text
string | id
string | dump
string | url
string | date
string | file_path
string | license_abbr
string | license_version
string | license_location
string | license_in_head
bool | license_in_footer
bool | license_parse_error
bool | license_disagreement
bool | language_script
string | language
string | language_score
float64 | potential_licenses
dict |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dan receives surprising news as he and his fiancé arrive at her father's house on their wedding day. All this while Google is trying to acquire his business, his (future) father-in-law shoots at the ceiling, and his friends from college try to get him drunk. Add in a carpenter in the wedding gazebo, and you have a giant hilarious mess. Written by Robert Askins and developed in 2017, this play is a comedy of errors and confusion.
|
<urn:uuid:aefcb9c5-5e57-42c7-ae74-91526c42086d>
|
CC-MAIN-2024-51
|
https://eventseeker.com/artist/62023-the-carpenter
|
2024-12-02T08:14:14Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00245.warc.gz
|
by
|
2.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.999716
|
{
"abbr": [
"by",
"by"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"2.0",
"2.0"
]
}
|
We've sent a verification link by email
Didn't receive the email? Check your Spam folder, it may have been caught by a filter. If you still don't see it, you can resend the verification email.
January 27th, 2013
The field recording of the New Year's Eve fireworks in a suburban area in Sibiu, Romania
Type
Wave (.wav)
Duration
1:57.861
File size
19.8 MB
Sample rate
44100.0 Hz
Bit depth
16 bit
Channels
Stereo
|
<urn:uuid:8a55c629-92fe-4ff5-a305-a2599f626fdf>
|
CC-MAIN-2024-51
|
https://freesound.org/people/soundsofeurope/sounds/176087/
|
2024-12-02T08:06:26Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00245.warc.gz
|
by
|
3.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.995695
|
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
]
}
|
Tickets from email@example.com, 01273 831877.
Robbie Norman and Rachael Thomas will be returning to Newtimber Church at 3:30pm on Thursday 28th December for another concert. They will be playing violin and viola duets by Handel, Mozart and Bach. Please contact Steph or Lucy for tickets in advance. Tickets cost £10 each for adults and will include a glass of mulled wine and a mince pie.
Kate from Thatchly has reluctantly decided to sell her piano, which has been in her family for sixty years. Included is the stool with underseat storage for music sheets. Buyer to collect, preferably with a piano dolly/wheels. If you are interested, please call Clive between 9:00am–9:00pm on 795 or 07973 39 39 74.
To be held at St. Andrew’s on Friday 29th September at 7.30pm. The singing will be led by The Pyecombe Village Choir and tickets, priced at £10, include supper of bangers, beans and baked potatoes and a welcome drink. Numbers will be limited. To buy tickets, or for more details, please email firstname.lastname@example.org, or phone 07812-465-559.
|
<urn:uuid:cbe4ba47-9fff-4f69-bbdb-7de20dcab8e3>
|
CC-MAIN-2024-51
|
https://fulking.net/category/music/page/3/
|
2024-12-02T08:42:53Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00245.warc.gz
|
by-nd
|
3.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.999228
|
{
"abbr": [
"by-nd"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
]
}
|
Hartford Formal Clothing
Hartford Journal And Guide
Hartford Information Center
❁ ❁ ❁ ❁ ❁ ❁ ❁ ❁ ❁
Hartford Formal Clothing
Have Fun | Explore More | Discover More
Hartford / Formal Clothing
Hartford, Connecticut
Powered With AI
Hartford
Information Center
Learn More About AI
Hartford Formal Clothing
Discoverer's Edge
Hartford Connecticut Journal
Site Search
Hartford Information Center
Google
Beautiful Day
Hartford Information Center
AI Art Collection
From Our Editors: The following art is created using artificial intelligence.
Beautiful Day
AI Art
❂
Hartford
Formal Clothing
Hartford Formal Clothing
Reviews
Google Reviews
Yelp Reviews
Keep Exploring Hartford
❁ ❁ ❁ ❁ ❁
Hartford Love
Hartford Information Center
AI Art Collection
From Our Editors: The following art is created using artificial intelligence.
Hartford Love
AI Art
Hartford
❁ ❁ ❁ ❁ ❁
○ ○ ○ ○ ○
From the editors at Hartford Information Center
We love using Bing and Google Image Search to
discover more of Hartford or any city.
Add your own keywords, use the image filters and
predictive search choices and discover more.
Those Seasons
From Our Editors: The following art is created using artificial intelligence.
Those Seasons
AI Art
Wonderful Summer Day
From Our Editors: The following art is created using artificial intelligence.
Wonderful Summer Day
AI Art
Hartford, Connecticut
Fashion Art Info Ideas
❁ ❁ ❁
Find Great Hartford Businesses
Selected Top Choice
Yelp is a public company. The company develops, hosts and markets the Yelp.com website and the Yelp mobile app, which publish crowd-sourced reviews about businesses. View more from Wikipedia Wikipedia Text under CC-BY-SA license
Major competitors for Yelp's business review service include TripAdvisor, Foursquare and user reviews on Google Maps.
From the editors at Hartford Information Center
We love Yelp for finding great Hartford businesses.
View Public Data for Hartford, Connecticut
Selected top choice
Site Search Data USA with DuckDuckGo
Data USA "The most comprehensive visualization
of U.S. public data." --Deloitte Gov
View Hartford public data like population, medium age, medium household income, poverty rate, number of employees, medium property value, economy, wages, health, diversity, education, housing and living information. The people at Data USA do a great job of displaying this information plus you can add a comparison to another city.
From the editors at Hartford Information Center
We love Data USA for viewing Hartford public data.
Google Maps
From the editors at Hartford Information Center
We love using Google Maps for finding the best
places to shop in Hartford or any city.
Look for the Zoom and Search This Area options.
❁
Hartford
Best Places
🌟
Find something great.
Have fun. Play your music.
From our editors. We think this Hartford journal and guide is best viewed with music playing.
♪ Turn up the music.
Have fun. Explore more.
❁ ❁ ❁
Wikipedia
View
The Latest News
Bing News
Hartford Maps
Explore Hartford,
Connecticut, And United States
Using Google Maps
1. Start with View Map Of United States
2. Select the Nearby icon
3. Search nearby United States with keyword (Connecticut)
4. Select the Nearby icon
5. Search nearby Connecticut with keyword (Hartford)
6. Select the Nearby icon
7. Search nearby Hartford with your own keywords.
Google Maps
From the editors at Hartford Information Center. We love using Google Maps to explore and enjoy more of Hartford and Connecticut or any city or state.
❁ ❁ ❁
Shop Hartford
Support Hartford businesses, entrepreneurs, artists, merchants and service providers online and down the street.
Find unique items from Hartford stores and online shops.
❁
❁ ❁
❁
This Hartford Formal Clothing page and the Hartford Information Center exists to let you know about some of the great choices for experiencing more of Hartford, Connecticut.
Hartford
Information
Center
Learn More About Hartford
Start With Images
Of Hartford
Search Hartford From
The World's Top Search Engines
Google, Bing and DuckDuckGo do a
great job of highlighting Hartford.
All three of these search engines provide a
variety of search services, including web, video,
image, news and map search products for
Hartford.
That Valley
Hartford Information Center
AI Art Collection
From Our Editors: The following art is created using artificial intelligence.
That Valley
AI Art
That Storm Is Coming
Hartford Information Center
AI Art Collection
From Our Editors: The following art is created using artificial intelligence.
That Storm Is Coming
AI Art
Hartford Information Center
Editors Select
Our editors select and publish favorites for discovering more of Hartford.
Anything we get paid to publish
you will see
Thanks again for visiting
Hartford Information Center
○ ○ ○ ○ ○
Hartford
Connecticut Highlights
Our mission is to discover and share great places, display interesting things, and highlight entrepreneurs, artists, merchants and service providers.
We highlight travel, living, entertainment, art, music, fashion, government, politics, journalism, media, sports, business and other key interest areas.
You can view the Hartford Information Center on your smartphone, tablet, laptop or desktop anytime at HartfordInformationCenter.com
Hartford Connecticut
The people at TripAdvisor do a great job of displaying
hotels, attractions and restaurants in Hartford Connecticut
TripAdvisor, Inc. is an American travel and restaurant website company that shows hotel and restaurant reviews, accommodation bookings and other travel-related content. It also includes interactive travel forums.
View more at Wikipedia
Wikipedia text under CC-BY-SA license
Hartford Connecticut
Hartford local Airbnb hosts do a great job of highlighting Hartford and the surrounding area.
Hartford guidebooks on Airbnb include things like local food scene, essentials, entertainment & activities, shopping, drinks & nightlife, sightseeing and parks & nature.
One nice feature, there are many, on any Airbnb guidebook is the capability to see how many locals recommend any specific place mentioned in the Airbnb host's guidebook.
Look for the host's guidebook link in "The neighborhood" section.
Airbnb + Airbnb Guidebooks
A fun way to discover any city.
Some cities also have Airbnb city guidebooks, which are combined lists of recommendations that Airbnb hosts have added to their own guidebooks.
Site Search Airbnb
Google
Shop Hartford
Shop Hartford
Online And Down The Street
Support Hartford entrepreneurs, artists,
merchants and service providers.
Visit their Hartford store location or
shop their online store.
Hartford Information Center
Thank you for visiting this Hartford guide.
You can access this guide anytime using
your smartphone, tablet, laptop or desktop at
HartfordInformationCenter.com
Keep exploring Hartford from here.
○ ○ ○
Explore
USA Today 10Best
Check out choices for the 10Best
Readers Choice Awards.
Buy Local
Whenever Possible
Reasons To Buy Local
From Our Editors: The following writing is created using artificial intelligence and has been edited for quality assurance.
"Buy Local" is a sentiment that emphasizes the importance of patronizing local businesses and products. It's a movement that encourages people to prioritize buying from local shops, farmers' markets, artisans, and small businesses rather than solely relying on big-box stores and big online retailers.
Reasons to Buy Local:
Overall, "Buy Local" is a call to action for people to be mindful of where they spend their money and to prioritize supporting local businesses whenever possible.
It is worth noting, buying from chain businesses or global businesses with a location in the community can still bring other benefits to you and the community such as access to a wider range of products, technology, and employment opportunities.
Explore More Of Hartford
Share Hartford Formal Clothing
Explore More Of
Hartford Online And Down The Street
NeighborhoodScout is a website and online database of U.S. neighborhood analytics. View more about NeighborhoodScout on Wikipedia.
Hartford Information Center
Journal & Guide
The Hartford Information Center website is
designed, developed and published by NaturallyCity, LLC.
Thank you for visiting this Hartford journal and guide.
HartfordInformationCenter.com
View Hartford Connecticut
Latest News
Selected Choice
Bing News
From the editors at Hartford Information Center
We love Bing News for finding the latest news.
The people at Bing do a great job of finding and displaying
news and information and there are plenty of additional
display options to use.
