Ship Model Reference Library

Cast Your Anchor is an upscale hobby environment, focusing on quality kits, woods, tools, and finished products for the nautical enthusiast. In order to widen the appeal of the hobby, the owner of Cast Your Anchor believes that a reference library dedicated to building the handcrafted ship replicas sold in the store will serve to entice additional individuals to consider taking up the hobby.

Cast Your Anchor has a website and an online store so the Internet community of modellers is also of interest to the facility. To-date the online store has received inquiries and orders from England, Ireland, and Indonesia. There has also been tremendous interest within Canada; registering inquiries and orders from every province

The collection will be aimed at nautical hobbyists although there is some room for crossover to other hobbies. The subject focus will be model sailing ships, static or remote control, from kits (wood and plastics) and scratch. There will also be information on the tools required, types and uses of wood, historic ships, modern ships, sailing instruction, and books of building plans.

The works will cover materials for both novice and expert model-makers. Once modellers have mastered the techniques of kit building they enjoy variety in their building. For this reason, CyARL will have a good selection of works dedicated to specific ships. Another frequent interest of the modeller is to complete more than one selected ship of a particular era. Therefore, the collection will also include a number of works dedicated to a specific era in sailing ship history.

A growing area of interest to model builders is the ability to sail their completed models. There are racing clubs throughout the metropolitan Toronto area. Racing clubs are usually dedicated to a specific class of sailing vessel (i.e. Soling class, Victoria class). In order to sail their models, builders must rig them and use radio controls (sometimes referred to as remote controls) to sail them. There will be a section of the collection dedicated to this specialized concentration for model-makers.

Another area of concentration for the collection will be the tools that experienced modellers need to properly complete their ships. These tools range from standard handheld woodworking tools to specialized miniature electric lathes. CyARL will endeavour to provide a selection of works for each of these areas.

Modelling Techniques

Selection Criteria: Each of the books in this section was chosen as representative of a particular audience. The sections are divided into Novice and Experienced builders. There is no Mid-level section because the difference between a novice and experienced model-maker is the number and type of models they have chosen to build. Novice works often contain clear descriptions and illustrations of the basics of modelling, while works aimed at the experienced modeller include more finely detailed descriptions of the more complex intricacies of producing exact replicas. There is an almost complete collection of the works of Charles G. Davis, a scale modeller recognized world-wide for his attention to detail and expertise in the hobby.

The library purchases, maintains and makes available a collection of print, audiovisual, and electronic format reference materials for the staff and customers of Cast Your Anchor Inc. Cast Your Anchor is a nautical hobby store dedicated to the education of modellers and their appreciation for the hobby.


o 1.1 The collection will contain materials related to modelling methods – historical and current, watercraft and their histories, small engines – building and repair, equipment and tools required by hobbyists.

o 1.2 Cast Your Anchor staff and library patrons are encouraged to make recommendations regarding desired materials. CYA Reference Library (CyARL) retains the sole responsibility for the final selection, purchase and weeding of all materials housed in the facility.

o 1.3 CyARL collects materials that contribute to the educational requirements of the staff and customers of Cast Your Anchor. In addition, CyARL collects materials related to the job functions of the staff, management and owners of Cast Your Anchor Inc.

o 1.4 CyARL annually reviews the General Collection Policy to ensure it meets the needs of the users, staff, management and owners of Cast Your Anchor Inc. 3.1

o 1.5 CyARL acquires materials selectively depending on the anticipated frequency of use and compatibility of equipment where audiovisual material and computer software are involved


o 2.1 CyARL endeavours to maintain a collection containing recent reference materials where applicable. Historical materials will be collected, maintained or weeded when appropriate and in accordance with section 1.2 of the General Collection Policy.

o 2.2 CyARL receives serial publications, catalogues and other new editions of significant reference materials when available. They will be reviewed for continuation at this point in time. Back issues will be retained as physical limitations permit.


o 3.1 CyARL usually selects English language materials. Foreign language materials are not expected to be collected. Specific foreign language works will be considered on an individual basis.


o 4.1 All formats will be collected when appropriate and where equipment to play the material is available. This will include and not limited to: books, monographs, newsletters, videos, DVDs, audio tapes, microfilm/fiche, 8mm and 16mm film,

Weeding and Collection Management::

o 5.1 A regular system program of collection assessment is undertaken. CyARL attempts to provide material of ongoing interest to the staff and users of Cast Your Anchor Inc. In support of this goal, the collection may be weeded at the discretion of the librarian.

o 5.2 Factors considered in the weeding of the collection include: the receipt of new additions of annual publications, physical condition of the material, format no longer compatible with available equipment, the number of editions and copies held and frequency of use.

