to talk with previous travelers who have asked us for customized itineraries, we are happy to give you references. 6. Review the new program. If it works, we will usually ask for a deposit: 25% of the cost, 50% if you are 120 days out. At that point, we will confirm all of the reservations and guides, send you a full packet of preliminary information and prepare your formal, personalized, detailed daily itinerary. After all, it's your unique vacation. Invite your family. Bring your friends. Dream big. Then call us and let us make your dream a reality. |Day 1||Arrive in Lijiang from Kunming. Visit old town, Yuhu village and Joseph Rock home and museum. Naxi music and dance concert. NOTE: Today must be a Tuesday.| |Day 2||Explore Lijiang including produce market and Black Dragon Pool. Afternoon visit to Wembi temple and retreat.| |Day 3||Drive to Lijiang via Shegu, Bend in the Yangtse, and Tiger Leaping Gorge.| |Day 4||Tour Ganden Sumtsanling Monastery and Ringha Temple.| |Day 5||Drive along the upper Yangtze Gorge to visit Nishi and Gonzao.| |Day 6||Drive to Dali, via Xizhou.| |Day 7||Explore the city.| |Day 8||Drive to Kunming including the Dinosaur Museum.| |Day 9||Explore the city.| |Day 10||Drive to Jianshui, via Tonghai.| |Day 11||Tour Jianshui including The Sea of Learning Lake Temple.| |Day 12||Drive to Lao Cai via Mengze, cross the border, and drive to Bac Ha.| |Day 13||Visit Sunday Market in Bac Ha and villages. Drive Sa Pa.| |Day 14||Drive Sa Pa, stopping at villages.| |Day 15||Visit Coc Ly Market. Drive Lao Cai and take train back to Hanoi.| |Day 16||Arrive Hanoi. Ethnic Museum, market, Old Quarter. Meeting with puppet master and private show.| |Day 17||Hanoi Touring – Tai Chi on the lake, Temple of Literature, Presidential Palace, cooking demonstration, Quan Ho Singing. Farewell dinner.| |Day 18||Free day with guide and car until departure.|
Idiopathic Granulomatous Mastitis - Report Of A Case With A Brief Review Of Literature HATWAL D*, PANDA A**, SURI V*** *,**,***Department Of Pathology In V.C.S.G.G.M.C.& R I Srinagar . Dr Deepa Hatwal, Health care Centre, Upper Bazar, Near Gurudwara,Srinagar, Pauri Garhwal, Uttarakhand, Pin-246174. Phone-01346253501,Mobile09411356980 Idiopathic granulomatous mastitis is a rare inflammatory disorder which is characterized by the presence of non-caseating granulomas within the breast lobules, in which no organisms are found. It is hypothesized that the disease is a hypersensitivity reaction to the lobular epithelium and its contents. Though it is frequently reported from western countries, very few cases have been described from India. It affects only parous women and clinically mimics inflammatory breast carcinoma and tubercular mastitis. FNAC alone is not sufficient for the diagnosis and this can only be confirmed by an open biopsy. We report here, a case of granulomatous lobular mastitis in a 25 year old lactating female patient. Introduction Idiopathic granulomatous mastitis is a rare lesion in which the granulomas are associated with micro abscesses which may respond to corticosteroid therapy (1),(2).The distinctive term of granulomatous lobular mastitis has been applied to this condition which is seen to arise in younger, parous women, where the inflammatory granulomatous process is centered on the structure of the breast lobule (3),(4). The histological diagnosis of granulomatous mastitis is difficult because the features overlap with other granulomatous conditions, especially mycobacterium infections, including atypical mycobacterium infections. Definitive diagnosis depends on typical histology and negative microbiological profile (5),(6).We report here, a histological diagnosed case of granulomatous lobular mastitis. Clinical Findings A 25 years old female lactating patient presented with multiple, firm, tender, nodular lesions in the right breast. FNAC revealed granulomatous mastitis and the stain for AFB was negative. Then biopsy was done to confirm the diagnosis and to rule out other granulomatous conditions. Pathological Findings The gross specimen consisted of an irregular mass measuring (5x4) cm. The cut surface showed nodular areas with areas of necrosis (Table/Fig 1). Histology showed multiple non-caseating granulomas with microabscess formation, which were confined to the breast lobules (Table/Fig 2), (Table/Fig 3), (Table/Fig 4) (Figure-2,3,4 HE-10x). The granulomas were composed of epitheliod histiocytes, giant cells including Langhans types, lymphomononuclear cells and neutrophils (Table/Fig 5) (Figure-5, HE-10x). Acid fast bacilli and fungal bodies could not be detected by special stains (Z-N and PAS). A diagnosis of granulomatous lobular mastitis was made. Idiopathic granulomatous mastitis was first described as a specific entity by Kessler and Wolloch in 1972 (1). It was further elaborated by Cohen (7) in1977. Granulomatous mastitis is an uncommon and curious condition of unknown aetiology (6). However, its association with the use of oral contraceptive pills, autoimmune disorders, hyperprolactinaemia, alpha-1antitrypsin deficiency and Corynebacterium spp has been proposed (8),(9),(10),(11),(12). Studies show that women who are affected by IGM, belong to third decade of life (8),(9),(13). All the cases described by Kessler and Wolloch and Fletcher 1982, occurred within 6 years of pregnancy. Our case presented during the lactation period. Studies show conflicting data associating the role of oral contraceptives in patients diagnose as IGM range from 0 to 33 % (8),(14), (15) It occurs in young parous women and presents as a firm tender lump that may be mistaken for carcinoma (1),(6). In a study, all cases with histopathologically proven Idiopathic granulomatous mastitis initially showed breast masses which were suspected of having breast carcinoma (16). So, detailed histopathological examination of the cases which are suspected as carcinoma is mandatory. Histopathologically, IGM may mimic tubercular mastitis showing well defined granuloma, caseous type secretions, epitheliod cells and langhans giant cells and can result in a mistaken diagnosis of tuberculosis. Treating tuberculosis with steroids would aggravate the infection, whereas unnecessary antitubercular drugs may cause numerous side effects. So, the differential diagnosis of tubercular mastitis needs to be considered (18),(19). The only diagnostic proof of tubercular mastitis is the demonstration of tubercle bacilli in a microscopic smear or culture or by PCR for mycobacterium tuberculosis. The sensitivity of PCR in AFB smear negative cases as low as 50% have been reported in some series (20). A case study by KB Sriram and D. Moffat highlight the difficulty in differentiating culture negative tuberculosis from granulomatous mastitis and the importance of a high index of clinical suspicion (21). The presence of caseous necrosis, langhans giant cells and granuloma favour the diagnosis of TB mastitis, whereas IGM represents a lobular distribution of mixed chronic inflammatory processes which are composed of lymphocytes, plasma cells, giant cells, the presence of neutrophilinfiltrationand lack of caseation. Additionally, micro abscess formation and squamous metaplasia of the lobular and ductular epithelium may occur (1),(27). Farhan Abbas and Anwal in their study, found that fat necrosis was the most predominant feature. Fat damage was the main cause of the formation of granuloma and giant cells which were surrounded by lymphocytes, plasma cells and neutrophils. (22) Because the GM is essentially a diagnosis of exclusion, other differential diagnoses are rare specific causes of granulomatous inflammation, including fungal infections or non infectious causes, sarcoidosis, Wegner’s granuloma, granulomatous angiopanniculitis of the breast, fat necrosis, foreign body granuloma, plasma cell mastitis, cholesterol granuloma and milk granuloma. Combination of any of the above mentioned conditions is also a possibility, which must be taken into consideration (18),[19. In this case, the diagnosis was done clinically and histologically. This case appears to be a distinct disease entity, as neither organisms nor foreign body materials have been identified. Several reports describe the association of granulomatous lobular mastitis with erythema nodosum and polyarthritis, thus strengthening the argument of an autoimmune cause and therefore resemble to granulomatous thyroiditis, or granulomatous orchitis (23),(24). GM mastitis may occur due to exogenous hormones (oral contraceptives) or endogenous hormones (prolactins). Oral contraceptives induce hyperplasia in the lobular ductule, thus leading to the obstructive desquamation of the ductules, distention of the ductules and perilobular inflammatory reactions (25). Prolactins lead to postlactional granulomatous mastitis and this is associated with pregnancy. Fletcher et al. (1982) suggested that the finding of polymorphs in some of the ductular lumina might indicate a primary damage to the epithelium by some unknown agent, resulting in a leakage of contents and a subsequent granulomatous response in the surrounding stroma. In the recently reported cases, immunostaining showed that the lesions contained predominantly stromal T lymphocytes which favoured the possibility of a local immune response (26). This condition may respond to steroids and be associated with a high incidence of postoperative wound infections (6). In this patient, the lesion resolved with steroid treatment. Granulomatous mastitis can recur in up to 50% of the cases, usually within 6 weeks to 11 months after stopping treatment (11). In refractory cases or in those with persistent collection, immunosuppressants like methotrexate have been utilized along with surgical excision. IGM is rare and benign inflammatory process which is commonly mistaken for malignancy and other disease entities which is why it is often treated incorrectly .Correct diagnosis requires the exclusion of infectious aetiologies, other causes of granulomatous mastitis and malignancy combined with definitive histopathological confirmation. One must not accept granulomatous mastitis as tuberculosis, even in the area where tuberculosis is common, until and unless there is a clear history of tuberculosis and the involvement of other organs like the lymphnodes, in order to avoid the pitfall of prolonged treatment and side effect. Taylor GB, Paviour SD, Musaad S, Jones WO, Holland DJ. A clinicopathological review of 34 cases of inflammatory breast disease showing an association between corynebacteria infection and granulomatous mastitis. Pathology. 2003;35:109–119. doi: 10.1080/0031302031000082197 Erhan, Veral A Kara E, Ozdemir N, Kapkac M, Ozdedeli E, Yilmaz R, Koyuncu A, Ozbal O: A clinicopathologic study of a rare clinical entity mimicking breast carcinoma: idiopathic granulom atous mastitis Breast 2000, 9:52-56 Imoto S, Kitaya T, Kodama T,Hasebe T, Mukai K: Idiopathic granulomatous mastitis: case report and review of the literature.Salam IM, Alhomsi MF, Daniel MF , Sim AJ : Diagnosis and treatment of granulomatous mastitis. Br J Surg 1995, 82:214.
[Air-l] Organisational differences? cmess at drury.edu Mon Oct 16 04:42:34 PDT 2006 > Hi everyone, > I wonder if anyone can lend some literature to the impression I have > from interviewing a series of software engineers that their work in > technology organisations is more valuable that the work of other > parts of the organisation - e.g., "management", marketing, > facilities, etc. Knut Rolland (Dept. of Computer and Information Science, Norwegian University of Science and Technology, Trondheim, Norway: <knutrr at idi.ntnu.no>) now has the author's proofs of his forthcoming article, "Achieving knowledge across borders: facilitating practices of triangulation, obliterating digital junkyards¹¹" (part of a special issue of _Ethics and Information Technology_, made up of articles developed from a faculty workshop at NTNU in 2005 on Bridging Cultures: Computer Ethics, Culture, and ICT,¹¹ sponsored by the Programme for Applied Ethics at the Norwegian University of Science and Technology (NTNU), (May Thorseth, Director)). Rolland provides an excellent overview on literature relevant to organizational cultures, with an emphasis on computer science and engineering, and a specific focus on efforts to bridge various cultures within organizations (defined in part as _knowledge_ cultures, because they differ in their assumptions and practices as to what counts as knowledge and how knowledge is to be re-presented). His own case-study documents both a failure and an interesting success in a global organization to foster such culture-bridging collaboration, accompanied by careful analysis of the factors contributing to success / failure. I suspect that if you email him directly, he would be happy to share a version of his article with you. Good luck, and can you share your resulting bibliography with the list? Distinguished Research Professor, Interdisciplinary Studies <http://www.drury.edu/gp21> 900 N. Benton Ave. Voice: 417-873-7230 Springfield, MO 65802 USA FAX: 417-873-7435 Home page: http://www.drury.edu/ess/ess.html Information Ethics Fellow, 2006-07, Center for Information Policy Research, School of Information Studies, UW-Milwaukee Co-chair, CATaC conferences <www.catacconference.org> Vice-President, Association of Internet Researchers <www.aoir.org> Professor II, Globalization and Applied Ethics Programmes Exemplary persons seek harmony, not sameness. -- Analects 13.23 More information about the Air-l
Sydney's whaling fleet The whaling trade was a major industry in Australia during the nineteenth century employing hundreds of ships and thousands of men and providing the colonies with export commodities worth £4.2 million by 1850. Sydney was the main Australian whaling port with a fleet that produced whale oil and baleen valued at £2.6 million between 1825 and 1879. Whaling moreover was an activity that had a number of advantages over the wool industry that developed at the same time. It took years of careful breeding and slow natural increase of sheep flocks before wool production became paramount. But whale numbers were at their maximum from the very start. The wool clip was gathered only once a year, but whales could be taken by deep-sea whalers all the year round. British South Sea whaling British South Sea whaling had its origins in the American War of Independence, which began in 1776. The conflict had a number of commercial consequences, one of which was disruption in American sperm whale oil exports to the United Kingdom. The oil was important as a machine lubricant for the Industrial Revolution then underway in Britain. It was also employed as a high quality lamp fuel, as it burnt with a bright clear light and left no smell. Although Britain continued to receive oil from her Arctic whaling fleet, the 'black' oil from the northern right whale had fewer uses and was worth only half as much. To get the sperm whale oil needed for her economy, Britain began to send her own vessels into the south Atlantic. They were commanded at first by expatriate American captains, with other Americans aboard to teach the British seamen the dangerous task of capturing the more active and aggressive sperm whale. The government was keen to see the fishery flourish and provided bounties and other forms of assistance to help the trade develop. The war ended in 1783 and sperm whale oil exports resumed from the United States. But British southern whalers were reluctant to relinquish the profits of the trade to their American rivals and so British involvement in the fishery continued and grew in scale. A feverish enthusiasm for South Sea whaling developed in London and led one contemporary to remark in 1785 that, The spirit of whaling seems almost run to a degree of madness; they intend if men can be got to send out 30 ships, but at present there appears no possibility of getting men. Into the Pacific A new era of expansion began in 1788 when the London whaler Emelia rounded Cape Horn and entered the Pacific Ocean, returning home two years later with a full cargo of sperm whale oil. By the time she was ready to sail again, 10 other London whalers were preparing to follow her into a region whose whaling potential seemed as vast as the Pacific Ocean itself. The first Pacific whaling ground to be exploited was off the coast of Peru. Sperm whales were plentiful there and supplies could be obtained at Spanish colonial ports on the coast of South America. However the outbreak of war with Spain in 1797 closed these ports to British whalers and Spanish warships began to harass and capture such vessels found offshore. Suddenly, Sydney, on the other side of the Pacific, started to look attractive as a base for British whalers. British whalers at Port Jackson Even before the outbreak of hostilities with Spain, British whalers and sealers had started to visit Sydney. Indeed, they were the most frequent visitors to Port Jackson during the first decade of settlement. As well as those that came independently, at least one third of the convict transports and store ships sent by the government before 1800 were British whalers under charter. After unloading their cargoes at Port Jackson, around 25 per cent of these former whalers resumed their old trade from Sydney. Visiting whalers were much appreciated by the early governors, all of whom were navy men and keenly aware of the benefits a major maritime industry like whaling could bring to a remote and isolated new colony such as New South Wales. To encourage whalers to call, the governors did their best to accommodate the industry. None did more than the first governor of New South Wales, Arthur Phillip, who had begun his maritime career on the British northern whaler Fortune in 1753. An example of his assistance to the trade occurred in 1791 when the chartered British whaler Britannia arrived at Port Jackson with a cargo of convicts. Governor Phillip had planned to send the vessel and its passengers to Norfolk Island to establish a settlement there and then buy the ship for use by the colony. However when the captain of the vessel told of seeing large numbers of whales off the coast and expressed his intention to give this new whaling ground a trial, Governor Phillip abandoned his own plans for Britannia, and even made additional boats available so the convicts could be quickly landed and the whaler get on her way. The British and American whalers that called at Sydney provided more regular communication with the outside world and occasionally they sold provisions to the settlers who were sometimes on the brink of starvation. According the American author Herman Melville (1819–1891), That great America on the other side of the sphere, Australia, was given to the enlightened world by the whaleman. After its first blunder-born discovery by a Dutchman, all other ships long shunned those shores as pestiferously barbarous; but the whale ship touched there. The whale ship is the true mother of that now mighty colony. Moreover, in the infancy of the first Australian settlement, the emigrants were several times saved from starvation by the benevolent biscuit of the whale ship dropping at anchor in their waters. The colonists of New South Wales were eventually able to feed themselves and in a position to give the visiting whalers more help than they received. They provided the visitors with provisions, wood and water and a place to rest and repair before they continued on their long and arduous voyages. Those visiting whalers, and the commerce they stimulated, were important in the early economic growth of New South Wales. But years more would pass before the residents of Sydney sent their own ships to go whaling in the Pacific. The early years The people of Sydney were well placed to enter the industry. The Pacific Sperm whaling grounds were relatively close and other whale species came closer still, migrating along the coast at certain months of the year. But while Port Jackson continued to serve as a port of call for British and American whalers, local entrepreneurs did not immediately enter the trade. The Sydney commercial community was relatively small, and deep-sea whaling was an expensive activity. The cost of a deep-sea whaling ship – fully equipped and ready for sea – could exceed £10,000. There was also a shortage of seamen in the colony, particularly men with whaling experience. So local maritime entrepreneurs confined themselves at first to easier and less capital-intensive activities, such as sealing or the sandalwood trade. The stimulus to enter the trade seems to have been the founding of Hobart in September 1803. Soon after settlement began in Tasmania