|By PR Newswire||
|February 26, 2014 12:23 PM EST||
HARRISBURG, Pa., Feb. 26, 2014 /PRNewswire-USNewswire/ -- Methods to combat an invasive insect pest proving deadly to Pennsylvania's ash trees will be showcased in the coming months in a series of free, public workshops planned across the state, Department of Conservation and Natural Resources Secretary Ellen Ferretti announced today.
"Municipal officials, landscapers and home and woodland owners all are asking what they can do as this destructive insect spreads steadily across our woodlands," Ferretti said. "We hope to offer solid answers and useful direction by tapping the expertise of our forestry and state parks bureaus, as well as a long list of other knowledgeable speakers."
Beginning in mid-March and ending in mid-June, workshops will be held in Chester, Huntingdon, Allegheny and Tioga counties as part of DCNR's ongoing Emerald Ash Borer Management Plan for Pa. Communities. Admission to the day-long sessions is free, but pre-registration is required.
"Attendees will leave these workshops with a wealth of newfound knowledge on what they can do personally to challenge the emerald ash borer's spread," said Ferretti. "Do you have ash trees in your community? Is the emerald ash borer in your area or nearby? Do you want to save your ash trees? These are among the many questions experts and tree-care professionals will be asking and answering."
Panels will focus on the biology of the ash tree and its insect enemy; damage detection and control; and ash tree inventories and management strategies.
Attendees also will be introduced to urban tree benefits; insect management tools; utilization of dead ash trees; costs of management options; and species selection to replace dead ash trees. Field trips to local management areas and chemical treatment demonstrations are planned.
Municipal officials, urban foresters, arborists, conservationists, pesticide applicators, tree-care professionals, landscapers and home and woodlot owners are expected to attend. Scheduled between 8:30 a.m. and 4 p.m., workshops are planned:
- Tuesday, March, 18, in Room 113, Merion Science Center, West Chester University of Pennsylvania, West Chester, Chester County;
- Wednesday, April 16, park office, Greenwood Furnace State Park, Route 305, between Belleville and McAlevys Fort, Huntingdon County;
- Wednesday, May 14, North Park Lodge, North Park, Pittsburgh, Allegheny County;
- Wednesday, June 18, Allen Hall 104, Mansfield University of Pennsylvania, Mansfield, Tioga County.
Reservations must be made five days in advance of the workshops by telephoning (717) 783-2066 or emailing [email protected]. Workshops will be held regardless of weather; refreshments will be provided at the sessions.
Training is funded by the USDA Forest Service through a grant to the Pennsylvania Urban and Community Forestry Council. Other supporters include DCNR, West Chester University of Pennsylvania, the Pa. Horticulture Society, Pennsylvania State University, The Nature Conservancy, Allegheny County Department of Parks, Tree Pittsburgh and Mansfield University of Pennsylvania.
Most recently, emerald ash borer infestations have been confirmed in 47 of Pennsylvania's 67 counties. It is now found in 22 states.
Since the emerald ash borer first was detected in June 2007 in Cranberry Township, Butler County, DCNR's Bureau of Forestry has worked cooperatively with the state Department of Agriculture to track and contain its spread. Efforts have included placement of purple panel traps along roadways in Eastern Pennsylvania; release of parasitic wasps; requesting firewood not be moved beyond 25 miles of where it was cut to reduce movement of infested wood; removal of infested trees; application of systemic insecticides; and distribution of outreach and education materials to communities.
Among the possible sources of replacement trees is TreeVitalize®, a DCNR-led initiative to restore tree cover in Pennsylvania communities. Municipalities, non-profit organizations and homeowners can apply for matching grants and financial assistance for replacement plantings. For details, visit www.treevitalize.net.
Ash species compose less than four percent of Pennsylvania's forests, or about 308 million trees, and most are located in the state's northern tier counties. Millions more are found in urban communities in the streets, back yards and parks.