Selection Methods::

o 6.1 CyARL uses a variety of methods and sources to select materials. This includes, but is not limited to:

Reviews – they will be culled from the library profession, modelling and hobbyist literature, trade and publishers reviews.


o 7.1 Donations are encouraged and will be accepted at the discretion of the librarian. We reserve the right to refuse any donation that does not meet our General Collection Development Policy.

Health Information Technology – A Bright Future

The health care industry is getting more technologically advanced every year. And with those advances, comes a need for people who not only understand how to use the technology, but can help make innovations that will continue to advance the system.

One of the degrees that can put you at the heart of all the action is a health information technology degree. This type of degree program will teach you how to use technology to collect, analyze, monitor, maintain and report health data. If you’re interested in the medical field, a health information technology program offers a truly fascinating point from which to explore your passions and start your career.

In the classroom and in the field, when you’re enrolled in a health information technology program, you’ll learn to process requests for the release of personal health information, code clinical information, process and use health data for clinical quality management, bill patients for services (and provide reimbursement) and learn compliance while protecting patient privacy. And frankly, the jobs you’ll receive after you receive your health information technology degree will put you in a position of great responsibility and control.

Post-Health Information Technology Program Jobs

With the degree in hand, some of the positions you can expect to work in include:

o Health Information Technician. Job responsibilities often include reviewing medical charts to check for completion and accuracy, generating reports and assigning diagnosis codes to medical charts for insurance claims and data collection purposes, plus gathering, analyzing and managing information about patients so healthcare providers can properly care for them.

o Medical Coder. With a health information technology degree you can enter the field as a medical coder, which, because of its medical and business nature, is often a springboard for advancement opportunities within the healthcare sector. Some of the responsibilities of a medical coder include reviewing medical documents provided by physicians, then translating the information into numeric codes and sequencing diagnostic and procedural codes by using a standard healthcare coding system. This work is crucial to the financial reimbursement of healthcare professionals by the insurance companies that provide policies for the patients.

o Health Information Administrator. After completing a health information technology program you may work as a healthcare administrator. In this position you will oversee (or as an entry-level job assist the person who oversees) the business of providing services to patients and manage the health information systems that house the medical facility’s patient-related documents, insurance information, and business documentation.

o Medical Secretary. Medical secretaries help maintain order in the office and provide the support necessary for proper patient care. Some of the job responsibilities may include transcribing dictation, generating correspondence, assisting physicians with reports, speeches, articles, and conference proceedings, as well as providing technological support and maintaining medical records.

The Job Outlook

According to a 2006-2007 U.S. Bureau of Labor Statistics (BLS) report, employment for medical records and health information technicians is expected to grow much faster than average for all occupations from now through 2014.

A few highlights of the BLS report include:

o Job prospects should be very good; technicians with a strong background in medical coding will be in particularly high demand.

o Those entering the field will usually have an associate degree; courses include anatomy, physiology, medical terminology, statistics, and computer science.

o Most employers prefer to hire Registered Health Information Technicians (RHIT), who must pass a written examination offered by the American Health Information Management Association (AHIMA). To take the examination, a person must graduate from a 2-year health information technology program accredited by the Commission on Accreditation for Health Informatics and Information Management Education (CAHIIM). Technicians who receive a Health Information Technology degree from a non-CAHIIM-accredited program or who are trained on the job are not eligible to take the examination.

o Median annual earnings of medical records and health information technicians were $25,590 in 2004. The middle 50 percent earned between $20,650 and $32,990. The lowest 10 percent earned less than $17,720, and the highest 10 percent earned more than $41,760.
With a job outlook so bright – and an education that’s both challenging and exciting – choosing a health information technology degree program is an intelligent step to a rewarding career.