it was discovered that the Derwent Estuary was a seasonal breeding ground for the southern right whale. The news excited the maritime community in Sydney and prompted thoughts of direct participation in the industry. The first Sydney-owned vessel to go whaling seems to have been the King George owned by Lord, Kable and Underwood, which left Sydney on 27 June 1805 and was bay-whaling for southern right whales in the Derwent Estuary by the middle of July. The first local sperm whaler was the Argo, which departed Port Jackson on 5 September 1805. John Macarthur owned the vessel and had earlier used her to bring merino sheep to the colony. Macarthur and Argo were thus instrumental in founding two early Australian primary industries. Australian whaling met with early success, particularly in the Derwent, where the pioneer settlers of Hobart did not even need ships to take part, having only to set out small whaleboats from shore to capture right whales each winter. However the fledgling colonial industry had a powerful enemy. This was the London whaling lobby, the owners of South Sea whalers based in Britain, who petitioned the government in the United Kingdom to impose a heavy import duty on colonial whale oil and baleen exported from Australia. They argued that the British whaling fleet was a major source of maritime wealth and of skilled seamen for the navy in times of war and so its continued success was of national importance and should be given priority over the commercial interests of a few free settlers in her distant penal colonies. The result was a high import duty imposed on colonial oil in 1809 that all but ended the industry in Australia for a time. This continued until the early 1820s when memorials from Australian merchants and recommendations by Commissioner John Bigge in his famous report on the colony resulted in a reduction in the duty on colonial oil landed in Britain, and allowed whaling to begin once more in Australia. A profitable activity The industry went on to become a lucrative enterprise in the colonies. The period of peak activity was from 1820 to 1855 when Sydney whalers made 558 pelagic or deep-sea whaling voyages from Port Jackson. As well as her deep-sea whalers, Sydney was home to a fleet of other craft that acted as service vessels to shore-based bay-whaling stations. These smaller vessels, mostly schooners, took men and equipment to whaling stations scattered along the coast of Australia and New Zealand, and brought back the oil and baleen from migrating southern right whales. Casks of whale oil were a welcome cargo on trading vessels sailing to Britain, as they helped to deadweight the vessel so that little or no ballast was needed. The rest of the hold could then be filled with a lighter cargo, such as wool. Preparations for a whaling cruise Considerable preparation was required for a whaling voyage. The vessel had to be made staunch and strong and in every way fitted for a long sea voyage in some of the most dangerous waters in the world. The hull had to be well caulked and the rigging in good order. If new to the trade, the vessel would be fitted with davits to hold the whaleboats. The deck would also need to be strengthened amidships to support the weight of the brick try-works to house the metal cauldrons in which the blubber was boiled. Among the many things loaded aboard were barrels of salted meat and a supply of empty wooden casks to store the whale oil. Whaleboats, harpoons and lances and coils of whale line were also essential equipment. The rapid growth of the whaling fleet in Sydney soon outran support infrastructure, and preparations sometimes took place on a nearby beach. In 1829 it was recorded that, Cooper and Levey are making extensive preparations for the Sperm fishery. The beach near Bennelong's Point is quite a scene of bustle with casks, whale boats, coopers, painters, &c A stimulus to infrastructure development The construction of new wharves, slipways, dry dock facilities and warehouses was a benefit of having a growing and active whaling fleet at Port Jackson. In addition to new construction, old facilities were more intensively used and existing structures were extended or rebuilt. The growing volume of trade in the 1830s saw land reclaimed at Darling Harbour to provide additional infrastructure for the rapidly expanding whaling fleet. Facilities further afield were developed after Archibald Mosman and John Bell applied for land at Great Sirius Cove (Mosmans Bay) in 1830. Mosman later bought out Bell, and built a complete refitting establishment for whaling vessels on the land. Facilities included a heaving-down wharf with deep water alongside sufficient for large ships, a two-storey stone warehouse 50 metres long with a sail loft in the upper floor, and cottages to accommodate the crews of a vessels being fitted out. Its location away from Sydney was an advantage for captains who did not want to see their seamen lured away by the attractions of the city. Better facilities encouraged more British and American whalers to visit Sydney, where their expenditure in port delivered additional stimulus to the local economy. Some British whalers found it convenient to base themselves for extended periods at Port Jackson, thus further increasing the size of the Sydney whaling fleet. Shipbuilding and marine insurance Shipbuilding in Sydney also benefited. The shipyards of Darling Harbour and Johnstons Bay were capable of building and repairing the ocean-going barques, brigs, ships and schooners used in the trade. They also made the whaleboats, four or five of which were carried on each deep-sea whaler. A whaling voyage was a hazardous venture that might last for a year or two. The ship and outfit could absorb much capital and even when well managed, the financial risk to shipowners was considerable. It was therefore essential for owners to reduce the risk and the possibility of loss, by taking out marine insurance on the ship and its contents. This included the valuable cargo, which, on a successful cruise, could easily exceed the value of the ship and outfit. This compelling need stimulated the marine insurance business in Sydney and the creation of new firms, such as the Mutual Insurance Company founded in 1840. Employment and income The large crews carried on whaling ships made the industry a considerable employer of maritime labour. The 42 deep-sea whalers based in Sydney by 1837 employed around 1,300 seamen. Most were British mariners, but colonial-born sailors also joined the fleet, and as they learned their demanding profession they soon became prominent in the industry. The profitability of South Sea whaling in the early years, and the fact that men were not paid a set wage but instead were given a share of the profits – known as a 'lay' – made it an attractive trade for mariners. The lump sum payment at the end of a successful voyage was a major incentive to men normally on meagre wages and at voyage's end, and with money in their pockets, they would descend on the pubs of Sydney where they forged a reputation for hard drinking revelry. The industry provided work for a host of other professions. Coopers, sailmakers, dockyard caulkers, anchor smiths, block-makers, shipwrights, ship chandlers, mast-makers, clothing outfitters, insurance agents, wharfingers and warehouse owners all catered to the trade. Sydney butchers and bakers supplied sea stores, and local ropewalks made whale lines and rigging for the ships. Indirectly involved were customs house officers, pilots, publicans and boarding house owners, harbour watermen (who provided a water taxi service), wharf labourers, crimps, banks and brothels. The government also profited, via revenue from port charges and customs duties, and by the sale of provisions to whaling vessels. Another to benefit was John White, oil merchant, street lamp contractor and owner of a lighting goods store, The Blazing Star. White also turned his hand to the manufacture of spermaceti candles in the 1830s. A colourful and eccentric character, he attracted customers by a running series of humorous newspaper advertisements in which he chronicled his difficulties in mastering spermaceti processing and poked gentle fun at his competitors. His business prospered, and by 1832 he was buying the entire cargoes of arriving whalers. He even found a way to use the foote or residue from spermaceti processing, selling it as an ointment to treat scab in sheep. White employed 20 men in the business and by 1834 he had moved into property development with the construction of a row of houses in George Street. Whaling success allowed Captain George Grimes, the son of the second Surveyor-General in New South Wales, to build a substantial home in 1834 and a row of two-storey terrace houses at Millers Point in the 1840s. Captain Sylvester Brown, the father of the author Rolf Boldrewood (TA Browne), and Captain Lewin Wiles both acquired considerable wealth from whaling. And the successful whaling careers of Captain Joseph Moore and Captain Robert Duke allowed them to become prominent shipowners and merchants in Sydney. But those who profited most were the Sydney entrepreneurs who owned the vessels, exported the oil and supplied the equipment, provisions and the dockside services needed to speed the ships on their way. Among these were John Macarthur, Robert Campbell, James Underwood, Henry Kable, Benjamin Boyd, Robert Towns and Alexander Brodie Spark. A whaling station at Sydney heads Sydney became more directly involved when a whaling station was established near Sydney heads in July 1838. Seven boats and about 40 men soon formed a small settlement at Camp Cove. The South Head presented more the appearance of a fair than a quiet little watering place on Sunday, owing to a whale having been caught by one of the parties who have taken up their station at Camp Cove. Boats of all sorts and sizes, manned by crews of all ages, were hourly pouring down from Sydney, all with eager eyes to see the whale cut up. Pic Nic parties were to be seen at every turn discussing the important point of how much oil she would turn out … Poulterers, and pastry cooks, publicans and whaling gents out of a berth, were to be seen on the sand, all eager alike to see and congratulate the fortunate fellow that struck the fish and brought it in a prize. But the small number of whales taken at the heads and the expense of keeping the men and their boats in constant readiness caused the station to be abandoned after a few months of operation. Decline in the trade Whaling was a lucrative industry in the early years when whales were plentiful and the number of vessels hunting them was relatively small. Sydney deep-sea whalers in the 1820s took an average of 81 barrels of oil per month at sea, resulting in profits for the shipowners and good wages for crewman who participated in that success via the 'lay' or share system of payment. Australian whaling peaked in the 1830s, when there were 118 vessels involved in the industry at Sydney and Hobart. But even during that decade of peak activity, the industry had started to decline as years of ruthless slaughter began to take a toll. Whale stocks fell steadily and made it increasingly difficult for vessels to return to port with a full ship. In the 1840s, Sydney whalers averaged just 38 barrels of oil per month at sea, resulting in a steep fall in profits and seamen's wages. Owners started to take their vessels out of the trade. And the vessels still involved found it difficult to attract experienced seamen. Owners had to man their vessels with whomever they could get, which often meant men with little or no maritime experience. The racial composition of crews also changed, with increased numbers of Pacific Islanders recruited to go whaling. Maori seamen in particular became common on Sydney vessels, their courage and hardiness making them particularly suitable as harpooners. Between voyages, they and other Pacific Islander seamen lived in a huddle of Sydney waterside boarding houses and rookeries known as 'Maori Town'. The most lucrative year was 1839 when the fishery supplied Sydney with exports worth £228,122. But the decline was swift and the trade that gave New South Wales some 52 per cent of her exports by value in 1832 contributed just 1.4 per cent by 1850. The discovery of gold in 1851 came as a blow to whaling. Seamen would desert their ships en masse and it became near impossible to recruit in Sydney. The few vessels still involved had to sail forth with a skeleton crew to the Pacific islands, where they would recruit the majority of their men they needed. During the second half of the nineteenth century there were periodic returns to whaling. A spike in the price of sperm whale oil in 1870 prompted one such resurgence of interest. Vessels were brought back into the trade and by July that year there were eight local vessels whaling again from Port Jackson. The owners formed the Sydney Whaling Company in 1871 and issued a prospectus to raise capital to buy new vessels and improve their existing ones. Interest in whaling, and the prosperity it could bring, continued into the twentieth century. In 1929 for instance, a prospectus was issued for the Pacific and Ross Sea Whaling Company. The directors hoped to raise £500,000 to send Norwegian crews in steam catchers to whale in the Ross Sea in the Antarctic. Some Sydney families were involved in the trade for generations. One such whaling dynasty was the Underwood family. The patriarch was the emancipist merchant James Underwood, a prominent early entrepreneur and an owner of the first Sydney whaler in 1805. Two of his sons, and a son-in-law, commanded Sydney whalers, while one of his grandsons, William Underwood, and his sons, operated a whaling/trading station at Vanuatu in the 1860s and 1870s. Significance and achievements Whaling generated considerable wealth for Sydney and supplied the colony with a major export commodity. The profits earned by ship owners and the wages that were paid to crewmen flowed on to the rest of the community and became a welcome second strand to an economy that was otherwise dependent on the growing wool industry. The 'oil boom' of the 1820s and 1830s provided Sydney with the same kind of feverish excitement the discovery of gold produced in 1851. Like the gold-rush era, the whaling phase was ephemeral in nature. But while it lasted, it provided a focus for colonial enterprise and a profitable area of investment for Sydney merchants. A good part of the capital which had [been] so lavishly employed in the import trade, they are gradually diverting into that safer and infinitely more productive channel – the oil-fisheries … the whaling merchants are public benefactors, entitled to the gratitude of the whole community. They are stopping the inlets of Australian poverty, and opening those of Australian wealth. If Providence has not enriched our mountains with the diamonds of Golconda or the precious ores of Peru, it has environed our shores with an ocean on whose billows silver and gold may be said to float. The demanding nature of the profession called for capable and daring men who sometimes went on to achieve prominence in other fields. At least three future parliamentarians – Captain Bourn Russell, Captain William Rhodes and Dr Richard Bowker – went whaling from Port Jackson, as did James Merriman, later Mayor of Sydney. Two prominent literary figures were also involved: the poet Henry Kendall and the American novelist Herman Melville both served on Sydney whalers and later wrote about their experiences. Melville recorded his Australian whaling experiences in Omoo (1847), although he is better known for his other whaling novel Moby Dick (1851), a classic of American literature. The long periods they spent at sea in imperfectly charted waters meant that Sydney whalers found and noted the location of unmapped reefs and rocks and, sometimes, entire islands. Captain Grimes of the Sydney whaler Woodlark is credited with discovering Woodlark Island (Murua) east of New Guinea in the 1830s. Lady Rowena goes to Japan Another Port Jackson whaling voyage became historic for an entirely different reason. In March 1831, the Sydney whaler Lady Rowena limped into in a bay on the coast of Japan, suffering storm damage and in need of repair. The commander of the vessel was Captain Bourn Russell, a forceful individual who later became a New South Wales parliamentarian. Over the next few weeks, the whalers repaired their ship and gathered the water and wood they needed to continue the voyage. But they had no luck in obtaining food from the impoverished local villagers, who tried to avoid any contact with the visitors. The cold reception of the villagers hardened with the arrival of a detachment of Japanese troops. Barricades were thrown up and the villagers were armed with pikes by the troops. The whalers thought they might be attacked and so Captain Russell pre-empted any such assault by ordering his men to fire their muskets over the heads of the Japanese. A number of other clashes occurred, including one occasion when they fired at a group of mounted Samurai, wounding and capturing one of them. The seamen finally finished their repairs and sailed away on 16 April 1831. Before going, they plundered and then set fire to the nearest village, and released their wounded prisoner with a letter to the Emperor, complaining of their unfriendly reception, and justifying their own aggression as a response to that hostility. So ended the first record of contact between Australia and Japan. Max Colwell, Whaling around Australia, Rigby, Adelaide, 1969 William John Dakin, Whalemen Adventurers: The story of whaling in Australian waters and other southern seas related thereto, from the days of sail to modern times, Angus and Robertson, Sydney, 1963 Barbara Little, 'The Sealing and Whaling Industry in Australia before 1850', Australian Economic History Review, 9 (2) September 1969, pp 109–127
President confers Padma Awards on 54 personalities New Delhi, April 5, 2013 President Pranab Mukherjee presented the Padma Vibhushan, India's second highest civilian honour, to noted sculptor and architect Raghunath Mohapatra and well-known scientist Yash Pal at a civil investiture ceremony held at Rashtrapati Bhavan today. Mr Mukherjee also conferred the Padma Bhushan on ten people and Padma Shri on 42 people at the ceremony. In all, 108 people were chosen for the Padma awards this year, including four for Padma Vibhushan, 24 for Padma Bhushan and 80 for Padma Shri. The remaining awards will be presented at a second investiture ceremony later this year. Vice-President M Hamid Ansari, Prime Minister Manmohan Singh, several Union Ministers and other dignitaries were present at today's ceremony. Those who received the Padma Bhushan today were cricketer Rahul Dravid, conservationist Hemendra Singh Panwar, senior Maharashtra Congress leader Shivajirao Girdhar Patil, filmmaker D Ramanaidu, Mohiniattam exponent Kanak Rele, DRDO chief Vijay Kumar Saraswat, scientist Ashoke Sen, literary theorist and philospher Gayatri Chakravorty Spivak, actress Sharmila Tagore and industrialist Ramamurthy Thyagarajan. The 42 people on whom the Padma Shri was conferred are: Prof Anvita Abbi, Prof Dr Mohammad Sharfe Alam, Mr Gajam Anjaiah, Prof Rajendra Achyut Badwe, Dr Hemendra Prasad Barooah, Mr Pablo Bartholomew, Swami G c D Bharti, Dr Ravindra Singh Bisht, Mr Avinash Chander, Dr Taraprasad Das, Prof Trichur Viswanathan Devarajan, Prof Sanjay Govind Dhande, Prof Saroj Chooramani Gopal, Ms B Jayashree, Ms Sridevi Kapoor, Dr Ramakrishan (Posthumous), Mr Salik Lakhnawi (Posthumous), Mr S Lakshminarayana, Ms Vandana Luthra, Mr S K M Maelanandan, Mr Kailash Chandra Meher, Ms Neelima Chandrashekhar Mishra, Mr P Madhavan Nair (Madhu), Prof Sankar Kumar Pal, Mr Brahmdeo Ram Pandit, Ms Rajshree Pathy, Dr Deepak Bhaskar Phatak, Dr Mudundi Ramakrishna Raju, Dr C Venkata S Ram, Ms Manju Bharat Ram (Posthumous), Mr R Nageswara Rao, Mr Surender Sharma, Ms Jaymala Jayram Shiledar, Dr Rama Kant Shukla, Mr Ngangom Dingko Singh, Prof Ajay Kumar Sood, Mr Bajrang Lal Takhar, Pandit Suresh Talwalkar, Mr Rajendar Kumar Tiku and Prof Akhtarul Wasey. The Padma awards are given for achievement in various disciplines and fields of actiities such as art, social work, public affairs, science and engineering, trade and industry, medicine, literature, education, sports, civil service, and so on. The ‘Padma Vibhushan’ is awarded for exceptional and distinguished service; ‘Padma Bhushan’ for distinguished service of high order and ‘Padma Shri’ for distinguished service in any field. The awards are announced on the occasion of Republic Day every year.