Hartford
Home • Travel • Entertainment • Business
Discoverer's Edge
Hartford Connecticut Journal
Hartford Information Center editors select and
publish favorites for discovering more of Hartford.
Hartford Information Center
Thank You For Visiting
Anything we get paid to publish you will see
All brand icons and brand names displayed are trademarks of their respective owners.
The use of these trademarks does not indicate endorsement of the trademark holder by Hartford Information Center, nor vice versa.
Posts may include affiliate links via associate programs.
Anything we earn a commission on if you purchase you will see
○ ○ ○ ○ ○
Hartford
Home Travel Entertainment Business
❁ ❁ ❁ ❁ ❁
From the editors at Hartford Information Center
Have fun. Find something great.
Check out choices for Hartford and
Hartford Formal Clothing
View Hartford, Connecticut highlights. Hartford travel, living,
entertainment and business. Hartford, CT Journal
Enjoy More Of Hartford
❁
The Hartford Information Center
Hartford Connecticut
Journal & Guide
❁ ❁ ❁ ❁ ❁
○ About the Hartford Information Center website. This is an opinion website, journal and guide, and displays information for discovering more of Hartford, integrates and displays information from open sources, and contains links that lead to information on the World Wide Web.
○ None of the opinions, from our editors, that are displayed on the Hartford Information Center website should be construed as official or as official advice.
○ Thank you for visiting Hartford Information Center. Explore more of Hartford from here anytime.
❁ ❁ ❁
Share This Page
Hartford Formal Clothing
Hartford Information Center
Hartford
Journal & Guide
Keep Exploring Hartford
Have fun discovering more of
Hartford online and down the street
from here anytime.
Thanks again for visiting
HartfordInformationCenter.com
___ ⋆ ⋆ ⋆ ___
Enjoy
Hartford, Connecticut
a Hartford, Connecticut Journal of Hartford
online and down the street.
Womens Clothing, Mens Clothing, T-Shirts, Womens Tops & Shorts, Sandals, Jeans, Shoes, Shirts, Jackets, Hats & Caps, Mens Suits, Mens Dress Shirts, Mens Pants, Womens Pants, Dresses, Blouses, Sundresses, Womens Swimsuits, Board Shorts, Swim Trunks, Sweatshirts, Sweaters, Coats, Casual Shoes, Athletic Shoes, Dress Shoes, Boots, Clothing Stores.
○ ○ ○ ○ ○
Explore more of Hartford, both in
person and online. Have fun.
Enjoy Hartford.
Hartford, Connecticut
Journal
Love To Explore USA
❁ ❁ ❁ ❁ ❁ ❁
United States From Space
From Our Editors: The following art is created using artificial intelligence.
United States From Space
AI Art
|
<urn:uuid:b550b949-95ce-40f8-a35d-d34c65c12042>
|
CC-MAIN-2024-51
|
https://hartfordinformationcenter.com/formal-clothing
|
2024-12-02T06:51:35Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00245.warc.gz
|
by-sa
|
3.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.991823
|
{
"abbr": [
"by-sa",
"by-sa"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"3.0",
"3.0"
]
}
|
Mill Spring is an unincorporated community in Polk County, North Carolina, United States. Mill Spring is located at the junction of North Carolina Highway 9 and North Carolina Highway 108 northeast of Columbus. Mill Spring has a post office with ZIP code 28756. Mill Spring is named after Colonel Ambrose Mills. He founded a saw mill and post office in the community.
Mill Spring was the hometown of Bryant H. Womack, recipient of the Medal of Honor for actions during the Korean War.
The Rev. Joshua D. Jones House was added to the National Register of Historic Places in 1991.
The Tryon International Equestrian Center, in Mill Spring, was the location of the 2018 FEI World Equestrian Games.
|
<urn:uuid:2678a66e-7b8b-4cc6-9791-915c50865bfa>
|
CC-MAIN-2024-51
|
https://agreatertown.com/mill_spring_nc
|
2024-12-03T12:29:58Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00145.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.994497
|
{
"abbr": [
"by-sa"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Mathematics > Analysis of PDEs
Title:Solvability of MHS equations with Grad-Rubin boundary conditions in general domains
View PDF HTML (experimental)Abstract:In this paper we study the solvability of the magnetohydrostatic equations with Grad-Rubin boundary conditions in general domains. Earlier results for this problem were obtained in the recent years by D. Alonso-Orán and J. L. L. Velázquez, where particularly simple geometries were considered. In this article we develop a theory that allows to solve these boundary value problems for a larger class of domains. We will give precise applications to more physically relevant situations, like the case of the space between two circumferences or spheres and domains close to them.
Bibliographic and Citation Tools
Code, Data and Media Associated with this Article
Demos
Recommenders and Search Tools
arXivLabs: experimental projects with community collaborators
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.
Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs.
|
<urn:uuid:c047e5d3-8d86-4765-b4c0-811140ff7e6a>
|
CC-MAIN-2024-51
|
https://arxiv.org/abs/2410.05119
|
2024-12-03T12:50:47Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00145.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.994161
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
After completing this section, you should be able to
- write an equation to illustrate keto‑enol tautomerism.
- write a detailed mechanism for acid‑catalyzed keto‑enol tautomerism.
- write a detailed mechanism for base‑catalyzed keto‑enol tautomerism.
- draw the structure of the enol form of a given carbonyl compound.
Make certain that you can define, and use in context, the key terms below.
- enol
- keto
- tautomerism
- tautomers
- enolate ion
Keto‑enol tautomerism was first introduced in Section 9.4, in the discussion of the hydration of alkynes. The subject was raised again in the chapter entitled A Preview of Carbonyl Compounds, during the brief overview of the alpha‑substitution reactions of carbonyl compounds. You may wish to review these sections before proceeding.
Often, the position of a carbon atom near a carbonyl group is designated using Greek letters. The atom adjacent to the carbonyl is alpha, the next removed is beta and so on. The carbon in the carbonyl group is used as reference point and is not assigned a Greek letter. Likewise, hydrogens bare the same Greek letter as the carbon atoms to which they are attached. α-Hydrogens are bonded to α-carbons and β-hydrogens are bonded to β-carbons etc.
The presence of α-hydrogens in a molecule provides the possibility of certain chemical reactions, which will be discussed in this chapter and in Chapter 23. Because of this, the ability to identify α-hydrogens is an important skill. As shown below, pentanal has two α-hydrogens. Note that aldehyde hydrogens are not given a Greek letter, they are simply referred to as an aldehyde hydrogen.
α-hydrogens, which are attached to a carbon directly adjacent to a carbonyl group, display unusual acidity. This is almost exclusively due to the resonance stabilization of the carbanion conjugate base, called an enolate, as illustrated in the diagram below. The effect of the the stabilizing C=O is seen when comparing the pKa for the α-hydrogens of aldehydes (~16-18), ketones (~19-21), and esters (~23-25) to that of a typical alkyl C-H bond (~40-50).
Indicate any α-hydrogens contained in the following molecules:
Solution
Keto-enol Tautomerization
Because of the acidity of α-hydrogens, many carbonyl containing compounds undergo a proton-transfer equilibrium called tautomerism. Tautomers are readily interconverted constitutional isomers, usually distinguished by a different location for an atom or a group. Because tautomers involve the rearrangement of atoms, they are distinctly different than resonance forms, which only differ in the position of bonds and lone pair electrons. This discussion focuses on carbonyl groups with α-hydrogens, which undergo keto-enol tautomerism. Keto implies that the tautomer contains a carbonyl bond while enol implies the presence of a double bond and a hydroxyl group.
The keto-enol tautomerization equilibrium is dependent on stabilization factors of both the keto tautomer and the enol tautomer. For simple carbonyl compounds under normal conditions, the equilibrium usually strongly favors the keto tautomer (acetone, for example, is >99.999% keto tautomer). The keto tautomer is preferred because it is usually more stable than the enol tautomer by about 45–60 kJ/mol, which is mainly due to the C=O double bond (-749 kJ/mol) being stronger than the C=C double bond (-611 kJ/mol). Because ketones have two alky groups donating electron density into the carbonyl carbon, they tend to be more stable and therefore less apt to form the enol tautomer than aldehydes. For example, propanal is 1000 times more likely to be in its enol tautomer than acetone. With carboxylic acid derivatives, the leaving group tends to stabilize the carbonyl through electron donation which makes the formation of the enol tautomer much less likely. In general, ketones are over 100,000,000 times more likely to be in an enol tautomer form than esters.
Aldehydes and symmetrical ketones typically only have one possible enol tautomer while asymmetrical ketones can have two or more. The preferred enol tautomer formed can be often be predicted by considering effects which can stabilize alkenes, such as conjugation and alkyl group substitution. The asymmetrical ketone, 2-methylcyclohexanone has two possible enol tautomers. Of the two tautomers, 2-methyl-1-cyclohexen-1-ol, is the more stable and therefore preferred due to the presence of an additional alkyl substituent. Likewise, 1-phenyl-1-propen-2-ol is the more stable enol tautomer of 1-phenyl-2-propanone due to conjugation with the phenyl ring.
1,3-Dicarbonyls
In certain cases additional stabilizing effects allow the enol tautomer to be preferred in the tautomerization equilibrium. In particular, the 1,3 arrangement of two carbonyl groups can work synergistically to stabilize the enol tautomer, increasing the amount present at equilibrium. The diketone, 2,4-pentanedione, is in its enol form 85% of the time under normal conditions. The positioning of the carbonyl groups allows for the formation of a stabilizing intramolecular hydrogen bond between the hydroxyl group of the enol and the carbonyl oxygen. The alkene group of the enol tautomer is also conjugated with the carbonyl double bond which provides additional stabilization. Both of these stabilizing effects are not possible in the keto tautomer.
Another effect which can stabile an enol tautomer is aromaticity. When considering the molecule 2,4-cyclohexadienone, the enol tautomer is the aromatic molecule phenol. The stabilization gained by forming an aromatic ring is sufficient to make phenol the exclusive tautomer present in the equilibrium.
Please all of the possible enol tautomers for the following compounds. If more than one is possible then indicate which is the most stable and why.
a)
b)
c)
Solution
a)
b)
c)
Mechanism for Catalyzed Keto-Enol Tautomerization
The enol tautomer has valuable nucleophilic characteristics. In neutral media, tautomerization is slow but it can be speed up by catalysis with acids or bases. Both pathways involve two separate proton transfer steps. Because enols are a key reactive intermediate, these mechanistic steps will be used repeatedly in later reactions. The following mechanistic steps represent the continuous interconversion between the keto and enol tautomers.
Overall Process
Acidic Conditions
Keto Tautomer → Enol Tautomer
In the first step, the carbonyl oxygen is protonated by an acid to form an intermediate oxonium ion. A base removes an α-hydrogen during the second step forming a double bond by an E2 type reaction. This causes the pi electrons of the protonated carbonyl to move to the oxygen to form the hydroxyl group of the enol product and regenerating the acid catalyst.
