Make your own eBooks

Use our Remix App to mix & match content. In minutes make your own course packs, training bundles, custom travel guides, you name it. Even add your own title & cover.


Slices & Articles Get by the slice or add to your own ebook

Medium 9781855753235


Karnac Books ePub

Jennifer Silverstone


This paper is about siblings, how siblings find each other, use each other, and sustain each other.1 I am going to suggest that siblings can hold the family narrative for each other, and become the containers for each other of a history of their childhood. This is particularly true in the cases where there has been a lack of the capacity for maternal ambivalence, by which I mean acknowledgment that mothering contains love and hate as a healthy state of affairs, and where there is a lack of the ability of the mother to keep her child in mind. Siblings can also play an important role where there is an idealization or denigration of a child, or a negative view of the child, or where for other reasons there is an absence of mind in the mother.2

In other cases, where the family carries a trauma, siblings can become central to the internal world. I shall take a brief look at the passing on of trauma through families and into the next generation of siblings. This will include taking note of the whole family, its structure, and a consideration of the role of maternal function, for I believe that part of the maternal function is in creating and re-creating the narrative of a child’s life. We shall see that in the face of early failures of containment of various kinds, and where siblings have had to become caretakers, the sibling transference can become central in the therapeutic work. When these states of mind are revealed the focus of work usually shifts away from the Oedipal constellation. I shall also make some reference to the only child.

See All Chapters
Medium 9781931332545

APPENDIX D: Pandemic Outbreak Planning and Response

Kurt J. Engemann, PhD, CBCP, and Douglas M. Henderson, FSA, CBCP Rothstein Publishing PDF


Pandemic Outbreak Planning and Response


A pandemic outbreak is a very different crisis that does not involve damage to physical property. Instead, the impact of a pandemic outbreak is focused on fatalities and high absentee rates. In an extreme situation, a pandemic outbreak could also involve the loss of critical services and create major long-term socioeconomic changes. Crisis-specific planning is needed to respond to a pandemic outbreak.

Typical planning for an organization focuses on site-specific or area-specific natural and man-made hazards

– earthquakes, fires, hurricanes, tornadoes, etc. Much of this planning is still applicable for pandemic outbreak planning. Additional planning needs to be made in the following areas:

◗ Social distancing policies.

◗ Personal hygiene practices.

◗ Personal protective equipment.

◗ Special time-off and compensation policies.

Social distancing policies, personal hygiene practices and personal protective equipment are designed to reduce the possibility of contracting the virus. Special time-off policies will be necessary for employees who either cannot work or who are not allowed to work for an extended period of time. Special compensation policies will also be necessary for essential personnel who must work during an outbreak.

See All Chapters
Medium 9780253002365

Chapter Eight

Gregory Schwipps Indiana University Press ePub

Sunday morning came down hard on him, sleeping in the hot, airless bedroom of his trailer. The window stood open, the screen behind it torn and pulled away from the frame, but no breeze came through. The dew had long since burned off and a green fly that had spent the night outside on the windowsill felt the sun warm its wings and walked through an open corner of the screen and buzzed over Ollie’s sleeping mouth on its way to the smells of the kitchen. It was gravid with eggs and seeking a rotting mass suitable for the raising of maggots. Somewhere in his unconsciousness he sensed the reverberations of the fly’s wings and woke up. He was sweaty and waking up hot pissed him off, but then he thought of her and he felt himself smile. Summer.

The room smelled of sweat and beer and the sheets clung to him in a dank mess. On his wall, the antique Pabst Blue Ribbon sign with the built-in thermometer read over eighty degrees. He closed his eyes again.

He had found Coondog, and they’d walked the emptying fairgrounds together until they ran into Troy Beasley, someone Coondog used to work with. Troy gave them a ride back to Coondog’s place in an old ‘69 Firebird that had been painted red with black flames on the hood and front quarters. Once there, all three of them got drunk while throwing horseshoes under the security light in the backyard. At close to four in the morning, Troy gave Ollie a ride back to the fairgrounds, where his truck was still parked in the pits. Troy was leaving then anyway to go wake up his ex-girlfriend to try to have sex with her. A long night, but today Ollie would not go to work, and that pleased the hell out of him.

See All Chapters
Medium 9781576336991

Property of Equality: SSAT-ISEE Algebra

Ace Academics Ace Academics ePub
Medium 9780596008406

11. Adapting SNMP to Fit Your Environment

Douglas Mauro O'Reilly Media ePub

SNMP can make your life as a system administrator a lot easier by performing many of the tasks that you'd either have to do by hand or automate by writing some clever script. It's relatively easy to take care of most everyday system monitoring: SNMP can poll for disk-space utilization, notify you when mirrors are syncing, or record who is logging in or out of the system. This chapter introduces some interesting scripts for automating common system administration tasks. The SNMP scripts in this chapter represent just a few of the things SNMP allows you to do; use them as a launching pad for your own ideas.

Chapter 9 contained some scripts for collecting SNMP information using Perl, OpenView's snmptrap program, and some other tools. Here's how we used snmptrap to generate a trap giving us information about some problems with the database:

The way you send a trap in Perl is a little more involved, but it's still easy to do:

In this chapter, we won't look so much at how to write commands like these, but at how to use them in clever ways. We might want to include commands like these in startup scripts, or invoke them via hooks into other programs. We'll start by writing some code that records successful logins.

See All Chapters

See All Slices

Load more