Construction on the new Rubenstein Library is in full swing. Library staff and patrons have no doubt observed the temporary walls around the library building, seen the giant crane in the loading dock, and heard the dulcet tones of demolition throughout the Perkins stacks. Rubenstein and Duke University Library staff had the opportunity to take a fascinating tour of the construction in progress in recent weeks. Here are some highlights. First off we got to wear official vests, hard hats and protective glasses – safety first! Above our touring librarians and archivists are pictured in the old Rubenstein reading room, looking into the a section of the 1948 closed stacks previously referred to as the “cage.” The renovation of the Gothic Reading Room has also started, and demolition crews are removing non-original features of the room. Please note that both the character of the room and its distinctive architectural elements will be retained as we modernize the building. The windows and light fixtures will be restored as close to their original look as possible, but the shelving will be replaced. We toured the entire construction site with Will Dunlop from EHG Demolition. Will commented that the Gothic Reading Room is “one of the most beautiful rooms I’ve ever been called upon to wreck.” The demolition process has revealed the old exterior wall of the 1928 building. Originally, the Gothic Reading room had windows on both sides of the room. When the 1948 addition was built, one side of windows were filled and the exterior wall was covered by the expansion project. In the first picture above we see the old exterior wall, and the outline of decorative stone elements that were removed. The next image shows the remains of ivy vines that must have been growing on the exterior wall when it was covered around 1948. The Rubenstein Library director and collection development offices, formally on the 2nd floor of Perkins outside of the Gothic Reading room, have been completely demolished. Here you see the gutted space and the bracing that has been added to protect the building’s structure during renovation. The room formerly known as Perkins 201 was located right across from the Breedlove Room. Our Technical Services Department worked there before moving to Smith Warehouse several years ago. As you can see in the picture, the windows have been removed and boarded up. This is also where debris is being taken and pitched to dumpsters in the loading dock. Out on the loading dock you can see where a chute (the black tube looking thing coming out of the top window) has been constructed to funnel debris from the demolition area (and Room 201) into dumpsters. Post contributed by Molly Bragg, Collections Move Coordinator. Search The Devil’s Tale Tag Cloud2011acquisitions 2012acquisition 2013acquisition advertisements advertising African American history archives artistsbooks civilwar conservation diaries digitization documentary dorisduke dukehistory durham durhamhistory economists events film fullframe games Haiti Heschel holidays human rights letterhead literature longcivilrights madmen Mad Men madmenmondays medicine movediary move prep movinghom photography recipes renovation rubensteinstaff scrapbooks sports students women's history zines The Devil’s Tale Archive - William Clark Missouri Territory treasury receipts, 1810, 1815. November 21, 2014 - Frost family genealogy and history, 1975 and undated. November 21, 2014 - Edward S. Ransom letters, May, November 1863. November 21, 2014 - Harry L. Mitchell printed materials on the Southern Tenant Farmers' Union, 1972-1974 and undated. November 20, 2014 - Mulligan family papers, 1864-1880 and undated. November 20, 2014 - Ireland's miseries: their cause. From the Plough, the loom, and the anvil, for September, 1852 November 21, 2014 - Reflections upon the conduct of human life : with reference to the study of learning and knowledge : in a letter to the excellent lady, the Lady Masham November 21, 2014 - General order, no. 1 November 21, 2014 - Der Prairiefuchs : eine Erzählung aus dem Amerikanischen (Volume c.1) November 7, 2014 - Ferdinand Lasalle : ein Roman al fresco (Volume Bd.1 c.1) November 7, 2014
Several people have asked for examples of my lesson plans lately, which is both flattering and terrifying. Flattering for all the obvious reasons, and terrifying because I can always see the flaws in my lessons when I write them out to share, and terrifying because my “lesson plans” are the barest sketches of outlines regardless of how many hours I’ve put into preparation, tailoring the class to the specific assignment at hand and trying to match the course professors’ ultimate learning goals as much as possible. When I get into the classroom with 2 or 3 learning goals firmly in mind, an interactive exercise or two up my sleeve, and notes about readings the students have been or will be doing and how to mesh those with my own session, the actually class is more like jazz — playing off of the outline and goals but also off of the students and the course professor. So lesson plans are kind of hard for me to write down in a way that feels authentic. Still, with all that as preamble, it occurs to me that even sketches can help people looking for ideas. I’ve benefited greatly from colleagues sharing their sketches with me. So here goes. (I’ve chosen to focus on 100-level classes because the people asked me about those specifically.) First, there are several modules that I’ve already written about here in more or less detail. While they shift with the given context, I love to work them in whenever relevant, and I think they help 100-level students begin to get some practice with the kind of critical information literacy that my colleagues and I wrote about in our recent article CSI(L) Carleton: Forensic Librarians and Reflective Practices. Other similar modules are linked to in the lessons plans I’ve sketched out later in the post. - The value of book reviews I started toying with this before the Information Literacy in Student Writing really got going, but I’ve continued to use book reviews as valuable sources since and worked it in whenever I can because of the useful habits of mind it helps develop. - Citation as a lens for interdisciplinarity This one really is a fleshed out lesson plan (which takes about 20 minutes) and the main points of which I’ve used over and over again in many courses with great success. - Turning topics into searches Builds off of the idea of concept mapping in ways that then generate source decisions and search terms in very practical ways. This takes about 15 minutes and it helps if you have some seeds to start with that you can lay out on the board as the students are working. Most classes need to get at some combination of conceptual and practical learning goals, so here are two very different sessions that I’ve given recently. I chose the first NOT because it’s one of my crowning achievements. It’s anything but that and I’d love to hear ideas for streamlining it. But it does show the combination of practical and conceptual, and it’s a multi-cultural topic (which matches the needs of at least one of the people who asked for a lesson plan example). In terms of the match with the concepts we wrote about in the “CSI(L) Carleton” article, this class teach concrete search skills but emphasize the context-building nature of scholarship, the importance of watching for the breadcrumbs scholars leave for you in their writing to tell you what they’re drawing on, what related concepts are important, and the purpose of using sources in the first place. CCST 100: Growing Up Cross Culturally (had to be taught in a room with no student computers) Assignment: Write a paper based on one of the cross-cultural studies topics they’ve talked about in class (which follow the life-stages and study how cultures influencing each other can change the way people experience those life stages, such as birth, childhood, adolescence, marriage, adulthood, old age, and death). Find a few sources (3-5-ish) outside of course readings to support your arguments. Students are encouraged to take inspiration from recent international news/culture stories. Resources: Research Guide, New York Times article on Japanese tooth un-straightening, and a Term Diary Introduction (10 minutes) - Why only a few sources? The purpose of your sources is not to provide an exhaustive list of everything written on your topic. It’s also not to allow you to write a report. Instead, you’re writing your own paper, and you’re using a few outside voices to help you situated your ideas within the “conversation” that’s already happening on a topic. Conversations don’t work well if you parrot back what everyone says, but they also don’t work well if you just go on in a monologue and make everyone sit back and listen. Conversations work well when you build on what people have said and contribute new ideas or perspectives. - What constitutes “on my topic”? We often look for things that are “on our topics” but sometimes it’s more interesting (or necessary, if the topic is too new) to look for related topics or analogous topics and talk about how they support or contribute to your understanding of your topic. THIS IS OK. Scholars do it all the time and for this assignment it’s almost a given that you’ll have to do the same. Give some examples. (First year students often don’t realize this is allowed.) Brainstorming Exercise (working in small groups – 20 minutes) - Term economy (see this blog post) Computers can’t read. They match letters in a row. Consequently, we have to figure out what letters in a row to feed into the computer to make it spit out the results we want. This is why we’ll be using a term diary to record keywords and phrases as we go along today, and then using those to help us come up with new searches. In small groups, read the New York Times article on the new fad where Japanese women make their teeth crooked. Answer the following questions and report back. We’ll use these concepts and terms for our searches in the rest of the session. - What concepts is this related to? (symmetry, beauty, youth culture, individualism, etc) - Who might have written more about this or related concepts? - What questions might they have asked of these topics? - Where might these things have been published? (blogs, newspapers, academic articles, books, etc) - What are some key terms associated with these topics? Wikipedia with a glance at Goolge (5 minutes) - Basic searches using key terms already generated. These will inevitably reveal a wikipedia article. Mention that this is wonderful. Watch students faint in surprise… - discussion: You’ve heard that wikipedia isn’t good to use — why is that? What might it be good for? (use as a jumping-off place like any other reference work, good for term gathering and to point you toward related concepts and further reading — bibliographies are wonderful things) - term gathering and source gathering as we jump around and follow links through Wikipedia together with students leading as much as possible– add to our growing list of terms in our term diaries (In this year’s class, we stumbled on the term “wabi-sabi” which is about the many things, including the aesthetic of asymmetry.) LexisNexis, for the international coverage (10 minutes) - Point out that we’re searching “every word the journalists wrote” so think like a journalist when coming up with terms to try. - Try several searches using the terms we already found (letting students choose). Collect new terms, concepts, and potential authors/experts along the way. - Introduce the idea of concept clusters (i.e. boolean searching) Academic Search Premier (10 minutes) - Explain the differences between free-text databases and indexing/abstracting databases — now we have to think like scholars/librarians when choosing terms to use - how to limit to scholarly articles - discussion of how scholarly articles differ from newspapers in terms of scope and topic coverage - student-lead searching as before, this time introducing the power of subject headings. Books (5 minutes) - Books often contain much broader topics than articles, so now we have to zoom out and look at broader topics that might give us good foundations for our topic. - student-lead searching as before, pointing out the importance and power of subject headings. - Point out call numbers — remind students that they can ask for help, especially the first few times they use call numbers to locate books - There is no one perfect search — try combinations of terms and write down new terms/concepts as you come across them - Librarians can help you, so come talk to us about your specific topics. - TOO MUCH STUFF — The constraints of space and the breadth of the assignment were working against us, but really it was too many things. Next time I will almost certainly cut out the books section. I just don’t know yet what to do about the rest, but this is probably double what it should have been. - Emphasize the brainstorming/problem-solving part of when searches fail — The students didn’t seem to understand well enough why we weren’t concerned with failed searches so next time we need to build failed searches more explicitly into the expectations. ENGL 100: Visions of the Waste Land Context: This course had no research component. It was important to the professor that students learn to read closely and delve into the primary source text. However, the professor and I both realized that it can be hard to find interesting things in texts if you lack the context to know what’s interesting when you see it. So we devised this context-building session and assignment to help students know how to build up their own knowledge to the point where they can accomplish the kind of careful reading the professor wanted. Assignment: Select an article that is illuminating, write a 200-word summary to be handed in, be prepared to lead the class in a discussion of a passage in the book based on both your interpretation and the article you found. Resources: Research Guide Introduction (5 minutes) - Matching Evidence to Audience There are lots of kind of evidence, and in other courses you’ll be asked to find books and articles and statistics and images and who knows what else to back up your arguments. Lead a little discussion about kinds of evidence that may matter to some audiences but not others, like blogs or something your aunt said or aggregate statistics vs data. In this course your evidence is the text itself and your audience is not interested in other kinds of evidence. However, all of this doesn’t mean that YOU aren’t allowed to know things other than the text. Far from it. Context-building helps you figure out what questions to ask of the text and also to see how other scholars in the field have accomplished this kind of thing so that you can model yourself a bit on their approaches. Finding Models to inspire you and aspire to: (5 minutes) - Show how to search within the publication “The Explicator.” Finding the backgrounds of words: OED (use “smashing” as an example) (5 minutes) - How words get into the OED - What’s in there (etymologies and date charts and quotes) Scholarly articles often provide a lot of context/insight: JSTOR (20 minutes) - Limit to literary journals only - Building concept clusters - Brainstorm together about some concepts that might be interesting to follow up and what words might be associated with those concepts. Work together to cluster those concept (having students write on the whiteboard together) - Have students work in small groups to find an article and report back on why they chose the article they did (emphasizing aspects of evaluation by making them articulate a choice and discuss it together). Following up on a citation (15 minutes) - Usually one of the best ways to find information because scholars index their own literature. Bibliographies are creative things build from experience and wide readings, which means you can find connections to things you wouldn’t find purely by searching. - Explain that book citations list a place and publisher while articles don’t, and how to follow up on book citations (catalog) vs article citations (A-Z list) – this whole thing takes about a minute. - Working in small groups again, use the article they found JSTOR to find a book or article that we have access to. Bonus points if you find a book citation that we have access to. - Go together to collect one of the found books from the stacks (have an example on hand just in case nobody found a book that’s available). Look at near-by books to talk about what kinds of context that helps them build. Mention that similar call numbers in different areas of the library (reference, periodicals, etc) will be about similar topics. Show the “Google of the book” (i.e. the index) of a book. Wrap-up (10 minutes) - Group discussion about how what we’ve found today applies to what they’re reading. Any words or themes that seem more important now?
NOTICE : Nov. 28 - Holiday office and power outage closures. Click for details. The development of various patterns of literature instruction in the elementary school are studied. Emphasis is on the development and enrichment of children's literary taste and appreciation. Laboratory experiences are included. 3 credit hours - elementary school teaching experience or consent of instructor Page last updated: October 2, 2006
XPGIXeroderma pigmentosum G I-region |SMART accession number:||SM00484| |Description:||domain in nucleases| |Interpro abstract (IPR006086):| This entry represents a protein domain found on Xeroderma Pigmentosum Complementation Group G (XPG) protein [(PUBMED:8206890)]. The function of the internal XPG (XPG-I) domain contains many of cysteine and glutamate amino acid residues that are frequently found in various enzyme active sites, DNA nucleases. The I domain, together with the N-terminal forms the catalytic domain that contains the active site [(PUBMED:14726017)]. Proteins in this entry are endonucleases that cleave the 5'-overhanging flap structure that is generated by displacement synthesis when DNA polymerase encounters the 5'-end of a downstream Okazaki fragment. |GO function:||nuclease activity (GO:0004518)| Click on the following links for more information. - Evolution (species in which this domain is found) - Literature (relevant references for this domain) - Disease (disease genes where sequence variants are found in this domain) - Metabolism (metabolic pathways involving proteins which contain this domain) - Structure (3D structures containing this domain) - Links (links to other resources describing this domain)
MARISA, SANDRA DWI (2009) NILAI RELIGIUSITAS ISLAM DALAM KUMPULAN CERPEN “LUKISAN KALIGRAFI” KARYA A.MUSTOFA BISRI (SUATU PENDEKATAN RELIGIUSITAS SASTRA). Other thesis, University of Muhammadiyah Malang. Download (120kB) | Preview The research was conducted by consideration that belles-lettres was not detachable with religion. That’s can be seen by short story compilation “Calligraphy Painting” creation A. Mustofa Bisri which is very dominant by religious value. Besides, it can be seen from the contents and delivery technique. The use of language that full of Java language, choice of words is very simple and easy comprehending by common society, but it didn’t leave religious message or value in his creation. The objective of this research is to obtain objective description about Moslem religious value in the short story compilation “Calligraphy Painting” creation A. Mustofa Bisri, include: 1) Morals to God include thanks God, sincere, and repent, 2) Personal morals including be brave (syaja’ah), be patient, and be modest (tawadhu’). The research uses qualitative approach that focuses and sees through religious viewpoint. The method used in this research is descriptive qualitative method by explaining and describing object researched and Moslem religious value in the short story “Calligraphy Painting”. Data source in this research was story unit contain in the short story compilation “Calligraphy Painting” creation A. Mustofa Bisri. Techniques used in this research were (1) Data collection technique used was analysis to text (2) Data processing technique used was descriptive qualitative technique. The result of this research showed that Moslem religious value in the short story “Calligraphy Painting” creation A. Mustofa Bisri including: 1) the form of morals to God including thanks God was reflected by deed and orally, sincere including ingenuously to do a job, and also repent didn’t read or believe prophetic anymore, crying and regret because of they’d done, changing attitude better. 2) the form of personal morals including be brave (syaja’ah) it means that we’re brave to blame if we see something was not right, against the tradition contrary to the religion, critics political interest that take verse and optional of the prophet only for a party interest, be patient it means that we’re patient in accepting calumny from someone, facing scolding from somebody else, facing family problem, accepting backbiting, and aim somebody else from immoral, and be modest including we’re not proud if we have physical perfect, smart, success in the job and receive livelihood. |Item Type:||Thesis (Other)| |Subjects:||L Education > L Education (General)| |Divisions:||Faculty of Teacher Training and Education > Department of Indonesian and Literature| |Depositing User:||Anggit Aldila| |Date Deposited:||16 Jun 2012 04:45| |Last Modified:||16 Jun 2012 04:45| Actions (login required)
How would you like the highly fascinating Amar Chitra Katha comic books to be available in Samskritam? Samskrita Bharati’s Bangalore volunteers are taking precisely this task in a big way. They are working with Amar Chitra Katha Publications to be their Samskrit translation partner to persuade them to publish their comics in pure and simple Samskrit. For this, they need to do a readership survey to assess the demand for Samskrit comics among the public. SB Ulsoor division has been posting Ramayana in pictures for months now in their mailing list sb_ulsoor AT googlegroups.com as well as their website: As a Samskrit lover, we urge you to participate in this survey and show your support for this exciting activity. You can also participate in the translation effort, if you feel comfortable. Please click on the link below to participate in the survey: Exciting times are ahead for Samskrit literature for kids (both in age and at heart)!!
Forlorn Funnies #5 by Paul Hornschemeier With this issue, Hornschemeier answers the question, "What do you do for an encore?" After his critical success of the past three issues (all still available here at the Copacetic Comics Co.) which were subsequently collected by Dark Horse as a TPB titled, Mother, Come Home, this issue is a bit of a departure -- but not too much. It is, purposively, a bit on the schizophrenic side. Structured as a flip book (i.e. two separate comics which start at each end and meet in the middle, forcing you to "flip" the book to read the second story, regardless of which you start with), the issue is composed of two distinct comics titled "My Love Is Dead" and "Long Live My Love." These two stories are clearly intended to each comment on the other, with the hope (forlorn?) that the whole will be greater than the some of its parts as a result. Thesis + Antithesis => Synthesis. Yes, it's a bit on the despondent side, but it offers up the ususal high production values that we've come to expect from Hornschemeier, and will certainly be appreciated by most if not all fans of his previous work. WIthout doubt, the work here is some of the most challenging being produced today. 80 pages; full color; square bound; 6 1/2" x 7 1/2" retail price - $10.95 copacetic price - sold out Mother, Come Home by Paul Hornschemeier Collecting Forlorn Funnies #2 - 4, Mother, Come Home is a great contemporary graphic novella about sadness and loss. Will Eisner has this to say: "Brilliant! Graphic literature at its best. This book leaves the comics ghetto far behind." Need more convincing? Here's this from Craig Thompson: "While formalistically inventive, this book is heart-wrenching. No panel is wasted. No gesture is inconsequential. Every color, prop, and rhythmic panel enrich its lucid landscape." So there! We would say that Hornschemeier has incorporated some of the more pertinent formal lessons of Chris Ware into a tale that covers somewhat similar territory as that of Jimmy Corrigan, but while Ware employs his technical mastery as an emotional distancing device, Hornschemeier actually confronts some of the emotions that accompany personal loss, which makes it closer to Craig Thompson's Blankets, in that regard. While Mother, Come Home does not pack the punch of either of these heavyweights, it nevertheless is definitely worth a look. retail price - $14.95 copacetic price - $12.70 Forlorn Funnies by Paul Hornschemeier It all starts here. Each comic is 6 1/2" x 9", a tad shorter than standard size comics. Each has a stiff full color cover, with full color interiors printed on a flat, high quality stock, for a nice, original feel. And production values are just the start. These books display a high level of conscious artistry throughout. If you're not wedded to the trade paperback format, we recommend purchasing the Mother, Come Home graphic novel in its original form: Forlorn Funnies #2 - 4. It makes for a superior æsthetic experience, and it's less expensive, to boot! #1 - 3 retail price - $3.95 copacetic price - sold out #4 retail price - $4.50 copacetic price - sold out Prices and availability current as of 10 February 2006 and should still be correct now; contact us to be sure.