1) Protonation of the carbonyl to form an oxonium ion
2) Deprotonation of an α-hydrogen to form an enol
Enol Tautomer → Keto Tautomer
First, one of the lone pairs of electrons on the enol oxygen moves to form a pi bond with the adjacent carbon to create a oxonium ion. This also causes the pi bond electrons from the enol double bond to attack the electrophilic H+ provided by acid catalyst forming a C-H bond in the α-position. This produced oxonium ion intermediate is subsequently deprotonated to form the neutral ketone and regenerate the acid catalyst.
1) Protonation at the α-carbon
2) Deprotonation
Under Basic Conditions
Keto Tautomer → Enol Tautomer
In the first step, a base removes an α-hydrogen from a carbonyl containing compound to form an alkene by an E2 like process. The causes the pi electrons of the carbonyl bond to move onto the carbonyl oxygen to form an enolate anion. The oxygen of the enolate anion is protonated in the second step to create a neutral enol and regenerate the base catalyst.
1) Deprotonation of a α-hydrogen to form an enolate ion
2) Protonation the enolate ion to form an enol
l
Enol Tautomer → Keto Tautomer
The mechanistic return to the keto tautomer begins with deprotonation of the hydroxyl hydrogen to produce an enolate ion. Then lone pair electrons from the enolate anion attack an electrophilic H+ through conjugation with the double bond. This simultaneously forms the carbonyl double bond, adds an alpha hydrogen, and regenerates the base catalyst.
1) Deprotonation of the enol hydrogen
2) Protonation of the α-carbon
Biological Enol Forming Reactions
One very important family of isomerase enzymes catalyzes the shifting of a carbonyl group in sugar molecules using a process called an carbonyl isomerization. Carbonyl isomerization often involves converting between a ketose and an aldose. (recall that the terms ketose and aldose refer to sugar molecules containing ketone and aldehyde groups, respectively).
Carbonyl Isomerization
Mechanism
Carbonyl isomerization can only occur if there is an OH group adjacent to the carbonyl. Isomerization forms an ene-diol intermediate which has both OH hydrogens available to be removed to form a carbonyl. If the hydrogen from the original OH group is removed a new carbonyl bond is formed.
Carbonyl isomerization is involved in the metabolism of carbohydrates (starches and sugars) to their eventual conversion to CO2 and H2O. First, starches are broken down into glucose in the digestive tract. In the cells, the first step of the glycolysis pathway involves an enzyme converting glucose to glucose-6-phosphate. This is followed by the enzyme-catalyzed tautomerization of glucose-6-phosphate (an aldose) to fructose-6-phosphate (a ketose) through an enediol intermediate. Notice how the carbonyl has moved from the 1-carbon (terminal) to the 2-carbon.
Exercises
1) Draw the enol forms of the following molecules
- 4-methylcyclohexanone
- Ethyl thioactetate
- Methyl acetate
- Butanal
- 1-phenyl-2-butanone
2) How many α-hydrogens do each of the molecules from the previous question have? Label them.
3) Draw all of the mono-enol forms for the following molecule. Which ones are most stable? Why?
4) Under normal conditions cyclohexanone exists in the enol tautomer in a much higher percentage than acetone. Explain.
5) The 1,3-dicarbonyl shown below is only as acidic as acetone and does not form a detectable amount of the enol tautomer. Please explain.
6) For the following compound please identify the most acidic hydrogen atom. Remember that for an enolate conjugate base to be stabilized through conjugation, the lone pair electrons need to be contained in a p orbital which is parallel to the p orbitals which form the C=O pi bond.
7) Nonconjugated ß, gamma-unsaturated ketones, such as 2-hexen-4-one, can be converted to their α, ß-unsaturated isomers by treatment with an acid catalyst. Please propose a mechanism for this isomerization.
Solutions
1)
(a)
(b)
(c)
(d)
(e)
2)
(a)
(b)
(c)
(d)
(e)
3)
Additional resonance forms stabilizes this enol.
This enol has fewer resonance forms and is therefore less stable.
4) The enol tautomer of cyclohexanone has more alky substituents than the enol tautomer of acetone. This makes the double bond of the enol double bond of cyclohexanone more stable and easier to form.
5) In many situations, the enol tautomer fo the a 1,3-dicarbonyl is preferred in the tautomerization equilibrium due to stabilizing effects created by the second carbonyl. However, in this case the alpha hydrogen used to create the enol tautomer is attached to a brigehead carbon of a bicyclic ring system. The positioning of the enol and the carbonyl prevents the formation of a stabilizing intramolecular hydrogen bond between the hydroxyl group of the enol and the carbonyl oxygen. Also, the inherent steric restrictions of a bicyclic ring system prevents the formation of a double bond using a bridgehead carbon. Instead, an enol tautomer of the molecule would be expected to form outside the 1,3-dicarbonyl. This enol lacks the stabilizing effects typical of a 1,3-dicarbonyl, so it is not preferred in the tautomerization equilibrium.
6) The presence of two methyl groups on one of the α-carbons of the carbonyl means that the two hydrogens on the other α-carbon may be deprotonated to form an enolate. When the indicated axial hydrogen is deprotonated the p-orbital formed is parallel with the carbonyl p-orbitals and can participate in overlap. If the equatorial hydrogen were to be deprotonated, the p-orbital formed would be perpendicular with the carbonyl p-orbitals and prevented from participating in overlap.
7)
|
<urn:uuid:2e197ee6-57fa-4200-ba63-9390fb9b85d2>
|
CC-MAIN-2024-51
|
https://chem.libretexts.org/Bookshelves/Organic_Chemistry/Organic_Chemistry_(Morsch_et_al.)/22:_Carbonyl_Alpha-Substitution_Reactions/22.01:_Keto-Enol_Tautomerism
|
2024-12-03T11:11:45Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00145.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.987965
|
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
The gangue sponge: implications for in-situ/heap leaching of chalcopyrite
Description
(Partial) dissolution of reactive aluminosilicate gangue minerals increase the complexity of chalcopyrite leaching by forming an amorphous, porous silica residue that interacts with the leaching solution to form local non-equilibirum microenvironments. Reactive phyllosilicates chamosite and kaolinite minerals berthierine and greenalite sample mineralogy and bulk chemistry is determined by XRD, XRF, Moessbauer Spectroscopy and OES. After leaching, the leaching solution chemistry was analysed via OES and UV-VIS. The leaching residue textures, chemistry and cpy S-oxidation state was analysed using SEM, FIB, uXRF and uXANES. Heterogeneous element distribution in the porous textures and leaching solution, as well as chalcopyrite and pyrite textures reveal incongruent dissolution of reactive gangue minerals that form a porous amorphous silica residue that can entrap and penetrate Cu sulfides. The pores of the ASR form local microreactors with variable non equilibium conditions of the lixiviant, that lead to larger variety and more complex S oxidation states on chalcopyrite grains. Gangue mineral dissolution hence influences chalcopyrite leaching reactions and Cu recovery.
|
<urn:uuid:c233e1ce-162e-434b-a8b5-b6b77cfc0ba4>
|
CC-MAIN-2024-51
|
https://data.mendeley.com/datasets/ndz7yssgkg/2
|
2024-12-03T11:45:10Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00145.warc.gz
|
by
|
4.0
|
json-ld
| true
| false
| false
| false
|
Latn
|
eng
| 0.968664
|
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
true
],
"location": [
"json-ld"
],
"version": [
"4.0"
]
}
|
Q&A about the site for people organizing, marketing or licensing open source development projects
SELECT top 384 'https://stackoverflow.com/posts/'+cast([Posts].ID as varchar(11))+'/edit' FROM PostHistory JOIN [Posts] on [Posts].ID=PostHistory.PostID WHERE (PostHistoryTypeId=2 or PostHistoryTypeId=5) -- // The newest (since this week) and PostID>=52900000 -- // These are older ones we haven't done yet -- and PostID<=47984204 and PostID>=47884204 -- and UserId=1016716 -- and PostID>=5157596 and UserId=22656 and Text like N'%firefox%' and Text like N'%font-size%' and Text like N'%23px%' GROUP BY [Posts].ID ORDER BY [Posts].ID desc
|
<urn:uuid:a4a39bc7-81ca-4958-adbc-55e69204596d>
|
CC-MAIN-2024-51
|
https://data.stackexchange.com/opensourceme/revision/394736/1194989/posts-with-potentially-unescaped-html-tags
|
2024-12-03T12:43:39Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00145.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.811488
|
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Using MPI (Message Passing Interface) on Fedora
Where supported, software in NeuroFedora is also built with MPI support. Fedora includes MPICH and OpenMPI implementations of MPI. Software can be used with either of these, or without any MPI support (if a non MPI version is available).
<software>-mpich <software>-openmpi
These packages can be installed using DNF in the same way as normal packages.
Binaries provided by the software, if any, will also be suffixed to clearly mark which implementation of MPI is in use:
<binary>_mpich <binary>_mpi
For example, NEST is provided as:
nest-mpich nest-openmpi
and the binaries in these are respectively named:
nest_mpich nest_openmpi
To use an MPI build, the appropriate environment module must be loaded. These correctly setup paths, and environment variables. For MPICH builds:
module load mpi/mpich-$arch # $arch is the architecture, for example x86_64
For OpenMPI builds:
module load mpi/openmpi-$arch # $arch is the architecture, for example x86_64
The architecture can be obtained using the uname
command in a terminal:
uname -m
It is generally easier to add these lines to the ~/.bashrc
file (for bash users) so that these commands are automatically run on each login.
Where required, use of software with MPI is documented on a separate page.