Native to Asia, the emerald ash borer first was detected in the United States in Michigan in 2002. Beetle larvae bore through ash trees, disrupting flow of water and nutrients through the tree, and eventually killing it. Tree owners fearing infestation should be alert for the May and early June emergence of adult insects through D-shaped exit holes in the bark.
Details on the emerald ash borer and other Pennsylvania forest pests can be found at http://www.dcnr.state.pa.us/forestry/insectsdisease/index.htm.
Media contact: Terry Brady, 717-772-9101
SOURCE Pennsylvania Department of Conservation and Natural Resources
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
Oct. 8, 2015 12:45 PM EDT Reads: 160
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
Oct. 8, 2015 12:45 PM EDT
DevOps has often been described in terms of CAMS: Culture, Automation, Measuring, Sharing. While we’ve seen a lot of focus on the “A” and even on the “M”, there are very few examples of why the “C" is equally important in the DevOps equation. In her session at @DevOps Summit, Lori MacVittie, of F5 Networks, will explore HTTP/1 and HTTP/2 along with Microservices to illustrate why a collaborative culture between Dev, Ops, and the Network is critical to ensuring success.
Oct. 8, 2015 12:45 PM EDT
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Bradley Holt, Developer Advocate at IBM Cloud Data Services, will demonstrate techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, ...
Oct. 8, 2015 12:45 PM EDT Reads: 500
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
Oct. 8, 2015 12:30 PM EDT Reads: 136
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth. In his session at DevOps Summit, Adam Serediuk, Director of Operations at xMatters, Inc., will discuss the strategic requirements of evolving from Ops to DevOps, and why modern Operations has begun leveraging the “NoOps” approa...
Oct. 8, 2015 12:30 PM EDT
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...
Oct. 8, 2015 12:15 PM EDT Reads: 211
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, will look at di...
Oct. 8, 2015 12:00 PM EDT Reads: 597
For almost two decades, businesses have discovered great opportunities to engage with customers and even expand revenue through digital systems, including web and mobile applications. Yet, even now, the conversation between the business and the technologists that deliver these systems is strained, in large part due to misaligned objectives. In his session at DevOps Summit, James Urquhart, Senior Vice President of Performance Analytics at SOASTA, Inc., will discuss how measuring user outcomes –...
Oct. 8, 2015 12:00 PM EDT Reads: 429
Recently announced Azure Data Lake addresses the big data 3V challenges; volume, velocity and variety. It is one more storage feature in addition to blobs and SQL Azure database. Azure Data Lake (should have been Azure Data Ocean IMHO) is really omnipotent. Just look at the key capabilities of Azure Data Lake:
Oct. 8, 2015 12:00 PM EDT Reads: 272
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. Migration to cloud shifts computing resources from your data center, which can yield significant advantages provided that the cloud vendor an offer enterprise-grade quality for your application.
Oct. 8, 2015 12:00 PM EDT Reads: 197
As a company adopts a DevOps approach to software development, what are key things that both the Dev and Ops side of the business must keep in mind to ensure effective continuous delivery? In his session at DevOps Summit, Mark Hydar, Head of DevOps, Ericsson TV Platforms, will share best practices and provide helpful tips for Ops teams to adopt an open line of communication with the development side of the house to ensure success between the two sides.
Oct. 8, 2015 12:00 PM EDT Reads: 569
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Oct. 8, 2015 12:00 PM EDT Reads: 1,049
NHK, Japan Broadcasting, will feature the upcoming @ThingsExpo Silicon Valley in a special 'Internet of Things' and smart technology documentary that will be filmed on the expo floor between November 3 to 5, 2015, in Santa Clara. NHK is the sole public TV network in Japan equivalent to the BBC in the UK and the largest in Asia with many award-winning science and technology programs. Japanese TV is producing a documentary about IoT and Smart technology and will be covering @ThingsExpo Silicon Val...
Oct. 8, 2015 12:00 PM EDT Reads: 249