**Extended Q&A to follow screening "Penny Dreadful" is a chilling psychological thriller, created, written and executive-produced by three-time Oscar® nominee John Logan ("Hugo", "The Aviator", "Gladiator") and Oscar® winner Sam Mendes ("American Beauty", "Skyfall"). In "Penny Dreadful," some of literature’s most famously terrifying characters – including Dr. Frankenstein, Dorian Gray and iconic figures from the novel Dracula – all brilliantly re-imagined in a whole new light. Cast includes Josh Hartnett, Timothy Dalton and Eva Green. Reeve Carney, Rory Kinnear, Billie Piper, Danny Sapani, and Harry Treadaway also star. Director: Juan Antonio Bayona, Showrunner/Creator: John Logan Executive Producer: John Logan, Sam Mendes, Pippa Harris Producer: Chris W. King, Screenwriter: John Logan Principal Cast: Cast includes Josh Hartnett, Timothy Dalton, and Eva Green., Reeve Carney, Rory Kinnear, Billie Piper, Danny Sapani, and Harry Treadaway also star. Distributor: Showtime Networks
As often happens in this wonderfully interconnected world, a blog post has prompted some wonderful savvy responses. This time, it happened here in ShadowLand. I posted about my surprise and frustration that my 15 year old was able to check out a movie from the library that was either originally rated NC-17 and then defined as unrated, or was the alternative version, rated R. Until I actually put it in the DVD player and watch it, I can't tell which version we have in the house, because it didn't come with the full box. "As a librarian, here's what I think their policy probably is: it's up to you, as the parent, to be aware of what your children are reading and watching. This is the policy behind NOT banning books. It's not up to them to decide what is suitable for your child. And I know you're going to say "But movies have ratings!" But it's a slippery slope and if the library isn't already on that slope by policing movies, they won't find themselves being shoved into policing books. What if an R or NC-17-rated movie is based on a book? Should access to the book be controlled, too? Where do you draw that line? By not having a line at all, that parent who doesn't want their child reading The Great Gatsby isn't going to be restricting your child, too. (http://www.ala.org/advocacy/banned/frequentlychallenged/challengedclassics)." That gets me thinking along several lines: First off, I agree with her, generally. If we let the library decide who can check out what, we're inviting them to censor our reading. I don't want anyone else deciding what I can read, or even what my kids can read. I don't want them deciding what we can watch, either. On the other hand, I figure if a library follows the same policy as the theaters do, using the ratings that are out there, they won't go wrong. If the ratings rules mean that a 16 year old can't get in to see a film, period, then the library is reasonable in saying she can't check the film out. Mom (or frankly anyone over 17) can always check it out and let her watch it, of course. (The fact that they now call it NC-17 (in part because it can be assigned for violence, drugs, or exceedingly aberrant behaviors in addition to sex or even pornographic scenes) and not X is irrelevant here). Ditto, if the ratings rules say you need a parent or guardian to take you in, the library can say she needs a parent or guardian to approve her rental of that movie. Heck, the library policy could state that teens have to have a parent or guardian sign a release to clear them to check out R rated movies. It takes a village to raise a child. That's because parents cannot be by their children's side all the time. And just like parents can't always there when the kid tries to get into the movies, parents can't always be there when the tween or teen goes to the library. (Heck, around here, one of the middle schools is right across the street from the library; the kids go over to the library after school all the time). A parent can always come later and say "yes, it's okay, she can see that," and then check out a movie. But a parent can't always be there to say, "whoa, no.... not yet" before it's too late. The theaters deal with this by assuming it's not okay to let a person under 17 see an R rated unless the parents, guardians, or other presumably responsible adult escorts them. As I said, I don't want someone else deciding what we can read. I'd rather my girls wound up reading pornographic literature before I thought it was a good idea than have someone else deprive them of the chance to read something because they'd put it on a banned books list. I mean seriously, have you looked at the banned books lists lately? China banned Alice in Wonderland! There was a time when Chaucer's Canterbury Tales were banned. Are You There God It's Me Margaret, which has it's place on the Top 100 Children's Books list, has been "challenged" in various places in the U.S. On the other hand, There's something a bit different about movies. Not that I want anyone banning movies, or limiting them generally. But I do agree that there are some films that kids aren't old enough to see. There's something different about visuals. It's one thing to READ that a stoned out woman is paying for her cocaine by performing a rather, shall we say "non-standard" sex act -- even to read exactly what she did. (There is such a scene described in the synopsis fo the film that inspired my previous post - even reading the synopsis made me uncomfortable). If you're reading something, and you have no experience to back it up, you're not likely to be ABLE to really visualize it. It's even harder to give it not only sight but sound. If you're watching.... it's right there in your face, with sound. It's vivid and real in a way that books rarely are. (Could potentially be traumatizing to some -- especially someone two, three, four years under the age indicated by the ratings.) It's really hard to unsee something. I don't see that restricting access to a movie has to mean restricting access to a corresponding book. Screenwriters are prone to changing books slightly (or a lot -- I've seen movies "inspired by" books that shared little more with the original book than the title and some character names). What might have been a scene that wasn't played out in full in the book might become one that is very detailed in the film. An assault scene can be written many ways -- in a book it might be simply presented, or referred to in memories - the character remembers a man's hand on her mouth. In a movie, you see it, vividly, clearly; you see the hairs on the backs of his hands, the dirt under his fingernails, the way his fingers distort the flesh of her cheeks.... Almost no one describes such things in the detail that you can get from 5 seconds of film. (Of course, the screen writer can also choose to omit a brutal scene too). And so, I don't automatically equate a film with the book upon which it's based. Reading the book might be no big deal, or it might be less appropriate than the film. But if the impact is going to be a strong one, I'd rather my kids have the book in hand than watch the NC-17 film. It IS a slippery slope. And I would not want any library to take it upon themselves to make the decisions about who gets to check out what movies. But there is a system in place to determine how old a person ought to be before they can see certain movies. And the library has a system in place that ties a child patron's age to his or her library card number. It makes sense to let them work together. That system, working in tandem, would help parents know which things they need to weigh in on. (In this case, had I been alerted (either by my daughter whining that the library wouldn't let her check something out, or by the library sending an automatic email that a child was attempting to check out an R rated (or NC-17 rated) film), I would not have discovered the issue at 11:30 p.m. on a night before I had to be up early. Now, ultimately, I don't intend to let the librarians decide whether my child can watch any given movie, or read any given book. I do not even intend to let the ratings people make the ultimate decision on that. I still think it's the parent's job to get in there and figure things out one child at a time. I still read books I see my kids reading (even if I don't catch them before my daughters read them, I do read them, and if I think it's appropriate, I discuss them). I still make my own judgements about films too. I don't want the library to do my job. I'm saying that where a system is in place to protect kids from things that they're not ready for, it should be used. Kind of like we expect the shopkeepers to decline to sell them cigarettes and/or alcohol until they're old enough. Just as I can choose to let my children smoke or drink in my own home (which I don't )... I can choose to let my children see movies with violent or degrading sex scenes. Either way, the parent should be doing the choosing. When the stores say no, the parent can choose. When the theater says no, the parent can choose. When the library doesn't say no, the parent may not be able to choose before it's too late. I haven't decided whether to suck it up and watch a film that I've been told is beautifully made, but very depressing, or to join my child in watching it, but either way, I'm not banning her from watching it. (I have told her she can't watch it with her friends without her friends' parents telling me it's okay for them to see -- I'm not making that decision for any other parents or their kids). I've learned enough about the film from people I know who have seen it (doing my research a different way), that I think it won't scar her for life. But I'm glad I had an opportunity to find out enough about this movie to make an informed decision before she watched it. Had she started watching it one half hour later, I'd not have had that chance.
The Michigan Biomass Inventory is an interactive screening tool that allows users to: Change Layer Transparency: No Results to Display Select a county from the drop-down list and click the "Zoom to County" button and the map will zoom to the desired county. Select a City or Township from the drop-down list and click "Zoom to City/Twp" button and the map will zoom to the desired City or Township. Type a search term and click the "Biomass Search" button and the Search Results Tab will display all biomass sources/facilities that match the search term in the Search Tab. Note that the search is a "like" search, so any facility names containting the search term will be returned. To zoom to a selected facility, click on the row that corresponds to the appropriate facility in the Search Results, the map will zoom to the desired facility. The selected facility will be highlighted in yellow. A map layer represents a distinct GIS (Geographic Information System) data layer. Map layers are grouped into map services and are displayed in the Map Layers Table of Contents for the user to interact with. The Map Layers Table of Contents allows you to turn map layers on/off, select the active layer, view metadata about a map layer, see the symbols for biomass sources/facilities, and change the transparency of a map service. There are three map services or groupings of map layers that you can interact with: Biomass Sources, Environmental, and Other. The Biomass Sources map service is an inventory of potential biomass feedstocks that could be utilized for energy production. The Environmental and Other map services complement the Biomass Sources map service by providing map layers that may indicate to the user areas that would not be suitable for some types of energy production activities from biomass feedstocks. The user cannot interact with these map services other than to turn them on/off and change their transparency. To make a map layer visible, make sure the checkbox next to the map layer name is checked. Also, the checkbox at the root of each map service determines whether any map layers will be visible or not. To change the transparency of a map service (a grouping of map layers), select the map service from the drop down list and move the slider accordingly. The Biomass Sources map service is the most important map service in the application and the map service that the user will interact with most often. As compared to the other map services that are displayed in the Map Layers Table of Contents there are additional ways for the user to interact with the Biomass Sources map service. The user can select the active layer, view metadata about a map layer, and see the symbols for biomass sources/facilities. To select the active layer, click on the map layer name. The active layer is the layer that the graphical selection tool operates on. To view metadata, click on the metadata icon and the metadata will open in a new window. The symbols for each of the biomass sources/facilities are displayed next to their checkboxes so you can tell what type of biomass source/facility a feature on the map symbolizes. Backdrops provide background information about a geographic location while still allowing you to view the locations of biomass facilities/sources. To change the current backdrop click and select the desired backdrop. You cannot interact with backdrops, other than turning them on/off. The backdrop choices are: Crop Data Layer Legend The Map Tools allow you to move around on the map and zoom in and out. To expose the Map Tools click next to the text "Map Tools" and the Map Tools will slide into view. To hide the Map Tools click . Zooms in on the map. Click and draw a box where you want to zoom to on the map. Zooms out on the map. Click and draw a box where you want to zoom out to on the map. Zoom To Full Extent Zooms to the full extent of the map. Click and the map will zoom out to the full extent. Zoom To Previous Extent Zooms to the last viewed extent, if available. Click and the map will zoom to the last viewed extent. Zoom To Next Extent Zooms to the next extent in the list of previously viewed extents, if available. Click and the map will zoom to the next extent in the list of previously viewed extents. Pans (navigates) the map. Click and click on the map, hold the left button down and drag the cursor to the location you want to pan to. The Selection Tools allow you to view information about biomass facilities/sources. To expose the Selection Tools click next to the text "Selection Tools" and the Selection Tools will slide into view. To hide the Selection Tools click . Selects and displays information about biomass facilities/sources. Click and draw a box around the features you want to select. Information about the selected features will be displayed over top of the map. Only one map layer from the Biomass Sources map service can be selected from at a time. To change the active layer (map layer that selection operates on), click on a map layer name and it will be highlighted in blue. To zoom to a selected feature, click on the row that corresponds to the desired feature and the map will zoom to it. Clears any highlighed features (graphical selections, biomass source search results, biomass analysis buffers, identify information windows) from the map as well as the Search Results Tab and the Selected Features panel. Click and any selections will be cleared. Displays information about a biomass source/facility. This information commonly includes the name of the facility, type of facility, and quantities of biomass available at that facility. To perform an Identify on a biomass source/facility, click and click on a biomass facility/source on the map. An information window appears over the map displaying the associated biomass facility/source information. Results will be displayed for any biomass source/facility within the immediate area of where the user clicked. Click to close the Information Window. Using the Biomass Sources and user editable analysis options, the Biomass Analysis Tool generates estimates of net energy available from conversion of biomass feedstocks to electrical or heat energy or conversion to Ethanol. The result of the tool, is a printable (through the user's web browser) report that includes estimates of the net energy that could be generated if biomass conversion technologies were located at the user indicated location. To use the tool, click , click on the map at the desired location and the Biomass Analysis Tool user dialog appears. The dialog displays site information about where the user clicked, such as the county, city or township and latitude and longitude coordinates. To perform the biomass analysis the user must click within the state of Michigan and outside any bodies of water. The Biomass Analysis Tool uses a step by step process collecting information from the user that will be factored into the analysis. The process either must be completed or the dialog closed before the user can return to interacting with the map and the rest of the website. To view information about the conversion formulas used in the analysis click here. To close the Biomass Analysis Tool user dialog and refresh the page, click . To close the Biomass Analysis Tool without refreshing the page click the Cancel button. The first step allows the user to configure the inputs to the Biomass Analysis Tool. These include conversion technology, type of energy output, buffer distance, and whether to include transportation cost in the analysis. The conversion technology options include Anaerobic Digestion, Gassification, Direct Combustion, Biodiesel, and Ethanol. Technical information about the conversion equations used to generate estimates of net energy can be viewed here. The user has the option of choosing the type of energy to generate, either heat or electricity for all technologies except Ethanol. The buffer distance is the radius in miles of a circular buffer around the point that the user clicked. This area constitutes the biomass analysis area and all biomass sources/facilities within this buffer will be included in the subsequent analysis. The default is 25 miles. Transporation cost is the amount of energy expended to transport biomass feedstocks within the biomass area to the point that the user clicked. The transportation cost is calculated by performing a routing analysis from each biomass source/facility back to the point the user clicked on. Transporation cost is subtracted from the result of the energy conversion equations to estimate net energy. Including transportation cost as a parameter to the net energy calculations is computationally expensive, so the user should expect considerable processing time if the option to include transportation cost is checked. After clicking Next on Step 1, the Biomass Analysis Tool selects all biomass sources/facilities that are within the user specified buffer distance and provides a preliminary estimate of net energy. The name of each biomass source/facility (if the user is authenticated) is displayed to the user along with a preliminary estimate of net energy. Non-authenticated users will not be able to view the names and addresses of sensitive biomass facilities/sources. Instead the text "Restricted" will be displayed to indicate information that is not available to non-authenticated users. There are four types of information that are presented to the user at this stage in the analysis: Biomass Source Layers The Biomass Source Layers are the Biomass sources/facilities used in the net energy calculations. These locations generally have an associated quantity of biomass available and an equation used to generate a net energy estimate. The types of biomass sources include discrete facilities (CAFOS, correctional facilities, hospitals, schools, universities, and water treatment plants). Also, for some conversion technologies, the available biomass sources include the agricultural potential based on the theoretical yield of cropland residues (corn stover, wheat straw) and cropland energy crops (corn grain, switch grass). County Ag Census - Biomass The County Ag Census biomass source includes an estimate of the net energy available from the manure produced by cattle, chickens, dairy, sheep and swine within the county the user clicked in. Note that this is a county-wide estimate and is not restricted to the potential biomass within the biomass analysis area. The county-wide manure quantaties are derived from the National Agricultural Statistics Service Census of Agriculture (Ag Census). Points of Interest Points of Interest are potentially significant sources of biomass for which quantaties of biomass and/or energy conversion equations are not available. They are included for informational purposes only and are not used in the biomass analysis. Possible Site Restrictions Possible Site Restrictions are limiting factors that may prohibit the installation of biomass conversion technologies at a given location. Total population/population density provides an indication of the feasibility of locating biomass conversion technologies in a specified location given the potential conflicts between biomass conversion/energy generation activities and the public (noisy trucking of biomass materials, foul smell from anaerobic digesters, etc.). It is the user's responsibility to determine at what population levels, biomass conversion technologies would be unsuitable for a given location. Water availability from glacial deposits and bedrock aquifers may indicate areas that are not suitable for growing biomass energy crops such as switchgrass. It is the user's responsibility to determine if and at what level water availability from glacial and bedrock sources is a limiting factor in the cultivation of biomass crops. The third step returns the results of the analysis to the user, taking into account any changes made in Step 2. The analysis results can be reviewed before generating the Biomass Report in the final step. The fourth step gives the user the opportunity to generate a map and report with detailed net energy estimates. The report can be generated either with or without a map by checking the Include Map in final report checkbox. The report will open in a new browser window and will be printable through the browser's print menu. Biomass Documentation. The user guide helps navigate through the Michigan Biomass Conversion Spreadsheet and includes how to use the interface, input data, interpret output data, change variables within the model, print results, and provides literature sources. User Guide The spreadsheet can be used for conversions of biomass to energy for anaerobic digestion, combustion, gasification, biodiesel production, and ethanol synthesis. Energy Spreadsheet The feedstock evaluation data contains a biomass inventory of categories ranging from acid food to manure. Included are raw sample characteristics, the impact on biogas generation, and the maximum percent of methane produced. Feedstock Evaluation Biomass Sources Selected Features