Want to help? Learn how to contribute to Fedora Docs ›
|
<urn:uuid:9b1bcda8-c790-4c9d-92f1-b7dfa45ee940>
|
CC-MAIN-2024-51
|
https://docs.fedoraproject.org/tr/neurofedora/mpi/
|
2024-12-03T11:03:22Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00145.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.99774
|
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Authors: Binita KC, James Brenton, Eliza Shrestha, Florenica Tuladhar, Laxmi Thapa
Mentors/Advisers (affiliation): Dr. Marshall Shepherd (University of Georgia), Dr. Marguerite Madden (The University of Georgia), Sebastian Wesselmen (International Centre for Integrated Mountain Development, ICIMOD), Dr. Jeff Luvall (Global Hydrology and Climate Center)
Team Location: Marshall Space Flight Center, Hunstville, Alabama; and International Centre for Integrated Mountain Development (ICIMOD), Kathmandu, Nepal
Abstract: The main objective of this study was to develop a vulnerability index at district level in Nepal by combining biophysical and social data. In general, vulnerability is expressed as a function of the exposure, sensitivity, and adaptive capacity of a region to climate change effects, especially natural disasters. For this project, the vulnerability index incorporated not only the frequency and intensity of hazard events such as floods, drought conditions, and natural disasters, but also the gradual changes in mean temperature and precipitation over a decadal span carried out from 1975 to 2012. The future vulnerability was predicted for 2020. NASA climate and land cover datasets were used to advance the climate change portion of the vulnerability assessment. Specifically, changes in temperature and precipitation were measured using monthly NASA’s
Modern-Era Retrospective Analysis for Research and Applications (MERRA) and Tropical Rainfall Measuring Mission (TRMM) 3B43 datasets, respectively. Gridded precipitation gauge data by Willmott and Matsuura was used to measure temperature and precipitation prior to 2000. The satellite data were compared with the weather station data from the Department of Hydrology and Meteorology in Nepal. The socioeconomic data were obtained from the Central Bureau of Statistics, Nepal, and ICIMOD to measure the social vulnerability of the populations. Historical records of climatic disaster events were acquired from DesInventar (Disaster Information System) to measure exposure to climatic disasters. Landcover maps obtained from Landsat 7 were used to identify high-density urban areas prone to the urban heat island effect, and areas prone to landslides. Mapping vulnerability patterns across space and time helps to identify socially and biophysically vulnerable areas and assists with climate change adaptation strategies in areas of projected vulnerability.
|
<urn:uuid:75efb57a-1319-40ca-b7b2-d474b5b81932>
|
CC-MAIN-2024-51
|
https://earthzine.org/developing-a-climate-change-vulnerability-index-for-nepal-using-nasa-eos-data/
|
2024-12-03T12:27:20Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00145.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.978785
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
A Publication of the Oceanic Engineering Society
IEEE Earthzine is a free, open access, online publication for communicating developments and community interests pertaining to studying the Earth and its many bodies of water.
All site content is licensed under the
Creative Commons Attribution 4.0 License.
Maintained byIEEE OES.
Crafted byOHNO Design.
|
<urn:uuid:16c0c3f2-0d7f-48a0-9cfa-dc7b576f0952>
|
CC-MAIN-2024-51
|
https://earthzine.org/little-limit-to-the-amount-of-wind-energy/
|
2024-12-03T11:29:14Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00145.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.978295
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Refbacks
- There are currently no refbacks.
Copyright (c) 2017 Masruri Pathurohman,Ricky Wibowo
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
|
<urn:uuid:dc0c5eef-8bb3-4278-b84c-2df32da45f33>
|
CC-MAIN-2024-51
|
https://ejournal.upi.edu/index.php/penjas/article/view/912017-04/4354
|
2024-12-03T11:40:31Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00145.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.896405
|
{
"abbr": [
"by-sa",
"by-sa",
"by-sa",
"by-sa"
],
"in_footer": [
false,
false,
false,
false
],
"in_head": [
false,
false,
false,
false
],
"location": [
"a_tag",
"a_tag",
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0",
"4.0",
"4.0"
]
}
|
The latest value from 2023 is 0 percent, unchanged from 0 percent in 2022. In comparison, the world average is 25.36 percent, based on data from 180 countries. Historically, the average for Yemen from 1998 to 2023 is 0.31 percent. The minimum value, 0 percent, was reached in 2015 while the maximum of 0.67 percent was recorded in 2001.
See the global rankings for that indicator or
use the country comparator to compare trends over time.
|
<urn:uuid:9bab2726-8892-48a9-922a-9a887f9bf8a7>
|
CC-MAIN-2024-51
|
https://www.theglobaleconomy.com/Yemen/Women_in_parliament/
|
2024-12-03T11:36:53Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00145.warc.gz
|
by
|
4.0
|
json-ld
| true
| false
| false
| false
|
Latn
|
eng
| 0.997497
|
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
true
],
"location": [
"json-ld"
],
"version": [
"4.0"
]
}
|
Cheap train tickets from Jefferson City to St Louis
Find and compare the best ground travel options in one place.
Millions of travelers trust Wanderu every year to get:
Lowest Prices
We partner with the top bus & train carriers to bring you the best deals.
Best Travel Options
We help you find & compare the best buses & trains in one place.
Quick & Easy Booking
Book trips quickly with a simple, hassle-free checkout – online & on our app.
Fast Customer Support
We don’t monkey around. We respond within minutes to help you out.
See what travelers are saying about Wanderu:
Is it better to travel by bus or train from Jefferson City to St Louis?
There are usually 1 daily bus trips from Jefferson City to St Louis.
Bus | Train | |
---|---|---|
Avg. Price | Avg. Price$56.86 | Avg. Price$42.23 |
Daily Trips | Daily Trips1 | Daily Trips2 |
Duration | Duration3h 40m | Duration2h 31m |
Trip Summary
There are usually 2 daily train trips available from Jefferson City to St Louis. Traveling by train from Jefferson City to St Louis usually takes 2 hours and 32 minutes, but the fastest Amtrak train can make the trip in 2 hours and 31 minutes.
Distance | 107 mi (172 km) |
Fastest train | 2h 31m |
Lowest price | $33.68 |
Trains per day | 2 |
Most frequent service | Amtrak |
Train lines | 2 |
Train Trip Reviews from Wanderu Customers
Average score for trains from Jefferson City to St Louis
(Based on 5 ratings and reviews)
What is the price of a train ticket from Jefferson City to St Louis?
In the last 30 days, the average cost of a train ticket from Jefferson City to St Louis was $39.78. This is a fantastic deal for train travel. You have the best chances of scoring the cheapest ticket to St Louis if you book your train tickets at least 24 days in advance. Waiting to purchase until the day of your trip could end up costing you an extra $19.16.
Average train ticket prices from Jefferson City to St Louis by travel date
For the next 30 days, the cost of a one-way train trip from Jefferson City to St Louis will range from $34 to $62. If you're planning to travel by train to St Louis in the upcoming week, the cheapest train ticket from Jefferson City you can find in the next 7 days is $35. Be sure to book your trip in advance as train ticket prices typically increase as your travel date approaches.
Monthly avg. prices
Prices as travel date approaches
By booking your train trip from Jefferson City to St Louis on Wanderu at least 24 days ahead of time, you can save about $19.16 on your ticket. Waiting until the last minute means missing out on these savings!
Which train should you take from Jefferson City to St Louis?
2 train services operate from Jefferson City to St Louis. However, each train line only offers one daily trip.
Amtrak is the largest passenger railroad service in America, offering daily intercity trains to hundreds of destinations across the contiguous United States, as well as several cities in Canada. Every Amtrak train comes equipped with comfortable seats with extra legroom, as well as several four-seat areas with tables in the middle. In addition, each car has a freshly cleaned restroom, free WiFi and power outlets at every seat. There are also snack bars where you can purchase drinks or food during your journey. On average, there are 1 Amtrak trains from Jefferson City to St Louis every day, as well as 1 trips on the weekends, with prices starting from $34.
The Missouri River Runner is an Amtrak regional passenger train whose full route runs across Missouri, from Kansas City to St. Louis. Both Coach Class and Business Class passengers will enjoy the free WiFi on board, power outlets at each seat, and the option to purchase snacks in the cafe car. The train departs from 101 Jefferson St in Jefferson City and arrives at Gateway Station - 430 S 15th St in St Louis, and tickets on this route start at $34.
Frequently asked questions about traveling by train from Jefferson City to St Louis
On a weekly basis, the greatest number of passengers tend to travel by trains from Jefferson City to St Louis on Wednesday. Tickets for Wednesday tend to also be the most expensive. For savvy travelers looking for cheaper priced tickets search for travel departing on Tuesday. Tuesday also tend to have less passengers which may make boarding faster and let you snag your perfect seat.
The earliest train departs Jefferson City at 11:00am while the last train of the day leaves at 7:00pm. To see all scheduled departure times, use the search function on this page to get the full schedule for your specific travel dates.
Trains leave the station in Jefferson City twice a day, so there are a couple of options depending on your preferred travel time. Luckily, both trains will get you to St Louis with direct service. While there might still be stops along the way, you will not need to get off or switch trains.
You can also take a train for your return trip from St Louis to Jefferson City.
City Information
St Louis
Image credit: Unsplash
Image credit: Unsplash
Image credit: Unsplash
St. Louis is one of several major cities in the state of Missouri and it is uniquely located near the confluence of the Mississippi and Missouri rivers. The city is usually recognized by its most distinctive feature, the Gateway Arch, thanks to which it is the only city in the United States that has a national park in the heart of its downtown district. The Arch is a must-see attraction and you can even take a tram to the top for some incredible views of the St. Louis skyline.
Some of the other truly unique attractions you can visit while you’re in town include the Miniature Museum of Greater St. Louis where you can check out an incredible collection of dolls, dollhouses and vignettes, and the City Museum where you can ride down a 10-story spiral slide (yup, you read that right.) For a great outdoor experience, stop by the gorgeous Missouri Botanical Garden, and then take a stroll through Citygarden where you will find various quirky statues and installations worthy of being featured in your Instagram feed.
Ale enthusiasts would be excited to know that St. Louis is one of the best craft beer cities in the U.S. as well as one of the cheapest drinking cities. That means your party budget could take you a long way. Unsurprisingly, the city is also among the best spring break destinations on a budget.
The main bus and train station in St. Louis, Gateway Station, is located right in the center of downtown, not far from the Gateway Arch, which makes coming in and out of the city a breeze.
Station Information
Where is the train station in Jefferson City?
Main departure station: 101 Jefferson St
There is one train station in Jefferson City.
All train stations in Jefferson City:
101 Jefferson St
Where is the train station in St Louis?
Image credit: Chris Yunker
Link to image attributionMain arrival station: Gateway Station - 430 S 15th St
Gateway Station opened in 2008 to consolidate St Louis’ transportation services into one central hub. The station’s award-winning design includes a pedestrian walkway with expansive colored glass windows overlooking the train tracks. Perfectly located in the heart of downtown St Louis, the station is surrounded by bars, restaurants, and hotels and is just a few blocks from Busch Stadium and the iconic Gateway Arch. Amenities inside the station include free Wifi, a food court, and a lounge for Amtrak’s First Class passengers. Gateway Station is a major stop for intercity bus service, several Amtrak train lines, and the city’s MetroLink which can connect you with the St Louis Lambert International Airport in just 30 minutes.
Train stations in St Louis:
Gateway Station - 430 S 15th St
Get around town with Moovit
Need a return trip from St Louis to Jefferson City?
Search Train TicketsPlan your next adventure
More trains from Jefferson City
Check out these popular routes
Wanderu is the simplest way to book bus and train travel.
With just a quick search on Wanderu, you can compare bus and train schedules and prices from hundreds of travel companies in one convenient place to find the trip that works best for you. Wanderu’s simple checkout process makes it easy to book cheap bus and train tickets hassle-free. Most importantly, as Wanderu is an official partner of all leading bus and train companies, we always have the best bus and train deals out there.
|
<urn:uuid:e72b000e-75b9-4a0a-90e4-0a5625ed7d45>
|
CC-MAIN-2024-51
|
https://www.wanderu.com/en-ca/train/us-mo/jefferson-city/us-mo/st-louis/
|
2024-12-03T11:16:56Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00145.warc.gz
|
by
|
2.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.998753
|
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"2.0"
]
}
|
Your selected artwork should start downloading automatically.