How Will the Internet Influence Our Future? Theories on Society, Security, and Future Technology

We aren’t so far removed from a world full of smart homes with voice-controlled home appliances as we might think. We live in a world where, already, the adoption of new technology happens in a whirlwind-where gratification derived from one technological is short-lived. We are constantly demanding new levels of convenience. Today’s generation is becoming increasingly obsessed with the notion of “do-it-for-me.” People line up at stores hours before the doors open to buy the latest smartphones on release dates, just to be the considered a part of the select few early adopters-to be the first to own-trying to proclaim themselves as trendsetters. Technology sets the stage for what is considered cool and hip. Our infatuation for what’s next is simply unquenchable-it fuels the ever-accelerating drive of industrial innovation.

But one thing people always seem to overlook is security. People have been conditioned to believe that new technology means less vulnerabilities, errors, and defects, when in reality, it is the other way around. The media promises that the new and improved solves the issues of the previous version. They tout faster speeds, sleeker looks, and performance enhancements, and while on the surface all this may be true, a lot of these new features have gone untested. For technology to be considered new, something must be added to whatever the previous standard was. Added complexity usually means more imperfections, unexplored weaknesses, and unknown loopholes, and this is what cybercriminals live to find out and exploit. This “gadget rush” of a world we live in is full of people who rush for the glittery commodities, letting their obsession override the necessity of assessing the risks.

The internet has added vast amounts of potential to futuristic technology. Virtually anything can be connected to a network. Imagine being able to log into a home network from your tablet device, and connecting to your refrigerator, for instance, to peek inside and make a list for grocery shopping on the way home from work. Imagine being able to preheat your oven from your phone minutes before you arrive home to expedite dinner preparations. Someday, our own phones could soon be internet providers, remotely controlling everything connected to it within our homes, and people would love that. They would jump at something so innovative, without ever raising an eyebrow about the safety of these new possibilities. Because the products are so new and perform such cool new things that never cease to amaze, we assume they are safe. Again, we believe someone else, and not us, is responsible for our security. Cybercrime is so farfetched to us. If we’re talking about a new car or house, then the concept of crime and safety registers, because these are things we’ve seen people penetrate and steal. But when we’re talking about a computer or a smartphone, crime doesn’t immediately come to mind. The crime of this sphere is of a nature we cannot see or identify with. We don’t immediately think of these things as capable of being hacked and controlled by people other than ourselves. We underestimate the dangers of the internet, because we believe hackers are such minute group of individuals. We think that they belong in some Sci-Fi TV series, and not the real world.

Sometime in the near future, more of the things we rely upon will be connected to the internet, like voice-operated home appliances. And just like our computers, these things will make for more territories that cyber criminals can prowl. The more we coordinate so much of our lives with the digital realm, the more insecurity we invite into them. Imagine having your entire home and its operability completely shut down at the hands of an anonymous hacker-everything from your air conditioner, the faucet, the dishwasher, and even your garage door under the control of someone you don’t know, and to get it back, they command a ransom. Think about how this type of technology redefines what we think of as “home.” If cyber criminals can already remotely control our computers and steal our information, the hackers of tomorrow will be able to penetrate deeper into our homes and infringe upon the boundaries of our privacy even further, creating more financial losses for us. As a generation so obsessed with the acceleration of technology, perhaps we should stop and ask the question, “Will we be able to live without it if something goes horribly wrong?” Will we be able to fall back or revert to a less sophisticated, but safer version of equipment if need be?

New technology is great. Everyone loves to experience a new level of convenience. Tech fans are enthralled by new features and specs that constantly redefine the limits of what our devices are capable of. Future technology will continue to be accepted and embedded into our everyday lives, creating new standards of living with each pioneering innovation. But it’s always important for us to remember that when it comes to leveraging technology, there are good guys and bad guys. As one side produces new, smarter inventions for the greater good, the intents of the other half become cleverer as they misappropriate these new devices to uncover more weaknesses to exploit. Be careful when utilizing technology, and be wary of where you place your information. Always register products and download security updates regularly. Never hesitate to pay mind to the security of whatever technical equipment you choose to adopt in the future, because somewhere, someone is certainly going to be looking to steal.