It’s time to bat around another reader-inspired question about an important subject within the realm of health that virtually everyone reading this right now has had to deal with in their lifetime through a diagnosis of a family member or friend–that would be CANCER. Researchers have been looking at what the possible culprits in what is causing this terrible disease for decades, but unfortunately most of the studies have been geared towards finding a pharmaceutical answer. Oftentimes, the natural nutritional remedies aren’t even investigated because there is no money to be made promoting that to cancer victims. It’s just such a shame that finding a cure for cancer seems to be predicated on how much money can be made treating people that have it. If I’m wrong about this, then somebody tell me otherwise. I guess I’ve just become so jaded by how health is viewed from the very medical professionals who purport to be about improving health. One of the most exciting areas of research that is taking place right now is how a ketogenic, low-carb diet could be used as a therapeutic tool for treating people afflicted with cancer when chemotherapy and other procedures have proven ineffective. Thanks to the great work of people like Dr. Eugene Fine and Dr. Thomas Seyfried who are testing this theory about how ketones can help shrink the size of cancerous tumors and quite possibly be used as a preventative measure for people concerned with getting cancer. The funding for these kind of studies has been paltry compared with the drug research, but the outlook for the ketogenic approach looks quite promising. Enter the following monkey wrench one of my readers shared with me recently regarding this study published in the September 21, 2010 issue of the scientific journal Cell Cycle claiming that ketone bodies can INCREASE tumor growth by as much as two-and-a-half times reflecting a “Reverse Warburg Effect.” Personally, I’d never heard of anything like this, especially in light of the work of Fine and Seyfried on the BENEFITS of ketones in REDUCING cancer cell growth as part of their studies. Here’s what my reader wrote to me in an e-mail: I am a long-term lowcarber (very high-fat — all manner of fat from grass-fed animals, eggs, nuts etc.) and am often in ketosis — more often than not. I love livin’ la vida low-carb and find it the easiest way to avoid the type 2 diabetes and obesity that has plagued so many members of my family. However, today someone posted some disturbing information on another low-carb diet forum regarding recent studies like this one claiming to show that ketones fuel cancer. Do you have any thoughts on this? Since this was such a foreign concept to me based on all that I know about how low-carb ketogenic diets respond to cancer in just the opposite manner (see here, here, and here for just a few examples), I couldn’t help but ask some of my expert friends in the low-carb community to respond. Here’s what they had to say: GARY TAUBES, author of Why We Get Fat I read this paper and the whole thing is very weird. I also recently reported, as I probably told you, an article on the diabetes cancer link and virtually everyone in the field thinks it’s insulin and IGF that drive growth and explain the association between cancer and diabetes. In fact, metabolic syndrome and obesity are also associated with greater risk of cancers and in those cases there would certainly not be increased ketone production (insulin suppresses ketone production). So all these would point to insulin and maybe IGF and not ketones, which is what they imply. Finally, and I may be wrong, only in uncontrolled diabetes would ketone production be high, and certainly not in Type 2 diabetes. Then there’s all the evidence that isolated populations eating their traditional diets got relatively little to no cancer. I discuss this in GCBC. This includes populations that ate no carbohydrates (the Inuit, the Masai, etc.). So that would argue for glucose and insulin related drivers, not ketones. Still, it’s conceivable, I guess, that if we get cancer and then go on a high-fat, low-carb diet that could make it worse, although that’s easily testable. In fact, there are studies ongoing now, as you know, using ketogenic diets to treat cancers. If it turns out they do nothing or accelerate the cancer growth then that would be a bad sign. FRED & ALICE OTTOBONI, author of The Modern Nutritional Diseases The proposition that ketone bodies and lactate (lactic acid) fuel cancer growth is a fascinating thought, but not one that should be of concern to anyone following a low-carb diet. We, too, have not come across such a claim before this. Incidentally, anyone interested cancer development and metabolism should obtain a copy of Cancer Nutrition and Survival by Drs. Steve Hickey and Hilary Roberts (wife). It is an absolute “must.” About the paper claiming that ketone bodies and lactate (lactic acid) fuel cancer growth, here are our thoughts: First, as a practical matter (from a nutritional viewpoint), the claim is not biochemically logical. Second, the study on which it is based is an in-vitro experiment and not necessarily of significance for an intact organism. We have obtained a copy of the complete paper because the abstract contained statements that are biochemically inaccurate. First, the biochemical logic: Cancer cells require glucose as their source of energy. As far as is known, glucose is their only energy source. Cancer cells cannot survive, grow, and metastasize without energy. People on a low-carb diet have no excess glucose (blood or dietary) with which to feed cancer cells. Instead they preserve glucose for its vital role as a blood component by catabolizing fats (and producing a variety of ketones) to provide the energy otherwise supplied by glucose. Ketone bodies produced in humans as a result of β-oxidation of fatty acids (see Figure 5-2 and pp. 114ff of The Modern Nutritional Diseases) have been shown to be an excellent source of energy for all normal tissues and organs, except the liver. We are not aware that the metabolism of ketone bodies in cancer cells has been elucidated. Thus, there appears to be no biochemical evidence that cancer cells can use ketone bodies as sources of energy. On the other hand, cancer cells produce lactate (lactic acid) as an end-product of anaerobic metabolism of glucose. Cancer cells use glucose aerobically (to CO2 and H2O) when they are well oxygenated and anaerobically (to pyruvate) when starved for oxygen. Cancer cells, like any normal cells that must survive when oxygen becomes limited, can function either anaerobically or aerobically. This is possible because energy production in all mammalian cells has two parts, the first half is anaerobic and the second half aerobic. All macronutrients (carbohydrate, fats, and protein) are metabolized anaerobically to pyruvate and/or acetyl CoA (see Figure 4-1, MND). Aerobic energy production begins with the entry of acetyl CoA into the Krebs cycle, which completes the oxidation of acetyl CoA to CO2 and H2O. Some normal cells can operate anaerobically for short periods of time. The appropriate human cell model for this dual metabolic function is the muscle cell. During normal activity, well-oxygenated muscle cells obtain energy from glucose anaerobically by glycolysis to pyruvate and acetyl CoA followed aerobically by the Krebs cycle. But during heavy exertion, delivery of oxygen to the muscles becomes inadequate with the result that sufficient energy can only be obtained anaerobically by glycolysis of glucose. Glycolysis would stop if the muscle cells did not have an electron acceptor other than oxygen available to them. They keep glycolysis (and energy production) going by using pyruvate as the electron acceptor and reducing it to lactic acid. Lactic acid accumulates in the muscles until adequate oxygen becomes available to oxidize it back to pyruvate and then through the Krebs cycle. Cancer cells operate in the same manner as muscle cells with the exception that they excrete the lactic acid that is produced. The possibility exists that some lactic acid could be converted back to glucose but, because it is readily excreted, this would be a negligible source of energy. DR. THOMAS SEYFRIED, Boston College cancer researcher I know about this study. The study has serious problems. I wrote a letter to the editor of the journal regarding the flaws in the study. I discussed these flaws with Dr. Richard Veech at the NIH, who concurred with my concerns. Unfortunately, these types of studies will occasionally appear in the literature mainly because the reviews, who know about molecular biology, are unfamiliar with the old literature on energy metabolism. Here’s Dr. Seyfried’s letter that never got published in the journal: October 20, 2010 Dr. M.V. Blagosklonny Editor-in-Chief, Cell Cycle Roswell Park Cancer Institute Dear Dr. Blagosklonny, I am writing in reference to an article that appeared in the September 1 issue of Cell Cycle by Bonuccelli, et al., entitled: “Ketones and lactate “fuel” tumor growth and metastasis: Evidence that epithelial cancer cells use oxidative mitochondrial metabolism”. The authors have made serious errors in their data interpretation and the conclusions of their article. There is no evidence in the biochemical literature that ketone bodies can be made from pyruvate in fibroblasts. It is common knowledge in biochemistry that ketone bodies are derived from fatty acid beta-oxidation in liver mitochondria. This information is also presented in the cited articles from Veech and co-workers. The authors present evidence showing that the ketone body 3-hydroxy-butyrate does not enhance lung metastasis (Fig. 4A), yet the paper title indicates that ketones fuel tumor growth and metastasis. The paper title and abstract are therefore misleading. Furthermore, no evidence was presented in the paper showing that the MDA-MB-231 cells can survive using only L-lactate or ketone bodies as metabolic fuels. While the authors recommend that it may be unwise to use lactate-containing i.v. solutions in cancer patients, the authors should also recognize that lactate is metabolized to glucose in the liver through the Cori cycle. It is well documented that glucose can stimulate tumor growth. No information was provided on food intake or body weights of the treated and control mice. No information was presented on blood glucose or ketone levels in the tumor bearing mice used in the study. It is difficult to assess the effects of drug injections without this information. Finally, no evidence was presented showing that OxPhos is operational in the MDA-MB-231 tumor cells. Gene expression profiles do not provide the required biochemical and physiological evidence for establishing operational OxPhos in tumor cells. Unfortunately, the author’s provide misinformation. Such information will cause confusion in the field. I am surprised that the reviewers of this paper did not mention these issues in their critique, as some of the evidence and statements presented contradict basic principles of biochemistry as specified in any general textbook on the subject. If further evidence is needed to support my concerns, I would suggest contacting Drs. Richard Veech, Theodore B. VanItallie and Jong Rho. Thomas N. Seyfried, Ph.D. DR. STEPHEN PHINNEY, low-carb researcher and co-author of The New Atkins For A New You This is an interesting study, not so much because of what they claimed to find, but because of how much they had to ignore to draw the conclusions that they did. I could write a whole book chapter to explain this one study — not just why their conclusions are flawed, but also about the socio-political environment within the science establishment that promotes the publication of what I can only characterized as ‘reductionist garbage’. But uncharacteristically, I offer you these few relatively brief points. • some of the last Aboriginal nomads who lived by hunting/herding while in contact with modern medicine (such as the Masai and the Inuit) rarely were diagnosed with (or died of) cancer. • Injecting a big dose of ketones into the abdomen of a mouse once per day is very different from the hormone and metabolic conditions that induce the body to make its own supply of ketones. To assert that the two are metabolically identical is at least intellectually weak, if not duplicitous. • All that we are told about the diet of these mice is that they were given ad libitum access to ‘chow’. So what happens if ‘Mickey’ in cage #2 just ate a belly full of this yummy stuff (which is typically more than 60% carbs) and someone then picked him up and jabbed a needle into him delivering a bolus of ketones. Normally, we make ketones when dietary carbs are limited, but in this case these ‘scientists’ are jamming in ketones when the mice still have plenty of carbs. Since the normal (non-cancer) cells in the body love to burn ketones, want to guess what happens to blood glucose after the ketone injection. Of course, blood glucose goes up. Look through their paper as much as you want — they don’t tell you anything about blood glucose after the ketone (or lactate) injections. If blood glucose went up after ketone and lactate injections (just an educated guess), what caused their tumors to grow? Sugar or ketones? • Multiple studies published in the last 5 years report that a well-formulated ketogenic diet in humans causes a significant reduction in biomarkers of inflammation. In addition to being closely associated with the risk of heart attack and Alzheimer’s disease, inflammation is now known to be positively correlated with many common cancers (including colon and breast cancer). Simply put, if a low carb diet reduces inflammation and a low level of inflammation correlates with less cancer, how did these guys get this paper published without a more rigorous peer review? Answer. Because the peer review process is confidential, we’ll never know. But as an educated guess, it is much easier to get a paper published that bashes ketones/low carb than a paper that concludes that nutritional ketosis might be beneficial. You do the math. DR. ERIC WESTMAN, low-carb researcher and co-author of The New Atkins For A New You I read two articles from this group. This is a theory with in-vitro studies so it is VERY preliminary in terms of generalizability to intact human organisms. Keep in mind that “cancer” is very complicated! KAREN RYSAVY, long-time low-carber at “Truly Low Carb” I have heard lots of evidence to the CONTRARY; this is the very first time I have ever heard anyone suppose that ketosis encourages cancer cells. Based on my research to date, which does not yet include the link you sent, if I were diagnosed with cancer the very first thing I would do is make sure I was in ketosis, then try to stay there for the duration. It would have to be a very compelling “single” study to sway me from this belief. DR. MARY VERNON, low-carb practitioner in Lawrence, Kansas This is an interesting article but I can’t extrapolate from it to humans. A PubMed search brings up pages of citations with conflicting conclusions. However, here is my standard common sense approach to this type of thing: 1) Habeas Corpus-where are all the bodies? Enough people eat this way that if this really generated cancer then you’d think we’d be seeing the uptick in numbers. 2) Prevention and cure may not require the same intervention. The end stages of cancer have a lot more hormonal signals than just the ketones-those hormonal signals, many of which are made by the tumors-may change the way fuel is used. 3) What’s the data? There have been actual studies suggesting the opposite effect than this in prostaste cancer and case reports of beneficial effect in brain cancer for ketogenic diets. We need more info-and the NIH needs to fund studies that have as investigators practitioners who really know how to use this tool-not folks who have read an article or two. Dr. EUGENE FINE, cancer researcher at Albert Einstein College of Medicine I haven’t read the Lesanti article in any detail yet, but I see he is studying only one cancer type. Some cancers may indeed depend on ketone bodies. Our hypothesis, in fact states that some cancers may be adapted to the effects of carb restriction, including ketosis (i.e. may continue to grow), and others may be vulnerable to ketosis. I do have evidence that many cancers are inhibited by ketone bodies. Summary: Cancers aren’t simple and generalizations are usually wrong. So, that’s what the experts say in response to this idea that ketones that are produced while on a low-carb diet actually “fuel” cancer cell growth. But what do YOU think? Is it possible for cancerous tumors to grow in the presence of ketone bodies based on all that you know about the role low-carb diets play in this? If sugar feeds cancer (and it does!), then how can the absence of sugar in the blood which occurs when carbohydrates are restricted lead to higher rates of cancer? Is it even fathomable? Let the discussion begin.
I haven't read the print version, but listening made the story very immediate -- and the narrators' voices made the point of view completely clear. I don't want to spoil anything for those who haven't read the book, but there were several points in the story that moved me to tears, or shocked me breathless. The author creates a vivid picture of WW II, and it was particularly neat to get a war story from two women's points of view -- and from women who weren't sitting on the sidelines, either! I am delighted to (finally!) see Barbara Hambly's works appearing on Audible. She has a wonderful feel for fantasy, character, suspense, and the books are great reads/listens. BUT the narrator for the Darwath series is TERRIBLE. Not only are the voices she uses for the characters unconvincing and stilted, her basic delivery is incredibly annoying, containing, as it does, not only strange mispronunciations, (long a instead of the schwa sound in words like away and about, accents on the wrong syllable, etc.) but also a peculiar interrogative inflection in the middle of statement-sentences, and idiosyncratic (if not unintelligible) word emphases. Honestly, she sounded like a third grader reading aloud (oops, long A-loud). What WAS the producer THINKING? These books certainly deserve more deft handling, and I hope Audible will consider reissuing them with someone who can really read aloud! Interesting premise; thin characterizations; story doesn't quite fulfill its potential. I liked the interactions between the main character and the desert people, though it left me wanting to know more details of that culture. Overall, I thought the different strengths/gifts of the different "families" was interesting, but needed to be explored at a deeper level. The narrator has a great, deep bass voice; I think the voice in my head is usually more of a tenor, but I liked his voice for Lannik Mueller. I *wanted * to be moved by the final confrontation between Lannik and his "brother" -- but when we got to it, there just wasn't enough emotional depth. It felt too easy and facile -- and too convenient, especially after all the trials/tribulations it had taken to get to that point in the story. Despite my somewhat negative comments, I enjoyed this book. It's clearly an early work of Card's, and lacks the emotional depth of some of his later books; but it was a fun listen -- and I'll definitely look for more by Stefan Rudnicki. I generally am very fond of historical fiction. It was clear the author had done her research. She chose to write about the seamy underbelly of Victorian England, and portrayed it very well. But I also prefer books with characters who are sympathetic. They don't have to be perfect (in fact, perfect characters are usually annoying) but there has to be somewhere I can connect, on an emotional level, with the people the story is about. I didn't like any of the characters in Faber's book, so by the (extremely unsatisfying and inconclusive) end, I didn't really care what happened to any of them. I found the author's use of the present tense in the narrative voice distracting and affected. I also hated the "dear reader" style interjections into the narrative. I could see that the author might have been trying to evoke a Victorian prose style, but again, it just didn't work for me. A straightforward, omniscient narrative voice, in the past tense would have helped -- though with such a dearth of sympathetic characters, even that wouldn't have saved it for me. I liked none of the characters. The least detestable were Henry and Emmaline Fox, but even they were not sympathetically portrayed. I thought the narrator did a decent job with the material -- at least, her characters were relatively easy to tell apart, and not annoyingly affected (I do hate it when narrators use inappropriate regional accents to differentiate characters -- especially when the people are members of the same family -- and Tanner doesn't do that...) I did plow through to the end. But that's fairly faint praise. I don't have any desire to seek out the television version, nor to read the next book in the saga (if one is ever written). The historical detail and the characters were wonderfully realized; the narrator was very good, managing distinct voices for the different people without being distracting, or relying too heavily on different accents. She also narrated the first book in this series, London in Chains, which was also excellent (both the story and the performance). I love historical fiction, and Gillian Bradshaw is one of my favorite authors. I wish Audible had performances of all her books! Lively, fun, satisfying. As a reader, my sympathies were engaged most by Andi (the main character). She was resourceful, interesting, and empathic. I loved the way she connected with and defended the two kids in the story. In some romance fiction, I feel like taking the two main characters and shaking them until they TALK to one another, but Crusie does an excellent job of making the obstacles to the relationship believable, yet still resolvable. Andi's temperament was beautifully depicted. It seemed very consistent with her character both that her marriage would have gone down in flames, and that a second try (with the same guy) could work. I loved the way Dawe handled the two kids -- distinct voices that nicely matched their (difficult) personalities, and none of the sugary-squeakiness some narrators use for children. I usually listen in the car, or when doing chores, so I'm not usually sitting, but I did find myself stacking wood for longer than I intended a couple of times! I love Crusie's work and I'm glad Audible makes her books available. I bought this title because I had enjoyed Hobb's Farseer trilogy -- but with the first words out of the narrator's mouth, I wondered whether I had made a terrible mistake. Anne Flosnik's reading seems (to this listener, anyway) affected and lugubrious -- the variety among character voices is slight and not always right for the person. The story was good enough to keep me listening, though I kept having the uneasy feeling that I didn't really like any of the characters all that well -- though that may have been a function of the narrator. I'll probably listen to the next book (this one does leave a lot of unanswered questions!), but I'll also be wishing it had been read by someone else. I loved the story. McKillip's remarkable characterizations and her elegant use of language work very well to evoke a world. Her deft handling of archetypal characters and fantasy literature tropes neatly avoided predictability, while managing to resonate on many different levels (as the best fantasy should). I liked the idea of two narrators, but I wanted to hear more from Charlotte Parry -- and maybe less from Marc Vietor. They both turned in satisfactory performances, but for a gem of a book, like this one, I was hoping for something well beyond adequate. All in all, The Bards of Bone Plain is a good read/listen which I recommend to any fantasy lover. This wonderful fantasy novel makes for excellent listening. McKillip's use of language and fine characterizations carry the story, and makes the world she invents believable and interesting. Gabrielle de Cuir's nuanced narration is clear without being distracting. Highly recommended. Report Inappropriate Content If you find this review inappropriate and think it should be removed from our site, let us know. This report will be reviewed by Audible and we will take appropriate action.
i wish it was interesting and not about 90's pop culture. boredom and irritation i truly uninteresting book, i had high hopes for it, but wow, it sucked. Perhaps if i was passionately opinionated about pop music or found this obnoxious author engaging and clever as he thinks he is... no probably not The noy dramatic tension in the while novel is in the last chapter. The characters are one dimensional. It was as if a small part of a story had been inflated to a whole novel. Even for mercades lackey it really sucked. Really not worth your time, I'm a Mercedes lackey fan and I have no illusions that she produces great literature. But wow this book was terrible, boring plot, uninspired characters, pointless rape scene, no interesting magical world building tidbits. The most frustrating part was that the plot and main character were almost completely recycled from another of the elemental masters books. Also the narrator mispronounced a lot of words, I'm not talking about accents but actually said words wrong, although her voice acting was pretty good. This book left me stressed out and frustrated. At no point did I feel convinced there was any advantage to being an introvert. And most of her advice for dealing with workplace issues would leave my coworkers thinking I was utterly insane. Very disappointed. Just a bad novel, it reminded me of the book I tried to write when I was 13, shallow character, boring plot, and the reader made everyone's voice vapid and annoying, frankly I didn't finish it. Troy and probably Helen too Really didnt enjoy it, the characters were boring, their romance was forced and the plot plodded along without ever giving me a surprise. Not as good as his other work, which on the whole I adore. This book desperately needs better dialog, a bit more plot, and a bit less predictability I love this genere, but it does have the intrinsic flaw of being aim for 14 year old girls. Don't talk down to young people, they can handle a little more complexity. The reader was pretty good, I'm sure she is the only. Thing that made this book tolerable. Don't pay full price for this one Report Inappropriate Content
A panel of journalists joins Diane for analysis of the week's top international news stories. The author of a new novel about a brainy twelve-year old with a passion for map-making explains why he decided to present it with words on the page and diagrams in the margins. - Reif Larsen writer, filmmaker Most Recent Shows A panel of journalists joins Diane for analysis of the week's top national news stories. The National Endowment for the Humanities turns 50 next year. William “Bro” Adams, the new chairman of the National Endowment for the Humanities, wants to make sure that the study of history, philosophy, and literature remains accessible to everyone. A conversation about his new "Common Good" initiative. The Cystic Fibrosis Foundation is earning more than $3 billion from its investment in a new drug. Other charitable organizations are hoping to follow a similar path. New opportunities and new questions for nonprofits.