Downloadable digital reproductions of artworks on Web umenia are available as public domain. You can download them in high resolution and use them for both private and commercial use – i.e. copy, modify and share freely.
When sharing, please include:
Karol Frech – Korunná veža hradu, Bratislavský hrad, 1920–1930, Galéria mesta Bratislavy, GMB, https://www.webumenia.sk/dielo/SVK:GMB.C_10807
|
<urn:uuid:b2e7981a-a9f5-4f42-b884-fbc9cb443e76>
|
CC-MAIN-2024-51
|
https://www.webumenia.sk/en/dielo/SVK:GMB.C_10807
|
2024-12-03T11:58:15Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00145.warc.gz
|
mark
|
1.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.947428
|
{
"abbr": [
"mark"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"1.0"
]
}
|
Order of the National Green Tribunal in the matter of Ajay Pandey & Others Vs Union of India & Others dated 24/05/2019 regarding illegal sand mining taking place on the river bed between Etawah and Jalaun District including Auraiya District, Uttar Pradesh. According to the applicants, illegal sand mining is taking place in the river Yamuna and its four tributaries namely Chambal, Kwari, Sindh and Pahuj which merge in Yamuna in the area called Panchnad by using JCB and other machines.
|
<urn:uuid:0259fd0a-3fd9-4d9c-82b9-e4c661197884>
|
CC-MAIN-2024-51
|
http://admin.indiaenvironmentportal.org.in/category/thesaurus/jalaun?page=1
|
2024-12-04T16:32:33Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00045.warc.gz
|
by-sa
|
2.5
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.990558
|
{
"abbr": [
"by-sa",
"by-sa"
],
"in_footer": [
true,
true
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"2.5",
"2.5"
]
}
|
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International.
No documentation for this social character.
No permalink for this social character.
Home | Contact | SYMOGIH.ORG 2012-2018 | Site map | Legal notice
Powered by Digital history department of Laboratoire de recherche historique Rhône-Alpes (LARHRA)
|
<urn:uuid:cad8c155-e3f8-45a4-aec7-0bfafc027303>
|
CC-MAIN-2024-51
|
http://symogih.ish-lyon.cnrs.fr/?q=social-characteristic-record/1545&lang=en&qt-informations_documentation_sur_l=3
|
2024-12-04T16:45:57Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00045.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.809919
|
{
"abbr": [
"by-sa",
"by-sa"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
]
}
|
Does the Razor View Engine Support Generic Methods? September, 2010
Trying out the Razor view engine and for some reason my generic helper methods are breaking. For example:
public static class UrlHelperExtensions { public static string NonGenericHelper(this UrlHelper helper, Type controller) { return controller.Name; } public static string GenericHelper<TController>(this UrlHelper helper) { return typeof(TController).Name; } }
Works as expected:
@Url.NonGenericHelper(typeof(ProjectEuler.UI.Models.Home))
Breaks with the following exception:
@Url.GenericHelper<ProjectEuler.UI.Models.Home>()
The only workaround I could find is treating it as a "multi-token statement":
@(Url.GenericHelper<ProjectEuler.UI.Models.Home>())
Update: Brad Wilson mentions the following: "That is the intended behavior, because otherwise the parser would not be able to tell the difference between a generic and a piece of HTML content. Using the surrounding ( ) disambiguates it."
|
<urn:uuid:7238d153-7040-4dc4-ad2a-829c8d889e5d>
|
CC-MAIN-2024-51
|
http://www.mikeobrien.net/blog/does-razor-view-engine-support-generic
|
2024-12-04T16:03:35Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00045.warc.gz
|
by
|
3.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.949667
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
]
}
|
I’d started off writing a blog post about how I thought Dan Boyle was a cunt for voting against Shane Ross’s broadband bill. I’ve slightly softened my stand after reading the transcripts of the debate. Dan has so far proved himself to be a massive apologist for everything the Government has done of late including fucking over pensioners.
(If Dan Boyle decides to seek re-election in Cork South Central I’ll probably do my level best to make sure he doesn’t get enough votes to get in, even if I have to go through a lot of personal finances to do so. I got burned once by the lieing Green Party, I’d hope to make sure others are aware of the lengths they’ll go to in order to inflate their egos about being part of the Government.)
Photo owned by sophiea (cc)
Anyways, on to Shane Ross’s valiant attempt at his broadband bill. Shot down by the following people by the way, if you want to visit them and complain, this is who they are, a lame email won’t be enough I should think. Visit them.:
Boyle, Dan.
Brady, Martin.
Butler, Larry.
Callely, Ivor.
Carty, John.
Cassidy, Donie.
Corrigan, Maria.
Daly, Mark.
de Búrca, Déirdre.
Ellis, John.
Feeney, Geraldine.
Glynn, Camillus.
Hanafin, John.
Leyden, Terry.
MacSharry, Marc.
McDonald, Lisa.
Ó Domhnaill, Brian.
Ó Murchú, Labhrás.
O’Brien, Francis.
O’Donovan, Denis
O’Malley, Fiona.
O’Sullivan, Ned.
Ormonde, Ann.
Phelan, Kieran.
Walsh, Jim.
White, Mary M.
Wilson, Diarmuid.
So Dan gets up and backs up Eamon Ryan, you know, the guy that lies about how good things are when it comes to broadband. Just like the crazies in his Department.
While I think it’s really shitty to stand up and shout down a bill that was doing good, Dan was constructive at times and living on planet WTF at other times such as:
The Minister for Communications, Energy and Natural Resources is sufficiently energised in pointing his Department in the right direction in fulfilling this policy goal. He has enough commitment and knowledge of the subject to ensure the goals are met. It is not facetious to say that he knows in computing terms the plural of “mouse” is “mouses”. He is the one Cabinet member with a knowledge of how particular technology choices in this area work.
Mouse, mouses. Shuddup Chris Farley. In the next bit he at least pointed out he differed in opinion to Ryan and praised a lot of Ross’s bill.
One function for an overseeing agency would be to ensure broadband penetration is reached critically in each of those sectors. The Minister has indicated his personal priority as regards broadband in schools. I am confident there will be significant advances in this area. It must be recognised better broadband access for households has other implications such as encouraging home working and preventing unnecessary commuter transport.
The difference between technology platforms is an area I believe could be more tightly regulated. Will the majority of broadband service be delivered through cable or some other platform such as satellite? The Minister indicated that because the greater increase in broadband services is through mobile platforms, this seems to be policy direction. I am not sure that should be the case. There are still opportunities to have a cable-based system that will carry as much of the broadband network as possible while having the mobile broadband as an add-on.
The Minister is open to debate on the issue while at the same time progressing policy goals in this area. I would like to see Senator Shane Ross, who has taken an interest in this area, engage in further goading of the Minister, the Department and the Government on broadband services. I know the Minister has stated he will not accept this Bill but there is still a need for the Minister to explain what he intends to do in regulation and legislation, if necessary, in this area.
Schools? More schools have a satellite dish feeding them Internet access than proper broadband. Satellite is not broadband. Also Ryan has said 2009 will be when his Department will reexamine broadband in schools. I find it very interesting that broadband in schools is the new fad from the Department. Love how they’re talking about fibre? How many have fibre now? How many will have fibre in 2009? You don’t know. The Department doesn’t know because it’s made up. Pulled out of the air.
Two questions if answered honestly by Boyle and his party members would push things along:
- Will you agree that mobile “broadband” is not in fact credible broadband and is more like mobile dialup?
- Will you agree that these mobile figures should not be used by the Government to measure broadband subscriptions?
Were such an honest answer given, it would make progress in my view because there’d be less lies to hide behind and more motiviation to make progress. Unlike now.
|
<urn:uuid:2446260a-e99e-4057-b1c8-0daf858fba60>
|
CC-MAIN-2024-51
|
http://www.mulley.net/author/damien/page/111/
|
2024-12-04T15:25:52Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00045.warc.gz
|
by
|
3.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.99945
|
{
"abbr": [
"by",
"by",
"by",
"by",
"by"
],
"in_footer": [
false,
false,
false,
false,
false
],
"in_head": [
false,
false,
false,
false,
false
],
"location": [
"a_tag",
"a_tag",
"a_tag",
"a_tag",
"a_tag"
],
"version": [
"3.0",
"3.0",
"3.0",
"3.0",
"3.0"
]
}
|
Issue |
Wuhan Univ. J. Nat. Sci.
Volume 27, Number 6, December 2022
---|---|---|
Page(s) | 453 - 464 | |
DOI | https://doi.org/10.1051/wujns/2022276453 | |
Published online | 10 January 2023 |
CLC number: TP 183
A Fault Diagnosis Model for Complex Industrial Process Based on Improved TCN and 1D CNN
1
School of Electronic and Electrical Engineering, Shanghai University of Engineering Science, Shanghai 201600, China
2
State Grid Shanghai Municipal Electric Power Company, Shanghai 200122 , China
3
CSG Smart Science & Technology Co., LTD., Shanghai 201203, China
† To whom correspondence should be addressed. E-mail: email@example.com
Received:
10
September
2022
Fast and accurate fault diagnosis of strongly coupled, time-varying, multivariable complex industrial processes remain a challenging problem. We propose an industrial fault diagnosis model. This model is established on the base of the temporal convolutional network (TCN) and the one-dimensional convolutional neural network (1DCNN). We add a batch normalization layer before the TCN layer, and the activation function of TCN is replaced from the initial ReLU function to the LeakyReLU function. To extract local correlations of features, a 1D convolution layer is added after the TCN layer, followed by the multi-head self-attention mechanism before the fully connected layer to enhance the model's diagnostic ability. The extended Tennessee Eastman Process (TEP) dataset is used as the index to evaluate the performance of our model. The experiment results show the high fault recognition accuracy and better generalization performance of our model, which proves its effectiveness. Additionally, the model's application on the diesel engine failure dataset of our partner's project validates the effectiveness of it in industrial scenarios.
Key words: fault diagnosis / temporal convolutional network / self-attention mechanism / convolutional neural network
Biography: WANG Mingsheng, male, Master candidate, research direction: fault diagnosis. E-mail: firstname.lastname@example.org
Supported by the Scientific and Technological Innovation 2030 — Major Project of "New Generation Artificial Intelligence" (2020AAA0 109300)
© Wuhan University 2022
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.
|
<urn:uuid:a3b8737f-0547-4a49-8cb0-f90d6d4250f6>
|
CC-MAIN-2024-51
|
https://wujns.edpsciences.org/articles/wujns/abs/2022/06/wujns-1007-1202-2022-06-0453-12/wujns-1007-1202-2022-06-0453-12.html
|
2024-12-04T16:15:45Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00045.warc.gz
|
by
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.963156
|
{
"abbr": [
"by",
"by"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
]
}
|
Lyon-Turin railway link
Dear The Innovation and Networks Executive Agency,
Under the right of access to documents in the EU treaties, as developed in Regulation 1049/2001, I am requesting documents which contain the following information:
- all reports (and other notes) from meetings between INEA and Italian government's representatives, in which the Lyon-Turin railway link project was discussed.
