Welcome!

News Feed Item

Statewide Pennsylvania Workshops Planned to Target Invasive Emerald Ash Borer

HARRISBURG, Pa., Feb. 26, 2014 /PRNewswire-USNewswire/ -- Methods to combat an invasive insect pest proving deadly to Pennsylvania's ash trees will be showcased in the coming months in a series of free, public workshops planned across the state, Department of Conservation and Natural Resources Secretary Ellen Ferretti announced today.

"Municipal officials, landscapers and home and woodland owners all are asking what they can do as this destructive insect spreads steadily across our woodlands," Ferretti said. "We hope to offer solid answers and useful direction by tapping the expertise of our forestry and state parks bureaus, as well as a long list of other knowledgeable speakers."

Beginning in mid-March and ending in mid-June, workshops will be held in Chester, Huntingdon, Allegheny and Tioga counties as part of DCNR's ongoing Emerald Ash Borer Management Plan for Pa. Communities. Admission to the day-long sessions is free, but pre-registration is required.

"Attendees will leave these workshops with a wealth of newfound knowledge on what they can do personally to challenge the emerald ash borer's spread," said Ferretti. "Do you have ash trees in your community? Is the emerald ash borer in your area or nearby? Do you want to save your ash trees? These are among the many questions experts and tree-care professionals will be asking and answering."

Panels will focus on the biology of the ash tree and its insect enemy; damage detection and control; and ash tree inventories and management strategies.

Attendees also will be introduced to urban tree benefits; insect management tools; utilization of dead ash trees; costs of management options; and species selection to replace dead ash trees. Field trips to local management areas and chemical treatment demonstrations are planned.

Municipal officials, urban foresters, arborists, conservationists, pesticide applicators, tree-care professionals, landscapers and home and woodlot owners are expected to attend. Scheduled between 8:30 a.m. and 4 p.m., workshops are planned:

  • Tuesday, March, 18, in Room 113, Merion Science Center, West Chester University of Pennsylvania, West Chester, Chester County;
  • Wednesday, April 16, park office, Greenwood Furnace State Park, Route 305, between Belleville and McAlevys Fort, Huntingdon County;
  • Wednesday, May 14, North Park Lodge, North Park, Pittsburgh, Allegheny County;
  • Wednesday, June 18, Allen Hall 104, Mansfield University of Pennsylvania, Mansfield, Tioga County.

Reservations must be made five days in advance of the workshops by telephoning (717) 783-2066 or emailing [email protected]. Workshops will be held regardless of weather; refreshments will be provided at the sessions.

Training is funded by the USDA Forest Service through a grant to the Pennsylvania Urban and Community Forestry Council. Other supporters include DCNR, West Chester University of Pennsylvania, the Pa. Horticulture Society, Pennsylvania State University, The Nature Conservancy, Allegheny County Department of Parks, Tree Pittsburgh and Mansfield University of Pennsylvania.

Most recently, emerald ash borer infestations have been confirmed in 47 of Pennsylvania's 67 counties. It is now found in 22 states.

Since the emerald ash borer first was detected in June 2007 in Cranberry Township, Butler County, DCNR's Bureau of Forestry has worked cooperatively with the state Department of Agriculture to track and contain its spread. Efforts have included placement of purple panel traps along roadways in Eastern Pennsylvania; release of parasitic wasps; requesting firewood not be moved beyond 25 miles of where it was cut to reduce movement of infested wood; removal of infested trees; application of systemic insecticides; and distribution of outreach and education materials to communities.

Among the possible sources of replacement trees is TreeVitalize®, a DCNR-led initiative to restore tree cover in Pennsylvania communities.  Municipalities, non-profit organizations and homeowners can apply for matching grants and financial assistance for replacement plantings. For details, visit www.treevitalize.net. 

Ash species compose less than four percent of Pennsylvania's forests, or about 308 million trees, and most are located in the state's northern tier counties. Millions more are found in urban communities in the streets, back yards and parks.

Native to Asia, the emerald ash borer first was detected in the United States in Michigan in 2002. Beetle larvae bore through ash trees, disrupting flow of water and nutrients through the tree, and eventually killing it. Tree owners fearing infestation should be alert for the May and early June emergence of adult insects through D-shaped exit holes in the bark.

Details on the emerald ash borer and other Pennsylvania forest pests can be found at http://www.dcnr.state.pa.us/forestry/insectsdisease/index.htm.

Media contact: Terry Brady, 717-772-9101

SOURCE Pennsylvania Department of Conservation and Natural Resources

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...