Carrie leaves behind her life with her lover Jonathan, intent on proving herself to the demanding gentleman who has chosen her as his own. Whisked away to Greece, Carrie learns new, more rigorous methods of sexual satisfaction. When her year of training is complete, she faces a decision - life on her own or in the embrace of a beloved Master. Imagine The Story of O starring a Berkeley PhD in comparative literature (who moonlights as a bike messenger) with a penchant for irony, self-analysis, and anal sex. Safe Word takes the reader on a sexually explicit journey into a netherworld of slave auctions, training regimes, and human 'ponies' preening for dressage competitions. 'My favorite neo-Victorian erotic romance writer ... bring on the ponies!' -Susie Bright
The Japanese Studies program fosters detailed, nuanced knowledge and understanding of various aspects of premodern, modern and contemporary Japanese culture and society, including history, language, literature, visual culture, society, politics and economics. It provides a solid foundation of Japanese language skills, including reading, writing, speaking and listening comprehension. The courses offered are ideal for students wishing to gain practical communicative skills, those planning to further specialize in Japanese Studies and those pursuing careers in areas such as education, business, government and NGOs. DAAAS offers a master of arts field, major and minor in Japanese Studies. The Japanese Major consists of 11 courses: Students are required to successfully complete the following four language courses: JPN 203 Intermediate Japanese I; JPN 204 Intermediate Japanese II; JPN 305 Advanced Reading and Comprehension I; JPN 306 Advanced Reading and Comprehension II. (Note: JPN 101 Elementary Japanese I and JPN 102 Elementary Japanese II provide the basic linguistic knowledge and skills required to begin the major, but do not count towards the major.) After consultation and proficiency test assessment administered by Japanese Program faculty, students who already demonstrate competence at any of the required levels of the Japanese language may waive part or all of the language requirements. Waived Japanese language courses will not count toward the major and must be replaced with other Japanese Studies courses to bring the total number of courses up to eleven. Students choose six of the courses listed below (or other approved Japanese Studies courses as they become available). Students are also required to successfully complete one course designated as Asian American and Diasporic Studies. The Japanese minor consists of three required language courses and three Japanese Studies elective courses. At least three of these six courses must be at the 300 or 400 level. Language Requirements: JPN 203 (Intermediate Japanese I), 204 (Intermediate Japanese II), and 305 (Advanced Reading and Composition I). Note: JPN 101 Elementary Japanese I and JPN 102 Elementary Japanese II provide the basic linguistic knowledge and skills required to begin the minor but do not count towards the minor.) Three Japanese Studies Elective Courses from the following list (or other Japanese Studies courses as they become available): Last Updated: 8/26/14
Friday, January 13 Hebrews 7:1-10: One of the most obvious features of the Bible—and most noticeable to its new readers—is the presence of what are called the “begats.” We are told, for instance, that Adam begat Cain and Abel, that Joshua begat Eleazar, that Hezron begat Pheres, and so forth. These “begats” are not just occasional parts of Holy Scripture. Not only are they sometimes lumped into lost lists, but they likewise appear to provide continuity to the Bible’s narrative structure. Thus, the uninitiated reader, informed that the Holy Scriptures are very interesting and important, comes to Genesis 5, for instance, rather early in his pursuit of God’s Word. Here he finds his first list of begats. Unaware that this is only the first of many such parts, he plods on and manages to finish chapter 5. Interest in the story picks up for the next four chapters, which deal with Noah and the Flood, but then he arrives at Genesis 10, which is simply one, long, solid list of begats. It is arguable that many a newcomer to the Bible completely breaks down at this point, never getting past chapter 10. It seems that many such readers, faced with this dilemma, decide to jump ahead to the New Testament, perhaps with the resolve to come back to the Old Testament at a later date. The person who takes this step, however, suddenly finds himself with the first chapter of Matthew, which commences with a list of 42 more begats. Many early efforts to read Holy Scripture simply die and are buried at that point, and the Bible is closed forever. Fortunately, this pattern among new Bible-readers is not universal, and some brave souls do manage to survive the begats of Genesis 10. For such as these, it must come as something of a relief to arrive at Genesis 14 and discover a character who is not on a list of begats. His name is Melchizedek, and he appears as though out of nowhere: “Then Melchizedek king of Salem brought out bread and wine; he was the priest of God Most High” (Genesis 14:18). We are not told where Melchizedek came from, nor does he ever again appear in the biblical narrative; there is not a word about his death or his descendents. He shows himself just this brief moment, but in this brief moment he is described as greater than Abraham: “Now consider how great this man was, to whom even the patriarch Abraham gave a tenth of the spoils.” In the person of Abraham, even the Old Testament priesthood of Levi paid tithes to Melchizedek. Thus, Melchizedek “without father, without mother, without begats, having neither beginning of days nor end of life, but made like the Son of God, remains a priest continually.” Melchizedek’s kingship and priesthood stand outside the begats. The very brevity of his appearance in the biblical story—which forms but an instant in the narrative, and not an element of sequence—becomes a symbol of eternity, inasmuch as eternity is an unending “now,” an instant without sequence. Our experience of eternity in this world is always an instant—a “now”—not a sequence. Thus, the “now-ness” of Melchizedek’s kingship and priesthood represents the eternal “today” of the sonship of Christ: “ You are My Son, / Today I have begotten You” (Psalm 2:7; Hebrews 5:5). Saturday, January 14 Matthew 4:12-17: This text from Matthew, found only in Matthew in fact, stands at the beginning of our Lord’s ministry. It is a transitional text, a sort of preamble, as it were, to the Lord’s public ministry. It follows immediately on His baptism and temptation in the wilderness, and it comes immediately before His choosing of the first disciples. There are three points to be made with respect to this text: First, this passage sees the ministry of Jesus as the fulfillment of prophecy. Indeed, a full half of today’s Gospel reading is taken up with a quotation from the Book of Isaiah, and this quotation is preceded by the words, “that it might be fulfilled which was spoken by Isaiah the prophet.” I regard it as important to look closely at this word “fulfilled” with respect to prophecy: plerothe. That is to say, in Jesus Christ the Old Testament has achieved the fullness of its meaning. No other meaning can be legitimately derived from it except through the interpretive lens of Christ. I make a point of this interpretive principle because a great deal of American religion ignores it completely. It has become a commonplace in American religion to read biblical prophecy according to norms other than those of its fulfillment in Christ. Let us be clear on this principle. It will save us from the error of reading biblical prophecy as though it were a set of regulations about contemporary politics, especially geopolitics, and most particularly the politics of the Holy Land. To read the Bible this way is to impose on the Sacred Text a meaning that it does not have. To assert the Bible’s “fulfillment” in Christ is to deny the legitimacy of biblical meanings apart from Christ. It is to make the Bible say what the Bible does not say. Second, this is a story about Christ as the “light” to the Gentiles, which ties it to the account of our Lord’s Baptism, of which the hymn proclaims, “When Thou, O Lord, wast baptized in the Jordan, the worship to the Trinity was made manifest; for the voice of the Father bare witness to Thee, calling Thee His beloved Son; and the Spirit in the form of a dove, confirmed the truthfulness of His word. Wherefore, O Christ, who didst reveal Thyself and hast enlightened the world, glory to Thee.” This Gospel continues the theme of light to the Gentiles: “The people who sat in darkness have seen a great light, And upon those who sat in the region and shadow of death Light has dawned.” This is the first in the set of bookends, as it were, that enclose the Gospel of Matthew. He begins with those Gentile Magi coming to worship Emmanuel, which means God with us, and he ends the Gospel with the Lord’s mission to disciplelize all the nations and His assurance to be with us always even to the end of the world. In other words this continues the theme of Christmas itself. And what is the way to enlightenment by Christ? Ongoing repentance: metanoeíte. It does not mean, “repent.” It means “keep on repenting.” Repentance is not something to be done once. It is to be done all the time. Our conversion is a repeated process, finally become a habit of soul. This is how we Gentiles are to receive the light of Christ. Third, this is a story about Galilee, and it prepares for Jesus’ Galilean mission. In the Gospel of Matthew the public life of Jesus both begins and ends in Galilee. When Jesus gives the Great Commission to the Eleven at the end of Matthew, this takes place on a mountain in Galilee. This emphasis on Galilee is one of Matthew’s most significant traits. What does Galilee mean for Matthew? Well, today he calls it the “Galilee of the Gentiles”: “He came and dwelt in Capernaum, which is by the sea, in the regions of Zebulun and Naphtali, that it might be fulfilled which was spoken by Isaiah the prophet, saying: “ The land of Zebulun and the land of Naphtali, By the way of the sea, beyond the Jordan, Galilee of the Gentiles.” Galilee was that part of the Holy Land where Jews and Gentiles dwelt together, and this trait is what made it an image and type of the Church. The Church is the place where Jews and Gentiles worship together; it is the place where the dividing wall has been broken down. The Church is the one, holy, catholic and apostolic Israel, the fullness of the People of God. Sunday, January 15 Matthew 4:18-24: There are many things to consider, if we reflect on what it means to “follow” Christ, but today we want to regard especially what following Christ says about Christ Himself. First, Christ is our Leader (cf. Hebrews 12:1-2), God’s Son has passed through the full human experience, and He is the one person in history who has done it right. He alone has lived completely as God intended human beings to live. He has modeled human life and death in His own life and death. The author of Hebrews uses the present participle to indicate what is meant by “looking unto Jesus.” In Greek the present participle refers to sustained and continued action, not a single and isolated action. Aphorontes, says Hebrews, which means continually looking at Jesus, not glancing at Him once in a while, from time to time. It does not mean looking at Him only on Sundays, or only when we pray. His “leadership” means fixing our eyes on Him at all times, not for a moment losing sight of Him. In this respect Christ is the fulfillment of the Law. Just as the saints of the Old Testament were to have the Torah constantly in their minds and always before their eyes, we are to have constantly in our minds and always before our eyes the One who is the fulfillment of the Torah. Christ is to become our fixation, not our “fix.” I think we all know what is commonly meant by a “fix,” a word that refers to a narcotic that is taken to “hold us over.” Jesus is not a fix; He is a fixation. We are not to take Christ in small doses, a weekly vaccination of the “Jesus germ,” as it were, a vaccination to guarantee that we never “catch” the real thing. Christ is not our “fix.” He is to become our fixation, the sustained and constant preoccupation of our minds and hearts. If we are to run the race that He has run, then we must at all times know exactly where He is. This is why there must be something obsessive about the Christian life. If we are to be, as St. Paul says repeatedly, “in Christ,” then Christ must be our very atmosphere. Christ must become our constant mode of thought, which St. Paul refers to as “the mind of Christ.” Second, Christ is our Teacher. In the Gospels, in fact, the disciples often address Him as “Rabbi,” a Semitic word that means “teacher.” He tells us to learn from Him. To learn, we all know, I think, is to be set free from ignorance and deception. And what is required of someone who wants to learn? Docility, which is to say “teachableness.” The surest guarantee against learning anything is the sense that one already knows it all. When Jesus invites us to learn from Him, He adds, “For I am meek and humble of heart.” If meekness and humility are the qualities of Christ our Teacher, what level of meekness and humility are required of us as His students? You see, the term disciple is simply the Latin word for student. As Christians we are life-long students of Christ, always prepared to be instructed further, ever eager to learn more. Third, Christ is our Helper. When we follow Him, He does not run out ahead of us so as to lose track of us. It is He that sustains us in the struggle. How does Jesus treat those that endeavor to follow Him? St. Paul learned the answer to this question while he was first at Corinth. St. Luke tells us, “Now the Lord spoke to Paul in the night by a vision, ‘Do not be afraid, but speak, and do not keep silent; for I am with you, and no one will attack you to hurt you; for I have many people in this city.’” Christ our Lord does no less for us than He did for Paul. When we stumble, He is always there to hold us up. When we slip and fall, it is He that restores us to the race. When we wander and become lost, He leaves the ninety-nine sheep on the mountain and goes out in search of us. When we can no longer walk, He carries us. When we are weary with toil and grow faint from the journey, He it is that upholds us. In joy He strengthens us. In despondency He cheers us. In repentance, He forgives us. In all things He teaches us. The Leader and Teacher Christ, whom we follow, is our ever-present Help in time of need, the food for our journey, our living water in the desert, our fortress in affliction, the healing of our hearts, our solace in every sorrow. The name of Jesus, therefore, is seldom absent from our lips and never absent from our hearts. With blind Bartimaeus we cry out to Him. With Mary Magdalene we cling to Him. With the leper we plead with Him. With the widow of Nain we trust in Him. With Thomas we love and adore Him. With Martha of Bethany we strive in all things to serve Him, and with her sister Mary we sit, docile, at His feet. With Peter we walk on the very waters to come to Him. With the Apostles and holy women, we prostrate ourselves before Him. This is what it means to be a disciple, and to all this Jesus our Leader and Teacher invites us today, when He says to us, as He said to the first four of His disciples, “Come, follow Me!” Monday, January 16 Matthew 5:1–12: The Sermon on the Mount begins with two very solemn verses, as though to allow everyone to sit down and get settled for a long discourse. The Sermon functions in more than one way to serve the structure of Matthew’s entire composition. For example, taking place on a mountain at the very beginning of the Lord’s ministry, it is the initial component of a parallel with the mountain at the end of the Gospel, the mountain from which Jesus sent the Apostles to teach what he had taught (28:20). Again, the Sermon is the first of the five great discourses—a New Testament Chumash as it were—which are the didactic backbone of Matthew’s Gospel. Functioning thus, it stands in chiastic correspondence to the last of these five discourses, the lengthy sermon on the Last Things (chapters 23–25). Close readers of Matthew have long observed that this Sermon itself forms a commentary on the Beatitudes with which it begins (verses 2–10). This commentary is also chiastic, meaning that it reverses the order of the Beatitudes. Thus, for example, verses 11–12 form a commentary on verse 10, verses 13–16 are a commentary on verse 9, and so forth. Compared to the shorter Beatitudes in Luke’s Sermon on the Plain (6:20–22), we observe that, whereas Luke’s version contains only “situations” (poverty, hunger, etc.), Matthew’s version commends ethical norms (mercy, purity of heart, etc.). Luke’s version is entirely kerygma, or proclamation, whereas Matthew’s is also didache, or instruction. It includes a moral code, in addition to the proclamation of the Kingdom and the overthrow of the worldly order. We observe Matthew’s use of an inclusio, beginning and ending with “the Kingdom of Heaven” (verses 3,10). Hebrews 8:7-13: This passage is almost entirely made up of a quotation from Jeremiah 31:31-34. Indeed, it is the longest Old Testament quotation found in the New Testament. This text, often described as the best lines of Jeremiah, is also one of the most emphatic passages to come from his pen. It is emphatic in the sense of its repeated insistence that God is the one who speaks. Four times this text affirms, “says the Lord.” The significance of this repetition become clear in a consideration of its context: the fall and destruction of Jerusalem. Jeremiah, like the others citizens of the Holy City, saw the obliteration of everything connected with it: the temple, the priesthood, the worship, and so forth. What was left? Nothing but the covenant of the heart. Jeremiah still knew God in the heart. This heart-knowledge of God, Jeremiah believed, would become the substance of a new covenant with the people of God. The Torah would be written in the heart, not on tables of stone. God would be known immediately, not as the content of someone else’s teaching. God would act with the sovereignty of His grace: “I will make . . . I will put . . . I will write . . .I will be . . . I will forgive.” Tuesday, January 17 Matthew 5:13–20: In verse 11 the address of Jesus shifted from the third to the second person: “Blessed are you.” The addressed party is the Church—or rather, the Christians—inasmuch as the number of the address is plural. That plural, addressed to Christians, is maintained in the verses now under consideration: “You are the salt of the earth,” this section begins, and it ends, “for I say to you (verse 20). We start with the metaphors of salt and light, both of them referring to Christians. In each case the beneficiary of these two blessings is the earth (ge) or World (kosmos), meaning those who are not Christians (verse 13). Salt and light describe the very people that the world persecutes and maligns (verses 11–12). No amount of persecution justifies the forfeiture of the Christian vocation to be salt and light to the rest of humanity. Neither salt nor light exist for themselves. Should Christians fail in this vocation, they are no longer of any use. They are to be “thrown out,” like the tares (13:40) and the inedible fish (13:48). The metaphor of light on a lamp stand is transformed into a city seated on an acropolis, where it is visible to everyone (verse 14). Neither can Christians be concealed if they do the “good works” (ta kala erga) that their heavenly Father expects of them (verse 16). Those who see these good works belong to the same “earth” or “world” that persecutes the Christians. The world is to be enlightened by the very people it persecutes. What Matthew has in mind here is the Christian vocation to holiness, by which the world is instructed in the ways of God. This holiness, according to the present passage, pertains to the missionary mandate of the Church. It is the way the Church shares the Gospel with “all nations” (28:19–20). This is the light that shines on those sitting in darkness (4:16). The connecting link of verses 13–16 with the rest of the Sermon on the Mount is “your Father in heaven” (verse 16). This reference will become a leitmotif in the following chapter. The rest of chapter five, starting with the present verses, is concerned with Jesus’ relationship to the Old Testament Law. This theme is related to the metaphors of salt and light through the continuity linking the Church to ancient Israel, the legitimate continuation of God’s redeemed people. It is the Church that continues Israel’s vocation to “salt” and illumine the world. For this reason it is imperative to speak of the Church’s relationship to the Torah, and this relationship is the subject of the rest of the present chapter. Wednesday, January 18 Matthew 5:21–30: The first of Matthew’s five contrasts has to do with the Lord’s understanding of the Torah’s prohibition, “Thou shalt do no murder” (verse 21). Here, as in the next examples, Jesus responds, “but I say to you,” a formula indicating that His own understanding of the Law is superior even to that of Moses. There is an irreducible claim in these sustained assertions—namely, that Jesus, being the very Lawgiver of Mount Sinai, has the authority to speak for the Law’s intention. This claim is based on the standard legal principle: “the meaning of a law is determined by the intention of the lawgiver.” Moses, after all, was only the promulgator of the Torah, not its author. Jesus implicitly makes the latter claim for Himself, which is the reason He is speaking from the mountain (verse 1). Thus, Jesus understands the prohibition against murder not simply as an injunction against taking someone’s life, but as an interdiction excluding all acts of anger and violence, including speech and even thought (verse 22). This teaching is given in detail and at some length, as Matthew portrays Jesus as the Teacher of the Church. He teaches with authority (7:29). In the present case—dealing with anger—the teaching of Jesus is consistent with standard Old Testament moral doctrine, especially tht found in the Wisdom literature (Proverbs 6:14, 34; 14:17, 29; 15:1, 18; 16:14, 32; 19:19; 27:4; cf. James 1:19–20). The context of this prohibition against anger and violence is the Christian Church, a point indicated by the references to the “brother” (verses 22, 23, 24). Indeed, these admonitions are set within the context of the Church’s Eucharistic worship (verse 24). This is clearer, perhaps, in the Didache, a Syrian work roughly contemporary with Matthew: “But every Lord's day gather yourselves together, and break bread, and give thanksgiving after having confessed your transgressions, that your sacrifice may be pure. But let no one who is at odds with his fellow come together with you, until they be reconciled, that your sacrifice may not be profaned” (Didache 14). In short, love is superior to sacrifice (12:7; Mark 12:33–34). Reconciliation must be made “quickly” (verse 25), so that the conflict does not grow out of hand. The “imprisonment” in this section refers to the divine judgment, as it does in the parable of the unforgiving servant (18:34–35). The teaching of these verses implicitly contrasts contention with love. For Jesus and the New Testament, love is the true fulfillment of the Torah (22:40). For this reason, it is important to understand what is meant by love and not to be confused by its counterfeits. This consideration forms the sequence to the next contrast. Thursday, January 19 Psalms 37: If we think of prayer as speaking to God, Psalm 37 (Greek and Latin 36) appears at first to challenge the very notion of the psalms as prayers, inasmuch as not a single word of it is explicitly addressed to God. It speaks about God, of course, but never to Him, at least not overtly. Psalm 37 is also strangely constructed, even if the construction is rather simple. It is one of those twelve psalms built on what is known as an alphabetic acrostic pattern—that is to say: starting with the first letter of the Hebrew alphabet, aleph, each new line (in this case, every other line) of the psalm begins with the next successive letter of the alphabet. Thus, if one looks for some sort of logical or thematic progression in the course of the psalm, he may be mightily disappointed. The arrangement of the psalm’s ideas is determined only by something so artificial and arbitrary as the sequence of the alphabet, so the meditation does not really progress. It is, on the other hand, insistent and repetitive. It is obvious at once that Psalm 37 has close ties to the Bible’s Wisdom tradition. If it were not part of the Psalter, we would expect to find it in Proverbs or one of the other Wisdom books. It appears to be a kind of discourse given by a parent to a child, or a wise man to a disciple. It is full of sound and godly counsel: “Fret not thyself because of evildoers . . . Trust in the Lord and do good . . . Cease from anger and forsake wrath . . . Wait on the Lord and keep His way,” and so forth. Such