- all correspondence (including emails and attachments) between INEA and representatives of the Italian government, which mentions the Lyon-Turin railway link project.
- all reports (and other notes) from meetings between INEA and other Departments/Executive Agencies of the Commission in which the Lyon-Turin railway link project was discussed.
- all correspondence (including emails and attachments) between INEA and other Departments/Executive Agencies of the Commission, which mentions the Lyon-Turin railway link project.
- all correspondence (including emails and attachments) between INEA and the European Court of Auditors in which the Lyon-Turin railway link project was discussed.
- all reports (and other notes) from meetings between INEA and the European Court of Auditors, in which the Lyon-Turin railway link project was discussed.
- all reports (and other notes) from meetings between INEA and representatives of Tunnel Euralpin Lyon Turin s.a.s (TELT)
- all correspondence (including emails and attachments) between INEA and representatives of Tunnel Euralpin Lyon Turin s.a.s (TELT)
My request concerns the period from January 2018 to the present day.
Yours faithfully,
Alessandro Runci
Via cerreto sannita, 13
00182 - Rome, Italy
Link: [1]File-List
Link: [2]themeData
Link: [3]colorSchemeMapping
[4]Ares(2021)1427537 - Acknowledgment of receipt - Access to documents
request - INEA 2021/7
Sent by KOSMA Athina (INEA) <[email address]>. All responses
have to be sent to this email address.
Envoyé par KOSMA Athina (INEA) <[email address]>. Toutes les
réponses doivent être effectuées à cette adresse électronique.
Dear Sir,
Thank you for your mail of 16 February. Your request was lodged via a
private third-party website and due to its features the relevant
notification was filtered by our functional mailbox as “spam” and was
received by the responsible services for access to documents in INEA on 23
February 2021. It was registered on the same day, under the reference
number INEA 2021/7.
In accordance with Regulation (EC) No 1049/2001 regarding public access to
European Parliament, Council and Commission documents, your application
will be handled within 15 working days. The time-limit will expire on 16
March 2021. In case this time-limit needs to be extended, you will be
informed in due course.
You have lodged your application via a private third-party website, which
has no link with any institution of the European Union. Therefore, INEA
cannot be held accountable for any technical issues or problems linked to
the use of this system.
Please note that the private third party running the AsktheEU.org website
is responsible and accountable for the processing of your personal data
via that website, and not INEA. For further information on your rights,
please refer to the third party’s privacy policy.
We understand that the third party running the AsktheEU.org website
usually publishes the content of applicants’ correspondence with INEA on
that website. This includes the personal data that you may have
communicated to INEA (e.g. your private postal address).
Similarly, the third party publishes on that website any reply that INEA
will send to the email address of the applicants generated by the
AsktheEU.org website.
If you do not wish that your correspondence with INEA is published on a
private third-party website such as AsktheEU.org, you can provide us with
an alternative, private e-mail address for further correspondence. In that
case, INEA will send all future electronic correspondence addressed to you
only to that private address, and it will use only that private address to
reply to your request. You should still remain responsible to inform the
private third-party website about this change of how you wish to
communicate with, and receive a reply from INEA.
Best regards,
INEA ACCESS TO DOCUMENTS
References
Visible links
1. file:///tmp/cid:email@example.com
2. file:///tmp/~~themedata~~
3. file:///tmp/~~colorschememapping~~
4. https://webgate.ec.testa.eu/Ares/documen...
Dear Mr Runci,
Please find attached a letter from LIEGEOIS Eddy (MOVE.DDG1.B.1)
concerning your requests to Access Documents - GESTDEM 2021/0801 (DG MOVE)
- GESTDEM 2021/0816 (SG) and INEA 2021/7.
Yours faithfully,
MOVE ACCES DOCUMENTS Team
[1]Description: cid:firstname.lastname@example.org
European Commission
Directorate General for Mobility and Transport
Unit MOVE A-4
Legal Issues & Enforcement
▪ Postal address: Europese Commissie/Commission européenne, B-1049
Brussel/Bruxelles
▪ Office address: Rue de Mot 28, B-1040 Brussels
▪ Tel. +32 2 299 11 11
E-mail: [2][email address]
References
Visible links
2. mailto:[email address]
Dear The Innovation and Networks Executive Agency,
Thank you for your response. In order to accomodate your request for clarification and for narrowing down the scope of my request, I am excluding those aspects of my request which I believe may concern a very large number of documents, and reducing the time-period.
My request is now reformulated so as to concern only:
- exchanges between the Innovation and Networks Executive Agencyand one member state in relation to one specific project;
- exchanges between the Innovation and Networks Executive Agency and the European Court of Auditors in relation to one specific project;
- exchanges between the Innovation and Networks Executive Agency and one third-party.
I believe my request can now be handled within the time limit provided by Regulation 1049/2001.
Please find below my modified request:
Dear Innovation and Networks Executive Agency,
Under the right of access to documents in the EU treaties, as developed in Regulation 1049/2001, I am requesting documents which contain the following information:
- all reports (and other notes) from meetings between INEA and Italian government's representatives, in which the Lyon-Turin railway link project (Action 2014-EU-TM0401-M) was discussed.
- all correspondence (including emails and attachments) between INEA and representatives of the Italian government, which mentions the Lyon-Turin railway link project.
- all correspondence (including emails and attachments) between INEA and the European Court of Auditors in which the Lyon-Turin railway link project was discussed.
- all reports (and other notes) from meetings between INEA and the European Court of Auditors, in which the Lyon-Turin railway link project was discussed.
- all reports (and other notes) from meetings between INEA and representatives of Tunnel Euralpin Lyon Turin s.a.s (TELT)
- all correspondence (including emails and attachments) between INEA and representatives of Tunnel Euralpin Lyon Turin s.a.s (TELT)
My request concerns the period from January 2019 to the present day.
Yours faithfully,
Alessandro Runci
Link: [1]File-List
Link: [2]themeData
Link: [3]colorSchemeMapping
[4]Ares(2021)1964723 - Acknowledgment of receipt - Access to documents
request - INEA 2021/7
Sent by ve_inea.inea-access-documents (INEA)
<[INEA request email]>. All responses have to be sent to
this email address.
Envoyé par ve_inea.inea-access-documents (INEA)
<[INEA request email]>. Toutes les réponses doivent être
effectuées à cette adresse électronique.
Dear Sir,
Thank you for the clarifications concerning your application for access to
documents, received by e-mail on 17 March 2021 and registered on the same
day under reference number INEA 2021/7.
In accordance with Regulation (EC) No 1049/2001 regarding public access to
European Parliament, Council and Commission documents, your application
will be handled within 15 working days. The time-limit will expire on 12
April 2021. In case this time-limit needs to be extended, you will be
informed in due course.
You have lodged your application via a private third-party website, which
has no link with any institution of the European Union. Therefore, INEA
cannot be held accountable for any technical issues or problems linked to
the use of this system.
Please note that the private third party running the AsktheEU.org website
is responsible and accountable for the processing of your personal data
via that website, and not INEA. For further information on your rights,
please refer to the third party’s privacy policy.
We understand that the third party running the AsktheEU.org website
usually publishes the content of applicants’ correspondence with INEA on
that website. This includes the personal data that you may have
communicated to INEA (e.g. your private postal address).
Similarly, the third party publishes on that website any reply that INEA
will send to the email address of the applicants generated by the
AsktheEU.org website.
If you do not wish that your correspondence with INEA is published on a
private third-party website such as AsktheEU.org, you can provide us with
an alternative, private e-mail address for further correspondence. In that
case, INEA will send all future electronic correspondence addressed to you
only to that private address, and it will use only that private address to
reply to your request. You should still remain responsible to inform the
private third-party website about this change of how you wish to
communicate with, and receive a reply from INEA.
Best regards,
INEA ACCESS TO DOCUMENTS
References
Visible links
1. file:///tmp/cid:email@example.com
2. file:///tmp/~~themedata~~
3. file:///tmp/~~colorschememapping~~
4. https://webgate.ec.testa.eu/Ares/documen...
Dear Sir,
We refer to your request for access to documents, as clarified by your
e-mail of 17 March 2021, registered on the same day under reference number
INEA 2021/7.
Your application is currently being handled. However, we will not be in a
position to complete the handling of your application within the time
limit of 15 working days, which expires on 12 April 2021.
An extended time limit is needed as part of the documents requested
originate from third parties, which are being consulted.
Therefore, we have to extend the time limit with 15 working days in
accordance with Article 7(3) of Regulation (EC) No 1049/2001 regarding
public access to documents. The new time limit expires on 3 May 2021.
We apologise for this delay and for any inconvenience this may cause.
You have lodged your application via a private third-party website, which
has no link with any institution of the European Union. Therefore, CINEA
cannot be held accountable for any technical issues or problems linked to
the use of this system.
Please note that the private third party running the AsktheEU.org website
is responsible and accountable for the processing of your personal data
via that website, and not CINEA. For further information on your rights,
please refer to the third party’s privacy policy.
We understand that the third party running the AsktheEU.org website
usually publishes the content of applicants’ correspondence with CINEA on
that website. This includes the personal data that you may have
communicated to the Commission (e.g. your private postal address).
Similarly, the third party publishes on that website any reply that CINEA
will send to the email address of the applicants generated by the
AsktheEU.org website.
If you do not wish that your correspondence with CINEA is published on a
private third-party website such as AsktheEU.org, you can provide us with
an alternative, private e-mail address for further correspondence. In that
case, CINEA will send all future electronic correspondence addressed to
you only to that private address, and it will use only that private
address to reply to your request. You should still remain responsible to
inform the private third-party website about this change of how you wish
to communicate with, and receive a reply from, CINEA.
Please note that, since 1^st April 2021, our Agency’s name changed to
“European Climate, Infrastructure and Environment Executive Agency
(CINEA)”. From now on, you can contact the access to documents team via
this e-mail address: [1][email address]
Best regards,
CINEA ACCESS TO DOCUMENTS
References
Visible links
1. mailto:[email address]
Link: [1]File-List
Link: [2]themeData
Link: [3]colorSchemeMapping
[4]Access to documents request - INEA 2021/7 - Ares(2021)2943643
Sent by ve_cinea.access-documents (CINEA)
<c[INEA request email]>. All responses have to be sent to
this email address.
Envoyé par ve_cinea.access-documents (CINEA)
<c[INEA request email]>. Toutes les réponses doivent être
effectuées à cette adresse électronique.
Dear Sir,
We refer to your e-mail of 17 March 2021 in which you make a request for
access to documents under Regulation (EC) No 1049/2001 (“the Regulation”),
registered under the reference number INEA 2021/7.
You request - for the period from January 2019 and the grant agreement no.
INEA/CEF/TRAN/M2014/1057372 concerning Action 2014-EU-TM-0401-M - access
to:
- all reports (and other notes) from meetings between INEA and Italian
government's representatives, in which the Lyon-Turin railway link project
(Action 2014-EU-TM0401-M) was discussed.
- all correspondence (including emails and attachments) between INEA and
representatives of the Italian government, which mentions the Lyon-Turin
railway link project.
- all correspondence (including emails and attachments) between INEA and
the European Court of Auditors in which the Lyon-Turin railway link
project was discussed.
- all reports (and other notes) from meetings between INEA and the
European Court of Auditors, in which the Lyon-Turin railway link project
was discussed.
- all reports (and other notes) from meetings between INEA and
representatives of Tunnel Euralpin Lyon Turin s.a.s (TELT)
- all correspondence (including emails and attachments) between INEA and
representatives of Tunnel Euralpin Lyon Turin s.a.s (TELT)
This reply relates only to your request submitted to INEA as regards the
documents held by INEA. For the requests submitted to the Directorate
General for Mobility and Transport of the European Commission (DG MOVE)
under reference number GESTDEM 2021/0801 and to the Secretariat General
(SG) of the European Commission, under reference number GESTDEM 2021/0816,
you have received or will receive replies from the respective Commission
services in due course.
In view of handling your request, we considered that the following
documents fall under its scope:
1) Documents concerning the management of the Grant Agreement,
relating to payments.
2) Documents concerning the management of the Grant Agreement,
relating to action status reports.
3) Documents concerning the management of the Grant Agreement,
relating to Amendment no.1.
4) Documents concerning access to documents procedures under
Regulation 1049/2001.
5) Mission reports from two meetings.
After examining these documents in accordance with the provisions of
Regulation (EC) 1049/2001 and taking into account the opinion of the
Member States from whom certain documents or parts of the documents
emanate, that were consulted as per Article 4(5), we reached the
conclusion that partial disclosure may be granted, with the exception of
some documents or parts of documents that are protected by Article 4(1)(b)
(protection of privacy and the integrity of the individual) and/or Article
4(2) first indent (commercial interests of natural and legal person,
including intellectual property rights) and/or Article 4(3) (decision
making process) of the Regulation.
· Article 4(2), first indent of Regulation 1049/2001 provides that
“the institutions shall refuse access to a document where disclosure would
undermine the protection of commercial interests of a natural or legal
person, including intellectual property (…) unless there is an overriding
public interest in disclosure.” The exception laid down in Article 4(2)
of Regulation (EC) No 1049/2001 applies unless there is an overriding
public interest in disclosure of the document. We have examined whether
there could be an overriding public interest in disclosure, but we were
not able to identify such an interest.
· Article 4(3), second indent of Regulation 1049/2001 provides that
“Access to a document containing opinions for internal use as part of
deliberations and preliminary consultations within the institution
concerned shall be refused even after the decision has been taken if
disclosure of the document would seriously undermine the institution's
decision-making process, unless there is an overriding public interest in
disclosure.” The exception laid down in Article 4(3) of Regulation (EC) No
1049/2001 applies unless there is an overriding public interest in
disclosure of the document. We have examined whether there could be an
overriding public interest in disclosure, but we were not able to identify
such an interest.
· According to Article 4(1) (b) of Regulation 1049/2001, access to a
document is refused where disclosure would undermine "the protection of
privacy and the integrity of the individual, in particular in accordance
with Community legislation regarding the protection of personal data." The
documents to which you seek access contain names, positions in the related
legal entities and contact details. This information constitutes personal
data in the meaning of Article 3 (1) of Regulation (EU) 2018/1725 (the EU
Data Protection Regulation - EUDPR).
In its judgement C-28/08 P- the Bavarian Lager case, the European Court of
Justice rules that, when a request is made for access to documents
containing personal data, the Data Protection Regulation becomes fully
applicable. Article 9(1)(b) of the EUDPR requires that the necessity to
have the personal data transmitted must be established by the recipient
(i.e. applicant of the access to documents request) and it does not allow
the transmission of these personal data where there is reason to assume
that the legitimate interests of the data subject might be prejudiced. The
various competing interests should be weighed by the controller, in order
to establish that it is proportionate to transmit the personal data for
that specific purpose. In your application you have not established a
specific need to obtain personal data. Therefore, the requirements for
disclosing personal data are not met according to the EU Data Protection
Regulation. In addition, there are reasons to assume that the legitimate
interests of the data subjects concerned would be prejudiced by the
disclosure of the personal data redacted in the documents, as there is a
risk that such public disclosure would harm their privacy and subject them
to unsolicited external contacts. All the personal data included in the
attached documents were therefore redacted.
1) The documents concerning the management of the Grant Agreement,
relating to payments cannot be disclosed as they are protected by Article
4(2) first indent of the Regulation (protection commercial interests of
natural and legal person), Article 4(3) (decision making process) and
Article 4(1)(b) of the Regulation (protection of privacy and the integrity
of the individuals).
We have considered the possibility of granting partial access in
accordance with Article 4(6) of the Regulation, however, no meaningful
partial access is possible without undermining these specific interests.
2) The documents concerning the management of the Grant Agreement,
relating to action status reports, cannot be disclosed as they are
protected by Article 4(2) first indent of the Regulation (protection of
commercial interests of natural and legal person), Article 4(3) (decision
making process) and Article 4(1)(b) of the Regulation (protection of
privacy and the integrity of the individuals).
We have considered the possibility of granting partial access and the
following documents can be partially released:
- Approval of ASR 2019 _Action 2014-EU-TM-0301-M (doc. 1)
- Request for submission of Action Status Report 2014-EU-TM-0401-M 2019
(doc. 2)
- Approval of ASR 2020 _Action 2014-EU-TM-0301-M (doc. 3)
Some parts have been blanked out as their disclosure is prevented by
exceptions to the right of access laid down in Article 4(2) first indent
of the Regulation (protection of commercial interests of natural and legal
person) and Article 4(1)(b) of the Regulation (protection of privacy and
the integrity of the individuals).
3) The documents concerning the management of the Grant Agreement,
relating to Amendment no.1. cover preparatory technical exchanges and
clarifications meant to define the scope of the modification that are part
of the usual standard assessment the Agency carries out for any amendment
request and cannot be disclosed as they are protected by Article 4(2)
first indent of the Regulation (protection of commercial interests of
natural and legal person), Article 4(1)(b) of the Regulation (protection
of privacy and the integrity of the individuals) and Article 4(3) of the
Regulation (decision making process).
We have considered the possibility of granting partial access and the
following documents can be partially released:
- Letter INEA to TELT 18 February 2019 (doc. 4)
- Amendment request for Action 2014-EU-TM-0301-M (doc. 5)
- Letter INEA to MIT 5 December 2019 (doc.6)
- Letter DG MOVE and INEA to MIT 2 March 2020 (doc.7)
- Transmission Letter INEA to MIT Amendment no1 20 March 2020 (doc.8)
- Transmission Letter INEA to MIT Corrigendum Amendment no1 25 March 2020
(doc.9)
- Transmission Letter MIT to INEA signed Amendment no1 MIT to INEA 15
April 2020 (doc.10)
- Transmission letter INEA to MIT Amendment no1 signed by both parties 17
April 2020 (doc.11)
- Signed amendment n°1-Action 2014-EU-TM-0301-M (doc.12)
Some parts have been blanked out as their disclosure is prevented by
exceptions to the right of access laid down in Article 4(2) first indent
of the Regulation (protection of commercial interests of natural and legal
person), Article 4(1)(b) of the Regulation (protection of privacy and the
integrity of the individuals) and Article 4(3) of the Regulation (decision
making process).
4) The documents concerning access to documents procedures under
Regulation 1049/2001 [consultations between INEA and MIT carried out on
the basis of Articles 4(4)/(5) of the Regulation], cannot be disclosed as
they are protected by Article 4(2) first indent of the Regulation
(protection commercial interests of natural and legal person), Article
4(1)(b) of the Regulation (protection of privacy and the integrity of the
individuals) and Article 4(3) of the Regulation (decision making process).
5) Mission reports from two meetings:
- The meeting report from meeting held 22 January 2020 (doc.13). This
document can be partially disclosed. Some parts have been blanked out as
their disclosure is prevented by exceptions to the right of access laid
down in Article 4(2) first indent of the Regulation (protection of
commercial interests of natural and legal person), Article 4(2) third
indent (purpose of inspections, investigations and audits), Article
4(1)(b) of the Regulation (protection of privacy and the integrity of the
individuals) and Article 4(3) of the Regulation (decision making process).
This document was drawn up for internal use under the responsibility of
the relevant officials of INEA. It solely reflects the author's
interpretation of the interventions made and does not set out any official
position of the third parties to which the document refers, which was not
consulted on its content. It does not reflect the position of INEA and
cannot be quoted as such.
- The meeting report from meeting held 11 and 12 February 2019 cannot be
disclosed as it is protected by Article 4(2) first indent of the
Regulation (protection commercial interests of natural and legal person),
Article 4(2) third indent (purpose of inspections, investigations and
audits), Article 4(3) (decision making process) and Article 4(1)(b) of the
Regulation (protection of privacy and the integrity of the individuals).
We have considered the possibility of granting partial access in
accordance with Article 4(6) of the Regulation, however, no meaningful
partial access is possible without undermining these specific interests.
Disclaimers:
1. You have lodged your application via a private third-party
website, which has no link with any institution of the European Union.
Therefore, CINEA cannot be held accountable for any technical issues or
problems linked to the use of this system.
2. We understand that the third party running the AsktheEU.org
website usually publishes the content of applicants’ correspondence with
CINEA on that website. This includes the personal data that you may have
communicated to CINEA. Please note that the private third party running
the AsktheEU.org website is responsible and accountable for the processing
of your personal data via that website, and not CINEA. For further
information on your rights, please refer to the third party’s privacy
policy.
3. Please note that documents or part of the documents originating
from third parties are disclosed to you based on Regulation (EC) No
1049/2001. However, this disclosure is without prejudice to the rules on
intellectual property, which may limit your right to reproduce or exploit
the released documents without the agreement of the originator, who may
hold an intellectual property right on them. CINEA does not assume any
responsibility from their reuse.
In accordance with Article 7(2) of Regulation 1049/2001, you are entitled
to make a confirmatory application as regards your request for access to
documents requesting the Agency to review this position.