admonitions, along with the psalm’s allied warnings and promises, are stock material of the Wisdom literature. So how does one pray such a psalm? To begin with, by respecting its tone, which is one of admonition, warning, and promise. Surely prayer is talking to God, but it also involves listening to God, and this is a psalm in which one will do more listening than talking. It is a psalm in which the believer prays by placing his heart open and receptive to God’s word of admonition, warning, and promise. One may likewise think of Psalm 37 as the soul speaking to itself: “Rest in the Lord, and wait patiently for Him . . . But the meek shall inherit the earth . . . The little that the righteous has is better than the riches of many wicked . . . The Lord knows the days of the upright . . . The Law of his God is in his heart,” and so on. The human soul, after all, is not of simple construction. The great thinkers who have examined the soul over many centuries seem all to agree that it is composed of parts, and sometimes these parts are at odds one with another. This mixture of conflicting experiences in the soul leads one to utter such petitions as, “Lord, I believe. Help my unbelief.” It is one part of the soul praying for the other. In this psalm, one part of the soul admonishes the other, reminds the other, cautions the other, encourages the other. And this inner conversation of the human spirit all takes place in the sight of God, the Giver of wisdom. This inner discussion is rendered necessary because of frequent temptations to discouragement. As far as empirical evidence bears witness, the wicked do seem, on many occasions, to be better off than the just. By the standards of this world, they prosper. Our psalm is at pains to insist, however, that this prosperity is only apparent, in the sense that it will certainly be short-lived. As regards the workers of iniquity, “they shall soon be cut down like the grass, and wither as the green herb . . . For evildoers shall be cut off . . . For yet a little while, and the wicked shall not be . . . For the arms of the wicked shall be broken . . . The transgressors shall be cut off together.” The suffering lot of the just man is likewise temporary and of brief duration. He need only wait on the Lord in patience and trust: “Delight yourself also in the Lord, and He will give thee the desires of thy heart. Commit your way unto the Lord, and trust in Him, and He shall bring it to pass . . . But the salvation of the righteous is of the Lord; He is their strength in the time of trouble. And the Lord will help them and deliver them; He will deliver them from the wicked and save them, because they trust in Him.” This, then, is a psalm of faith and confidence in God, without which there is no Christian prayer. It is also faith and hope under fire, exposed to struggle and the endurance that calls for patience. After all, “faith is the substance of things hoped for” (Heb. 11:1), and “We were saved in this hope, but hope that is seen is not hope . . . But if we hope for what we do not see, we eagerly wait for it with perseverance” (Rom. 8:24, 25). Our psalm is a meditative lesson on not being deceived by appearances, and a summons to wait patiently for God’s deliverance. Friday, January 20 Matthew 5:43—6:4: We begin with the fifth and final contrast between Gospel righteousness and that of the scribes and Pharisees; it has to do with the love of one’s enemies. The Old Testament does not actually prescribe hatred of one’s enemies, of course; that part is a sort of hyperbole. Nonetheless, the prescribed love of one’s neighbor (22:39; Leviticus 19:18) certainly prompted some question about who, exactly, was included in this list (Luke 10:29). Jesus extended the Mosaic commandment on this point by expanding the word “neighbor” to include “enemy.” This truly was a new idea in Israel’s experience. This love of one’s enemies must come from the heart, because Jesus made it a matter of prayer (verse 44). It has to do with one’s relationship to the “Father in heaven” (verses 45,48). Once again, as in all these five contrasts, believers are called to “exceed” (perisson–verse 47). Their love, like their righteousness, must be “in excess” (verses 46-47). To love those that love us affords no reward, because such love is its own reward. The love of one’s enemies, however, is not an act rewarding in itself. One loves in such a way only for the sake of the heavenly Father. This kind of love makes a person “perfect,” it most renders him like God, and being “like God” is the purpose of the Torah (Leviticus 19:2). It is understood, of course, that only God can enable a person to love in this way (Romans 8:2-4). The love of one’s enemies appears last in Matthew’s sequence of contrasts based on the Torah, because it is the perfecting and ultimate sign of Gospel righteousness. It must be the distinguishing mark of the Christian. By it, believers become not only “more righteous, but perfect like unto God. The love of one’s enemies certainly does not “come naturally.” Indeed, if it does seem to “come naturally,” something is wrong with it. In such cases, it is a counterfeit. Such counterfeits are not rare, so we do best to distinguish this Gospel love from things that resemble it. For example, the love of enemies enjoined in the present context is not a tactic, a thing done to accomplish something else. It is not the practical means to an end, such as the conversion of the enemy. The love of enemies enjoined in this passage is an end in itself, because it renders a man like unto God. This Gospel-enjoined love of enemies is not a mark of noble character—the generosity of the magnanimous man—nor is it the cultivated fruit of universal benevolence, of the sort we associate with the oriental religious sage. These are but human counterfeits of what the Lord enjoins here. Christian love of enemies is done purely to please a Father in heaven. Nor is the purpose of the love of enemies to feel good or virtuous. In fact, the Christian who loves his enemies may feel perfectly miserable about himself. The love of one’s enemies is not an exercise in self-fulfillment. It is, rather, an act of self-emptying. It is the Cross. It is to love as Christ loves, and as His Father loves. The first four verses of chapter 6—on the subject of almsgiving—are proper to Matthew. The first word, a plural imperative, is a summons to caution: “Take care,” prosechete. The Christian moral life has this in common with any serious moral system; namely, that an intense, reflective custody of the soul is necessary. In the present instance this custody has chiefly to do with the purity of one’s intentions. The entire moral life can be radically undermined by wrong intentions. Purification of intentions requires a most serious vigilance over the mind and will. Jesus, having told us in a series of five contrasts, that our righteousness must excel that of the scribes and Pharisees, now insists that this righteousness (dikaiosyne) must not be “done” (poiein) for the benefit of human approval. Were this latter to be the case, that human approval must suffice as its reward. In this insistence we find complement to the preceding chapter. In the five contrasts just noted, attention was given to righteousness with respect to our dealings with our neighbors (control of the temper and the sexual impulse, complete honesty, non-resistance to aggression, and the love of enemies). Now the direction of righteousness is turned to God, our Father in heaven (verse 1). This verse introduces the three subjects treated in chapter 6, the great triad of traditional Jewish piety: almsgiving, prayer, and fasting. Because our Lord Himself authoritatively juxtaposes these three components here in Matthew, it is normal to think of them together as constituting a kind of ascetical standard. In truth, for a very long time Christians (for example, Hermas and Leo I of Rome, John Chrysostom, and Maximus the Confessor) have habitually spoken of the three together as sort of a paradigm or outline of biblical ascetical life. In pre-Christian biblical literature, however, that specific triad of prayer, fasting, and almsgiving is found in only one place: Tobit 12:8. It is through Matthew that this triad passed into Christian piety. Even as Jesus treats of these three practices of piety, however, He continues the spirit of the five contrasts that He elaborated in the previous chapter. Almsgiving, prayer, and fasting, He says, are all to be undertaken in a spirit that is contrasted with that of the hypocrites (verses 2,5,16). By now it is clear that this word refers to those same scribes and Pharisees; it is shorthand for the Jewish leadership that set itself against Jesus and the Gospel. Matthew’s references to them in these early chapters show a rising hostility on their side, as well as Jesus’ disposition to take them to task. This latter disposition will reach its climax in chapter 23, which several times will condemn the “scribes and Pharisees, hypocrites!” In the present text, these hypocrites are accused of failing to “take care” not to practice their righteousness to gain human approval. Theirs is not a true righteousness. The first deed of righteousness named by Jesus is almsgiving (verses 2-4), which comes closest to the concerns of social behavior enunciated in the preceding five contrasts. The social nature of almsgiving makes it the easiest thing to do for human approval. However, those who abuse almsgiving by a bad intention are simply using the poor to their own advantage. Very well, says Jesus, they must be satisfied with that advantage (verse 2). According to Gospel righteousness, on the other hand, the value of almsgiving must be preserved in secrecy. If the deed is disclosed to others, it loses its value before God (verse 3). The deed must not be spoiled by its motive.
Ten years have flown by since that fateful day when Daikichi first met Rin at his grandfather's funeral. While Daikichi may be still much the same-though perhaps a bit balder and a few pounds heavier-the wise-beyond-her-years Rin has blossomed into a smart, capable, and well-adjusted teenager. But as the trials and tribulations of high school and adolescence descend in full force upon the pair's cozy household, confusion plagues Rin as her relationship with her childhood friend Kouki begins to change into something different. Will Daikichi, who put his own love life on hold to take care of Rin, actually be able to provide her with the guidance she needs? |Book:||Bunny Drop, Vol. 5| |Number of Pages:||224| Please Note - * We sell only NEW book and do NOT sell old or used books. * The book images and summary displayed may be of a different edition or binding of the same title. * Book reviews are not added by BookAdda. * Price can change due to reprinting, price change by publisher / distributor. BookAdda (www.bookadda.com) is a premier online book store in selling books online across India at the most competitive prices. BookAdda sells fiction, business, non fiction, literature, AIEEE, medical, engineering, computer book, etc. The books are delivered across India FREE of cost.
A spy plane gathering data on a new Russian weapon is blown out of the sky by a mysterious MiG. Is it an accident or the start of the next world war? One U.S. agency has what it takes to find out-the National Security Agency and its covert operations team: DEEP BLACK. Working for the NSA, ex-Marine sniper Charlie Dean is dispatched to Russia, hooking up with former Delta Force trooper Lia DeFrancesca to find out what happened to the plane. The Deep Black team stumbles across an even more alarming secret-a plot to assassinate the Russian president and overthrow the democratic government by force. The coup could have dire consequences for Russia and the world. With no clearance from the government it's called on to protect, the National Security Agency goes to war. But before Lia and Dean can unravel the conspiracy, they learn that one of the spy plane's passengers-an NSA techie-survived the crash. Critical information could fall into enemy hands. And that enemy is playing to the death. |Author:||James Defelice Stephen Coonts| |Number of Pages:||384| Please Note - * We sell only NEW book and do NOT sell old or used books. * The book images and summary displayed may be of a different edition or binding of the same title. * Book reviews are not added by BookAdda. * Price can change due to reprinting, price change by publisher / distributor. BookAdda (www.bookadda.com) is a premier online book store in selling books online across India at the most competitive prices. BookAdda sells fiction, business, non fiction, literature, AIEEE, medical, engineering, computer book, etc. The books are delivered across India FREE of cost.
Joy Castro Granted Tenure; Wins Research Awardby Jim Amidon • December 25, 2002 English professor Joy Castro teaching in the 2000 spring semester Castro, an award-winning and widely published author, earned her bachelor’s degree cum laude from Trinity University and her master’s and Ph.D. from Texas A&M University. Since her arrival on campus in the fall of 1997 as a Byron K. Trippet Assistant Professor of English, Castro has served on a range of College committees, and was actively involved in the strategic planning process. She serves as chair of the Faculty Development Committee, and is a member of the Gender Issues, Fine Arts Fellowship, and Visiting Artists Series Planning committees. Castro is the Wabash liaison to the GLCA Women’s Studies Program, and has been involved in the Center of Inquiry in the Liberal Arts. “Joy is not only an excellent teacher, but she is constantly looking for ways to improve,” said Dean Ditzler. “Every semester she tries something new in her courses in an effort to improve her teaching, and she is active in sharing those ideas with her colleagues.” Castro has worked diligently to nurture student writing, and has been the advisor to the Wabash Review, as well as a frequent advisor and contributor to Wabash Magazine. She also has worked as a volunteer at the Montgomery County Family Crisis Shelter. Castro will be on sabbatical during the 2003-04 school year, and has been honored as the McLain-McTurnan-Arnold Research Scholar for the spring semester. Castro is the 24th MMA Research Scholar since the program was established to allow faculty to conduct original creative and investigative research to enhance classroom teaching and learning. Castro will use her research sabbatical to complete a book-length manuscript on Modernism, Feminism, and the Work of Margery Latimer for University Press of Florida. “The book is a feminist recovery project,” says Castro, who will use elements of her dissertation on the American modernist writer, along with papers she has presented on Latimer and archival research conducted at Yale and Wisconsin. “This project restores to critical view the reputation of a groundbreaking innovator of modernist fiction whose work was originally published alongside that of Hemingway, Joyce, and Faulkner…but whose reputation eroded after her early death in childbirth in 1932.” Castro’s dissertation on Margery Latimer proved to be historically important work in that it brought to attention the literary production of a popular American modernist writer of the 1920s and 1930s. Since that time, Castro has presented a large number of conference papers on Latimer and her husband, the Harlem Renaissance writer Jean Toomer. Professor of Chemistry Richard Dallinger chaired the MMA Research Scholar selection committee. “It is a very difficult task each year for the committee to select one award recipient from among the many outstanding proposals,” he said. “The committee members are thrilled to honor Joy Castro as this year’s McLain-McTurnan-Arnold Research Scholar. She is a top-notch scholar, and her manuscript on the life and works of Margery Latimer will be an important contribution to the field of modernist literature.” Castro has earned a number of awards for her teaching and scholarship. She won the McDonald Award for Teaching Excellence at Texas A&M; the Charles Gordone Creative Writing Award for Poetry; the American Business Women’s Association Graduate Scholarship; the Staley Creswell Award for Outstanding Teaching; and the Women’s Faculty Network Graduate Scholarship. Castro’s short fiction and essays have appeared in North American Review, Mid-American Review, Puerto del Sol, Quarterly West, Wabash Magazine, Indianapolis Monthly, and Works and Days, the newsletter of the Wabash College English Department. Her research on Margery Latimer appears in the American National Biography and the Review of Contemporary Fiction. “I am constantly inspired when reading her creative works,” added Ditzler. “Joy’s characters so accurately depict the lives of people who struggle in our society that many of us who read her work become inspired. We become inspired to work harder at the educational enterprise in an effort to build a stronger society in which to live.”
Duration of symptoms of respiratory tract infections in children: systematic reviewBMJ 2013; 347 doi: http://dx.doi.org/10.1136/bmj.f7027 (Published 11 December 2013) Cite this as: BMJ 2013;347:f7027 - Matthew Thompson, Helen D Cohen endowed professor of family medicine1, - Talley A Vodicka, consultant2, - Peter S Blair, senior research fellow3, - David I Buckley, assistant professor2, - Carl Heneghan, professor4, - Alastair D Hay, professor of primary care and NIHR research professor5 - on behalf of the TARGET Programme Team - 1Department of Family Medicine, Box 354696, University of Washington, Seattle, WA 98195-4696, USA - 2Department of Primary Care Health Sciences, University of Oxford, Oxford, UK - 3School of Social and Community Medicine, Level D, St Michael’s Hospital, University of Bristol, Bristol, UK - 4Departments of Family Medicine, Medical Informatics and Clinical Epidemiology, Public Health and Preventive Medicine, Oregon Health and Science University, Portland, OR, USA - 5Centre for Academic Primary Care, School of Social and Community Medicine, University of Bristol, Bristol, UK - Correspondence to: M Thompson - Accepted 8 November 2013 Objective To determine the expected duration of symptoms of common respiratory tract infections in children in primary and emergency care. Design Systematic review of existing literature to determine durations of symptoms of earache, sore throat, cough (including acute cough, bronchiolitis, and croup), and common cold in children. Data sources PubMed, DARE, and CINAHL (all to July 2012). Eligibility criteria for selecting studies Randomised controlled trials or observational studies of children with acute respiratory tract infections in primary care or emergency settings in high income countries who received either a control treatment or a placebo or over-the-counter treatment. Study quality was assessed with the Cochrane risk of bias framework for randomised controlled trials, and the critical appraisal skills programme framework for observational studies. Main outcome measures Individual study data and, when possible, pooled daily mean proportions and 95% confidence intervals for symptom duration. Symptom duration (in days) at which each symptom had resolved in 50% and 90% of children. Results Of 22 182 identified references, 23 trials and 25 observational studies met inclusion criteria. Study populations varied in age and duration of symptoms before study onset. In 90% of children, earache was resolved by seven to eight days, sore throat between two and seven days, croup by two days, bronchiolitis by 21 days, acute cough by 25 days, common cold by 15 days, and non-specific respiratory tract infections symptoms by 16 days. Conclusions The durations of earache and common colds are considerably longer than current guidance given to parents in the United Kingdom and the United States; for other symptoms such as sore throat, acute cough, bronchiolitis, and croup the current guidance is consistent with our findings. Updating current guidelines with new evidence will help support parents and clinicians in evidence based decision making for children with respiratory tract infections. Respiratory tract infections are particularly common in children; most are self limiting and the risk of complications is small. Recommended management therefore typically involves self care and treatment of symptoms. Nevertheless, such infections still account for over a third of paediatric consultations to primary care in the United Kingdom and the United States,1 2 and antibiotics are commonly prescribed in many countries despite limited evidence of effectiveness. One of the most common questions that parents ask when consulting healthcare services is “how long will my child’s symptoms last?” Accurate information about the expected course of respiratory tract infections in children is essential for both clinicians and parents, as it sets expectations and lets them know when the illness is deviating from the expected.3 4 This directly informs parents’ decisions to seek medical attention, whether to re-consult, and when to use delayed prescriptions of antibiotics, as well as clinicians’ decisions on when to prescribe antibiotics or consider other treatments.3 5 6 7 Commonly used estimates of the expected time course of symptoms of common respiratory tract infections are highly variable and not always evidence based. For example, the 2008 National Institute for Health and Care Excellence guidelines for treatment of respiratory tract infections include estimates of average duration of the illness (before and after seeing a doctor) of four days for acute otitis media, one week for acute sore throat, one and a half weeks for the common cold, and three weeks for acute cough or bronchitis.8 By contrast, information for patients from the US Centers for Disease Control and Prevention describe sore throat as lasting one to two weeks, common cold lasting up to two weeks, and cough duration ranging from two to eight weeks.9 The durations quoted in these sources reflect findings based on expert opinion or from individual studies rather than from data synthesis of multiple studies and are not child specific. We therefore conducted a systematic review of the literature on symptom durations of the most common respiratory tract infections (earache, sore throat, cough, and common cold) in children presenting to primary care. Studies were eligible for inclusion if they recruited otherwise healthy children (birth to 18 years) with acute respiratory infections presenting to primary care or emergency department settings; were conducted in high income countries, as defined by the Organisation for Economic Co-operation and Development10; provided data on time to resolution of symptoms or complete duration of symptoms; involved placebo or no treatment arms of controlled non-surgical treatment trials or prospective observational studies; and reported in English. Although respiratory tract infections can include a cluster of various symptoms, certain symptoms (such as cough) predominate in clinical experience and in published trials, depending on a child’s illness, ability to describe his or her symptoms, and/or parental recognition and interpretation of symptoms.11 Given this, we chose to not only include studies of children presenting with clustered symptoms (such as common cold or undifferentiated respiratory tract infections) but also those of individual symptoms (such as sore throat). We included studies of children presenting with primary complaints of earache (acute otitis media), sore throat (or pharyngitis or tonsillitis), cough (or acute bronchitis, bronchiolitis, or croup), and common cold (or upper respiratory tract infection). We excluded studies of children with chronic, recurrent, or complicated infections; experimentally induced infection; or medical conditions associated with a high risk of serious infections (such as cystic fibrosis, immunodeficiency). We also excluded studies conducted in inpatient settings or in low or middle income countries as defined by the Organisation for Economic Co-operation and Development, where the risk of complications from infection might be higher. Studies that reported data on both children and adults were included only if data were presented separately by age. We excluded trials comparing two active treatments, those of prophylactic or adjuvant treatments, and retrospective studies; studies with follow-up of 24 hours or less; and studies that presented symptom duration only before consultation, assessed only incidence or prevalence, or presented duration of symptoms by symptom score or individual pathogen. We identified relevant intervention trials and observational studies using two search strategies (appendix 1). Firstly, we conducted searches in PubMed, DARE, and CINAHL (all databases searched through July 2012) to identify randomised controlled trials and systematic reviews of trials for each of the four symptoms of respiratory tract infection (sore throat, cough, common cold, and earache). Search terms included clinical syndromes and symptoms, study design, and paediatric population with both MeSH and free text terms. We also hand searched the Cochrane Acute Respiratory Infections and Ear, Nose and Throat Groups for systematic reviews of randomised controlled trials. Secondly, we searched PubMed (1966-July 2012) for observational studies of children with acute sore throat, cough, common cold, or earache using terms for clinical syndromes and symptoms, child, and limited by publication type (that is, excluding clinical trials and systematic reviews of clinical trials). We reviewed reference lists of selected studies identified using both of these strategies and searched related citations to identify additional references. One author (TAV) screened titles and abstracts using the inclusion and exclusion criteria. Two authors (TAV and MT) reviewed the full text of all potentially relevant studies to determine final inclusion. Two authors (TAV and MT) independently extracted data using a predetermined template. Authors were not blinded to any aspect of the studies during extraction, and disagreements were resolved by consensus (TAV, MT, and DIB/CH). We extracted data on country and setting of study; population; length of follow-up; description of presenting symptom(s) and/or diagnostic criteria; description of intervention and control; definition of usual care in placebo arms of trials; specified outcome(s); outcome assessor (parent, child, clinician, or investigator); method of outcome assessment; and data on adverse events (complications, re-consultations, admission to hospital). The outcomes of interest were time to resolution of symptoms or duration of symptoms. These included time taken for prespecified proportions (such as 50%) of children’s symptoms to have resolved, the study population, proportion of children with unresolved symptoms at follow-up, or mean or median duration of symptoms. For studies of common cold or undefined/non-specific respiratory tract infections, we extracted data on symptom duration for the cluster of symptoms comprising a cold as defined in each study (reported in appendix 2). We extracted data from studies that reported proportions of children with symptoms at time points, provided continuous data from which proportions could be inferred, or presented mean (and 95% confidence interval) durations of symptoms. When available we also extracted data on symptom duration before consultation. We extracted data only from the non-intervention (that is, placebo) arms of included randomised controlled trials. Data from line graphs were extracted with DigitizeIt software (DigitizeIt 2010, version 4.0.2, Carrascal). Two authors (TAV and MT) independently assessed quality of included studies using the Cochrane risk of bias framework for randomised controlled trials12 and the critical appraisal skills programme13 framework for observational studies. Disagreements were resolved by consensus (TAV, MT, and DIB/CH). Judgment regarding risk of bias (“high,” “low,” or “unclear risk of bias”) was made for each criterion. We report data on duration of symptoms for each symptom category from each study. When possible (that is, at time points included in two or more studies) we calculated the pooled daily mean proportions and 95% confidence intervals for symptom duration and presented summary data visually. Given the heterogeneity in study populations and inconsistent methods of assessment, we have also presented the individual study data in addition to pooled means to display the variation in symptom durations. We identified the mean time point (as number of whole days) at which the symptom was resolved in 50% and in 90% of children with that particular symptom. Though we had planned to carry out subgroup analyses based on age and symptom duration before enrolment, we were unable to do so because of insufficient data. The search for randomised controlled trials identified 10 829 papers; after review of titles and/or abstracts we excluded 10 637 (fig 1⇓). Based on full text review of 192 papers, we excluded a further 169 and included 23 trials in the analysis. The search for observational studies identified 11 353 papers; after review of titles and/or abstracts we excluded 11 226 (fig 2⇓), and after review of the full text of 127 we excluded 102, leaving 25 observational studies in the analysis. We present results separately by type of symptom of respiratory tract infection. We included data from seven trials with 958 children14 15 16 17 18 19 20 and three observational studies with 451 children21 22 23 (tables 1⇓ and 2⇓). Included trials and studies came from the UK,14 23 USA,16 Netherlands,15 Sweden,19 Denmark,18 Finland,20 Canada,17 Poland,22 and Israel21 (appendix 2). Earache was generally present less than four days before study entry, and follow-up ranged from eight days to four months in randomised controlled trials, and 21 days to a year in observational studies. In most studies, parents assessed symptom duration14 15 16 17 19 20 21 22 23 using daily symptom diaries, telephone interviews, or in person questionnaires. Most studies had low risk of bias, though assessment of bias was difficult because of unclear methods in two studies18 23 (appendix 3). Risk of bias was highest in the study by Neumark and colleagues,19 which used an open trial design with no blinding among parents or clinicians. Among the five studies that reported mean duration, symptoms of earache lasted from half a day to nine days14 15 19 21 22 (table 1⇑). Based on the pooled results from 10 studies, 50% of children’s symptoms had resolved at day three and 90% by days seven to eight (fig 3⇓). Damoiseaux and colleagues15 and Greenberg and colleagues21 reported fever (as well as earache) lasting three days (median) and 2.9 days (mean, SD 2.6), respectively. We included six trials on 241 children24 25 26 27 28 29 and one observational study of 103 infants.22 Most trials took place in North America,24 26 27 with the remainder from the UK,25 Italy,28 and the Netherlands.29 The single observational study was conducted in Poland.22 Characteristics of patients varied across studies (appendix 2). Average duration of illness before entry into the study ranged from less than one to less than four days. Outcomes were assessed by parents in all studies,22 24 25 26 27 28 29 clinicians in two studies,26 28 and children in three studies,25 27 28 with length of follow-up ranging from two days to a week or, in two studies,22 27 until symptoms resolved. Most studies had a low risk of bias, except one in which blinding of outcome assessors was impossible because of the mode of intervention delivery (intramuscular penicillin v oral placebo)26 (appendix 3). Measurement of outcomes varied considerably across studies, involving different methods, assessors, and lengths of follow-up. Outcome measurement was based on standardised scales in only two studies24 27; the remainder22 25 29 used parental assessment (by questionnaire, symptom diary, or overall parental assessment), or clinician assessment.28 Among the four studies that reported mean duration, symptoms of sore throat lasted from two days to 6.7 days22 24 27 29 (table 3⇓). Though we could not pool data from the three studies that reported the proportion of children with symptoms because of insufficient data at several time points, 33-37% of children still had sore throat symptoms at day three25 26 28 (fig 4⇓, table 3⇓). Based on visual inspection of the data, time to complete resolution did not seem to be related to group A β haemolytic streptococcal infection or duration of symptoms before enrolment. The single study that reported on duration of fever reported that 17% of children had fever for less than a day, 11% had fever one to two days, 44% had fever for two to three days, and 28% had fever for more than three days.26 Cough (acute cough, bronchiolitis, and croup) We included six trials of acute cough,30 croup,31 32 33 or bronchiolitis,34 35 providing data on 700 children. Five trials took place in North America30 31 32 34 35 and one in Australia.33 We included six observational studies of 1063 children with cough3 22 36 37 or bronchiolitis,38 39 from the UK,3 36 Poland,22 Australia,37 USA,38 and Canada39 (appendix 2). Cough was present five to 14 days before study entry among children with acute cough, four days among children with bronchiolitis, and one day among children with croup. In most studies follow-up lasted two to three weeks or until symptoms resolved (range one to four weeks). Parents assessed outcomes in all trials and studies that used symptom scales or scores,30 31 32 34 39 symptom diaries,3 36 37 38 standardised questionnaire,22 or interview.39 Studies had either a low or moderate risk of bias; those with moderate risk of bias generally lacked details of randomisation or sequence allocation30 33 (appendix 3). Among the five studies that reported mean duration of illness, the time to resolution of cough ranged from one to 25 days3 22 30 36 37 (table 4⇓). Based on the pooled results from five studies that reported proportions of children with symptoms, cough had resolved in 50% of children at 10 days, and 90% by 25 days (table 5⇓, fig 5⇓). Symptom duration was relatively shorter in two studies,22 30 of which one30 was small (n=23) and enrolled children with symptoms lasting up to 14 days before recruitment, and the other22 recruited only infants. The mean duration of croup was two and three days in the two studies that reported this information32 33 (table 4⇑), and, based on the pooled data from two studies,31 32 symptoms of croup resolved in 50% of children at day one and 80% by two days (table 5, fig 6⇓). Finally, the mean time to resolution of cough for bronchiolitis ranged from eight34 to 1538 days (table 4, fig 7⇓). Based on pooled data from four studies that reported proportions of children with symptoms,34 35 38 39 50% of children improved by day 13 (table 5⇑). Though we were unable to determine the time for 90% to improve, based on the data presented in figure 7 this was estimated at 21 days. Common cold; undefined or non-specific respiratory tract infections We included four trials involving 457 children40 41 42 43 and 15 observational studies involving 4870 children.7 22 37 44 45 46 47 48 49 50 51 52 53 54 55 Included trials and studies were from the US,40 42 43 49 50 51 52 55 the UK,7 44 53 Finland,41 48 Canada,45 47 Poland,22 Australia,37 Denmark,54 and Germany46 (appendix 2). Follow-up ranged from two to 21 days in randomised controlled trials; in observational studies, follow-up generally lasted two to three weeks. The mean duration of symptoms before trial entry ranged from up to one day43 to 8.7 (SD 5.1) days.41 Outcome assessment was performed by parents (using interviews or symptom diaries) in three trials40 41 43 and by both parents and children (symptom diary) in one.42 Overall, included studies had low to moderate risk of bias (appendix 3). Treatment and placebo lozenges were dissimilar in appearance in one randomised controlled trial, which raised the risk of bias from inadequate blinding.42 Several studies failed to report randomisation,40 cohort selection,49 52 or inclusion criteria.7 44 46 Among the four studies that reported mean duration, common cold symptoms lasted from seven to 15 days22 42 46 51 (fig 8⇓, table 6⇓). Based on the pooled data from five studies,22 40 42 49 51 by day 10 about 50% of children had improved. We did not have sufficient data to determine the time at which 90% improved, but based on visual inspection from figure 8 we estimated this as about 15 days. The largest study (n=1314) reported common cold symptoms lasting 1.8 weeks (SD 1.3) for children aged 7 or younger.46 The mean duration of non-specific respiratory symptoms ranged from four to 16 days7 43 45 47 48 50 53 54 55 (table 6⇑). Data on the proportion of children with symptoms was obtained from 11 studies7 37 41 43 44 45 47 48 50 53 54 and was highly variable across individual studies: 50% of children had improved by day seven to eight and 80% by day 14; we could not identify the time for 90% resolution, although a projected estimate would be around day 16 (table 7⇓, fig 9⇓). The studies that reported symptoms at day 14, however, showed an extremely wide range in the proportion still symptomatic, from 6%44 to 60%.48 The shorter length of symptom duration reported by both Butler and colleagues44 and Jacobs and colleagues47 could be explained by slightly longer average duration of symptoms before study entry. Taylor and colleagues reported duration of fever of 0.64 mean days (SD 1.16).43 Our review provides parents, clinicians, and policy makers with up-to-date evidence based estimates of the expected length of symptoms for children presenting with the most common respiratory tract infections in primary care and emergency department settings in high income countries: earache, sore throat, cough, and non-specific cold symptoms. These infections were selected because they are common and drive most primary care consultations and antibiotic prescribing for children in high income countries. We used data from systematic searches for both randomised controlled trials (placebo arms) and observational studies conducted in high income countries. For many symptoms of respiratory tract infection the data were highly heterogeneous in terms of age, definition of infection, outcome assessment, and duration of illness before study entry; however, our data provide the most robust estimates available. For some symptoms of respiratory tract infections our estimates of duration are much longer than those currently used (table 8⇓). For example, for earache (otitis media) we found that 90% of children are better by seven to eight days, which is considerably longer than the average duration of four days cited by the UK National Institute for Health and Care Excellence and two days cited by the US Centers for Disease Control and Prevention. In contrast, for some symptoms current estimates seem to overestimate the expected duration. We found that acute cough symptoms are better in 50% of children by 10 days, in contrast with the longer average duration of 21 days cited by National Institute for Health and Care Excellence. Finally, for other symptoms, the currently cited estimates of symptom duration match closely (or are slightly longer) with our finding—for example, for sore throat/tonsillitis we found that 90% are better by two to seven days, whereas National Institute for Health and Care Excellence and the Centers for Disease Control and Prevention cite average durations of seven days and seven to 14 days, respectively. Similarly, the common cold seems to last from 10 (50% better) to 15 days (90% better), similar to advice from both National Institute for Health and Care Excellence (10-11 days) and the Centers for Disease Control and Prevention (<14 days). Strengths and limitations We believe this is the first systematic review of the duration of illness for common respiratory tract infections in children. Our strategy of including data from placebo arms of randomised controlled trials and from observational studies not only increases the available data but also provides more generalisable populations of children. This approach inevitably included children who might have been given over-the-counter treatments for symptoms and, in a few cases, antibiotics. We consider that it would be unrealistic to restrict our review to children with respiratory tract infections who were not given any symptomatic treatment. While symptomatic treatments might reduce symptom severity, however, they are unlikely to influence the overall duration of illness. It is possible that excluding studies of experimentally induced infection might have reduced eligible studies, though we do not consider that these types of usually single pathogen infections reflect the reality of clinical practice, where patients typically present with clinical syndromes rather than pathogen specific infections. In synthesising our results, we opted to present the number of days when 50% and 90% of children were reported to be asymptomatic. Although the data were not available for all the respiratory tract infections, we believe that this additional information avoids the ambiguity of terms such as “average duration” for parents and clinicians. Our estimates of duration also apply to children who are given (usually symptomatic) drugs rather than those given nothing at all, thereby providing more valuable information for how most children are managed in the community. As many trials and studies will have excluded children with severe symptoms, our findings might not be generalisable to such children or those in low or middle income countries where risks of complications are higher. While we included data from both randomised controlled trials and prospective observational studies, we excluded retrospective studies, which could be subject to recall or recording bias. As with any systematic review, our findings and complexity of synthesis are limited by the number and quality of included studies and the data these provided. The included studies were inevitably clinically heterogeneous in many aspects. The definition of the respiratory tract infection syndromes differed (or were poorly defined) in some studies, which could affect less discrete conditions (such as the common cold) more than others (such as croup); though this is a problem with much research in this area. Secondly, the duration of illness before study entry varied and was not consistently recorded, which prevented us from calculating what would have been potentially more useful for parents—namely, the duration of illness from initial onset rather than presentation. However, this mirrors the situation in primary care where patients present in exactly this way. Thirdly, the lack of sufficient data on age in included studies meant that we were not able to conduct age specific analyses. For some infections, however, the age ranges of children in included studies were relatively narrow (such as for bronchiolitis and croup) as would be predicted clinically, so subgroup analysis might not have contributed much to their interpretation. For other infections, such as sore throat or cough, the age ranges were much broader and subgroup analysis based on age would have been useful clinically. Fourthly, the methods used in individual studies to measure and report symptoms were highly variable, and the absence of consistent (daily) reporting for similar durations of follow-up for each respiratory tract infection meant that we were not able to pool data for all infections studied. When possible, we attempted to pool results by calculating mean proportions and 95% confidence intervals, but this does not take account of the lack of homogeneity between studies. We attempted to mitigate this by including the individual study data in all our figures to give some idea of the variability in symptom projection. Thus, pooled means need to be interpreted cautiously. Implications for clinicians, policy, and research Our review provides evidence that can be put to daily use by clinicians and parents caring for children with respiratory tract infections, as well as informing health policy and evidence based treatment guidelines. We provide data as far as possible for number of days for 50% and 90% of children’s symptoms to have improved; we anticipate that clinicians and parents could interpret these values into absolute terms as the “time for half of children” to get better, and “time for 9 out of 10 children” to get better (table 8⇑). There are two key clinical decisions these data could inform. First is the parents’ decision to consult primary care, with its attendant implications for appropriate use of healthcare resources. Here, the data could inform algorithms used by healthcare providers (in writing, by telephone, or in person) to give parents information about expected length of time that symptoms might last, helping to reassure parents and trigger consultations more appropriately when the illness seems to deviate from course. Second is the clinician’s decision to prescribe antibiotics. Once again, these data could help reassure clinicians regarding the “normality” of some respiratory symptoms lasting for longer than previously appreciated and not necessarily requiring antimicrobial intervention. We found limited data for the duration of illness for several respiratory tract infections (such as croup), which suggests that observational studies would be helpful to increase certainty of our estimates of duration of symptoms. What parents and clinicians still need are better ways of predicting which children will have an adverse or prolonged illness and need additional treatment (such as antibiotics) or more intensive monitoring (such as repeated visits). Results of ongoing research efforts such as the TARGET study (www.targetstudy.org.uk/) will help to provide these prediction tools. Future research should also focus the evaluation of new and existing interventions in children with the most severe illness trajectories. Parents, clinicians, and policymakers should use these evidence based estimates of symptom duration when making decision regarding healthcare seeking and prescribing, and also when developing clinical guidelines for respiratory tract infections in children. Widespread dissemination of these data will improve parental and clinician awareness of how long symptoms last in children with respiratory tract infections. What is already known on this topic Respiratory tract infections in children are responsible for more primary care consultations that any other group of illnesses Parents need to know how long symptoms will last to guide help seeking behaviour and use of antibiotics The scientific basis for current estimates of duration of illness of common respiratory tract infections is not clear and differs between international bodies such as the UK National Institute for Health and Care Excellence and the US Centers for Disease Control and Prevention What this study adds This systematic review provides new evidence based estimates of the expected duration of the most common respiratory symptoms of childhood respiratory tract infections, including earache, sore throat, cough, and common cold There are clinically important differences between the duration estimates we found and those previously published. In most (90%) children earache was resolved by seven to eight days, sore throat by two to seven days, croup by two days, bronchiolitis by 21 days, acute cough by 25 days, common cold by 15 days, and non-specific respiratory tract infections symptoms by 16 days Accurate estimates of duration will help to direct more appropriate help seeking behaviours by parents and use of antibiotics. Results will help clinicians and parents distinguish normal from abnormal respiratory tract infections Cite this as: BMJ 2013;347:f7027 TARGET team: Alastair D Hay, Andrew Lovering, Brendan Delaney, Christie Cabral, Hannah Christensen, Hannah Thornton, Jenny Ingram, Jeremy Horwood, John Leeming, Margaret Fletcher, Matthew Thompson, Niamh Redmond, Patricia J Lucas, Paul Little, Peter S Blair, Peter Brindle, Peter Muir, Sandra Hollinghurst, Sue Mulvenna, Talley A Vodicka, and Tim Peters. c Crown Copyright 2013 Contributors: MT and ADH were responsible for the concept of this research study. MT, ADH, CH, DIB, and PSB were responsible for the methods used for the systematic review. MT, TAV, DIB, and CH were responsible for the searches and identification of included studies, for assessing quality, and extracting data from included studies. TAV, MT, and PSB were responsible for data analyses and presentation of results. All authors were involved in reviewing, commenting, and editing drafts of the manuscript and all approved of the final manuscript. MT is guarantor. Funding: This study was funded by the National Institute for Health Research (NIHR) under its programme grants for applied research funding scheme (RP-PG-0608-10018) and from a career development fellowship (for MT) supported by the National Institute for Health Research. The views expressed in this publication are those of the author(s) and not necessarily those of the NHS, the NIHR or the Department of Health. The funding agency had no involvement in the study design, data collection, analysis, writing of the manuscript, or decision to submit it for publication. Competing interests: All authors have completed the ICMJE uniform disclosure form at www.icmje.org/coi_disclosure.pdf and declare: no support from any organisation for the submitted work; no financial relationships with any organisations that might have an interest in the submitted work in the previous three years; no other relationships or activities that could appear to have influenced the submitted work. Ethical approval: Not required. Data sharing: No additional data available. Transparency: MT affirms that the manuscript is an honest, accurate, and transparent account of the study being reported; that no important aspects of the study have been omitted; and that any discrepancies from the study as planned (and, if relevant, registered) have been explained. This is an Open Access article distributed in accordance with the Creative Commons Attribution Non Commercial (CC BY-NC 3.0) license, which permits others to distribute, remix, adapt, build upon this work non-commercially, and license their derivative works on different terms, provided the original work is properly cited and the use is non-commercial. See: http://creativecommons.org/licenses/by-nc/3.0/.