Such a confirmatory application should be addressed within 15 working days
upon receipt of this letter to the Director of CINEA at the following
address:
CINEA
Chaussée de Wavre 910
B-1049 Bruxelles
or by email to: [5][email address]
Please note that, since 1^st April 2021, our Agency’s name changed to
“European Climate, Infrastructure and Environment Executive Agency
(CINEA)”. From now on, you can contact the access to documents team via
this e-mail address: [6][email address]
Best regards,
CINEA ACCESS TO DOCUMENTS
References
Visible links
1. file:///tmp/cid:firstname.lastname@example.org
2. file:///tmp/~~themedata~~
3. file:///tmp/~~colorschememapping~~
4. https://webgate.ec.testa.eu/Ares/documen...
5. mailto:[email address]
6. mailto:[email address]
Dear The Innovation and Networks Executive Agency,
Please pass this on to the person who reviews confirmatory applications.
I am filing the following confirmatory application with regards to my access to documents request 'Lyon-Turin railway link'.
A full history of my request and all correspondence is available on the Internet at this address: https://www.asktheeu.org/en/request/lyon...
Yours faithfully,
Alessandro Runci
Link: [1]File-List
Link: [2]themeData
Link: [3]colorSchemeMapping
[4]Acknowledgment of receipt - Access to documents request - INEA 2021/7 -
Ares(2021)3909451
Sent by ve_cinea.access-documents (CINEA)
<c[INEA request email]>. All responses have to be sent to
this email address.
Envoyé par ve_cinea.access-documents (CINEA)
<c[INEA request email]>. Toutes les réponses doivent être
effectuées à cette adresse électronique.
Dear Sir,
Thank you for your email of 6 June 2021. We hereby acknowledge receipt of
your confirmatory application for access to documents which was registered
on 7 June 2021, under the reference number INEA 2021/7.
In accordance with Regulation (EC) No 1049/2001, your application will be
handled within 15 working days. The time limit will expire on 28 June
2021. In case this time limit needs to be extended, you will be informed
in due course.
Best regards,
CINEA ACCESS TO DOCUMENTS
References
Visible links
1. file:///tmp/cid:email@example.com
2. file:///tmp/~~themedata~~
3. file:///tmp/~~colorschememapping~~
4. https://webgate.ec.testa.eu/Ares/documen...
Link: [1]File-List
Link: [2]themeData
Link: [3]colorSchemeMapping
[4]Holding reply - Access to documents - INEA 2021/7 - Ares(2021)4208347
Sent by ve_cinea.access-documents (CINEA)
<c[INEA request email]>. All responses have to be sent to
this email address.
Envoyé par ve_cinea.access-documents (CINEA)
<c[INEA request email]>. Toutes les réponses doivent être
effectuées à cette adresse électronique.
Dear Sir,
We refer to your request for access to documents of 6 June 2021,
registered on 7 June 2021 under the reference number INEA 2021/7.
Your application is currently being handled. However, we will not be in a
position to complete the handling of your application within the time
limit of 15 working days, which expires on 28 June 2021.
We have to extend the time limit with 15 working days in accordance with
Regulation (EC) No 1049/2001 regarding public access to documents. The new
time limit expires on 19 July 2021.
An extended time limit beyond the one indicated above might be needed as
your request for access to documents includes a document (Amendment no.1)
that is currently object of a consultation from the European Ombudsman
regarding the decision of the Agency on a request from another applicant.
The matter is currently assessed by the Ombudsman and a solution regarding
the parts of the concerned document to be disclosed is expected in the
coming weeks. The disclosure of any document based on Regulation (EC) No
1049/2001 on access to documents has erga omnes effects. The same content
of the document will be disclosed to all applicants. Therefore, for the
sake of administrative efficiency, we will be able to reply to your
request when the position of the Agency on the level of disclosure of the
concerned document is final and the ongoing Ombudsman file is closed.
We apologise for this delay and for any inconvenience this may cause.
Best regards,
CINEA ACCESS TO DOCUMENTS
References
Visible links
1. file:///tmp/cid:firstname.lastname@example.org
2. file:///tmp/~~themedata~~
3. file:///tmp/~~colorschememapping~~
4. https://webgate.ec.testa.eu/Ares/documen...
Link: [1]File-List
Link: [2]themeData
Link: [3]colorSchemeMapping
[4]Holding reply - Access to documents - INEA 2021/7 - Ares(2021)4659122
(Please use this link only if you are an Ares user – Svp, utilisez ce lien
exclusivement si vous êtes un(e) utilisateur d’Ares)
Dear Sir,
We refer to your request for access to documents of 6 June 2021,
registered on 7 June 2021 under the reference number INEA 2021/7.
As we informed you on 28 June 2021, your application is currently being
handled but we are not yet in a position to reply to you. Your request for
access to documents includes a document (Amendment no.1) that is currently
object of a consultation from the European Ombudsman regarding the
decision of the Agency on a request from another applicant. The Ombudsman
is currently in consultation with the other applicant on the position of
the Agency regarding the level of disclosure and then will finalise her
assessment and close the file. This is not expected to take place before
September.
We apologise for this delay and for any inconvenience this may cause.
Best regards,
CINEA ACCESS TO DOCUMENTS
References
Visible links
1. file:///tmp/cid:email@example.com
2. file:///tmp/~~themedata~~
3. file:///tmp/~~colorschememapping~~
4. https://webgate.ec.testa.eu/Ares/documen...
|
<urn:uuid:6e1dd889-3a40-4fde-81b3-cb27b1b65986>
|
CC-MAIN-2024-51
|
https://www.asktheeu.org/en/request/lyon_turin_railway_link_3?utm_campaign=alaveteli-experiments-87&utm_content=sidebar_similar_requests&utm_medium=link&utm_source=asktheeu.org
|
2024-12-04T14:38:22Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00045.warc.gz
|
by-sa
|
3.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.973048
|
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
]
}
|
Malta's most recent quantitative report to the Commission on the application of Council Regulation (EC) No 1224/2009 of 20 November 2009.
Dear The European Fisheries Control Agency,
Under the right of access to documents in the EU treaties, as developed in Regulation 1049/2001, I am requesting documents which contain the following information:
Malta's most recent quantitative report to the Commission on the application of Council Regulation (EC) No 1224/2009 of 20 November 2009.
Yours faithfully,
Justine Borg
Dear Ms Borg,
Thank you for your message and your interest in the European Agency for
Fisheries Control (EFCA).
We have deducted that, regarding the reporting obligations, you refer to
article 118 of the Control Regulation:
Article 118
Reporting obligations
1. Every five years, Member States shall transmit a report to the
Commission on the application of this Regulation.
2. On the basis of the reports submitted by the Member States and its own
observations, the Commission shall draw up a report every five years to be
submitted to the European Parliament and the Council.
3. An evaluation of the impact of this Regulation on the common fisheries
policy shall be undertaken by the Commission five years after the entry
into force of this Regulation.
4. Member States shall transmit to the Commission a report stating the
rules that have been used for producing reports on basic data.
5. Detailed rules on the content and format of the reports by Member
States for the application of this Article shall be adopted in accordance
with the procedure referred to in Article 119
If that is the case, the request should go to European Commission. You may
consult the webpage of the Directorate-General for Maritime Affairs and
Fisheries of the European Commission, and contact the relevant service in
the following link:
[1]http://ec.europa.eu/dgs/maritimeaffairs_...
Yours sincerely,
EFCA Communication
[2][IMG]
[3][IMG][4][IMG][5][IMG]
European Fisheries Control Agency
Edificio Odriozola, Av. García Barbón 4,
36201, Vigo, Spain
DISCLAIMER: This e-mail message, including any attachments, is intended
solely for the attention and use of the named addressee(s) and may contain
information which is confidential. If you have received this message in
error, please notify the sender immediately by e-mail and delete the
message from your system. Unless you are the intended recipient (or
authorised by a recipient), access to this e-mail message or any
disclosure or copying of its content, or any action taken in reliance on
it is strictly prohibited. In addition the opinion(s) or view(s) expressed
therein only commit(s) the sender of the mail. Unless clearly stated so,
the contents of the e-mail message cannot be perceived as an official
point of view, commitment or opinion of the European Fisheries Control
Agency (EFCA). The integrity of this message sent over the internet cannot
be guaranteed and therefore the EFCA will accept no liability for any
improper functioning of the systems involved.
[6]Personal data protection
|
<urn:uuid:ce83f367-995b-4759-b112-57b1a4bb5ad4>
|
CC-MAIN-2024-51
|
https://www.asktheeu.org/es/request/maltas_most_recent_quantitative
|
2024-12-04T16:00:56Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00045.warc.gz
|
by-sa
|
3.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.950946
|
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
]
}
|
Your email address will not be published. Required fields are marked *
*NAME
*EMAIL — Get a Gravatar
Website URL
Δ
|
<urn:uuid:5509e3d1-dacf-40da-bc68-d19df4db1863>
|
CC-MAIN-2024-51
|
https://www.bananatriangle.com/comics/the-emissary/
|
2024-12-04T15:31:33Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00045.warc.gz
|
by-nd
|
3.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.997947
|
{
"abbr": [
"by-nd",
"by-nd"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"3.0",
"3.0"
]
}
|
If there seems to be some truth to the popular notion of recent years that ‘everything has changed’, however it is also seems a truism that some things never change. If the Trump presidency and the COVID pandemic produced new ripple effects across politics and the economy, they also resurfaced age-old arguments about crime, violence, and policing in American society. The new iterations were captured in phrases such as ‘Black Lives Matter’, ‘American Carnage’, and ‘Defund the Police.’ Step back a few years and there was the ‘Ferguson Effect.’
Crime certainly went up during the COVID pandemic. Indeed, the number of homicides spiked almost 30 percent in 2020, the largest year-over-year increase since 1960 when formal crime stats started to be collected. 2021 saw a smaller increase but also included twelve cities, including Philadelphia, Austin, Indianapolis, and Portland breaking their annual homicide records.
In a way crime is arguably the toughest domestic issue in politics. Any new low in crime instantly transforms from social achievement into public expectation. It is true, as many liberals have pointed out, that the recent spike has come on the heels of a long drop in crime that started in the early 1990s after a long period of mostly rising crime that began in the late-1960s. It is also that thus far the current crime spike still pales in comparison to the peak rates of that period. Yet it is equally true is that public fear of rising crime is perfectly legitimate and attempts to minimize public fear in a road to nowhere.
Debates about the current crime spike revolve around the usual factors such as guns and policing, as well as new factors such as bail reform laws. All these explanations contain plausible arguments. The Wall Street Journal reported on August 4th that more guns from states with looser gun laws were making their way to states with tougher guns laws. Bail laws were changed in localities that are experiencing increased crime. The share of murders that result in an arrest or identification dropped to 54 percent in 2020 from about 70 percent in the 1980s, suggesting an increased lack of trust in police. Yet it is well worth noting that while cities have gotten almost all the attention, crime took off everywhere. Rural America saw a 25 percent increase in homicides. Of course, hanging over all this was the social disruption of the pandemic itself.
However stepping back from all recent developments and we come to the fact that the U.S. has always had more crime than the developed countries to which it is compared. And not only crime. Even before the pandemic life expectancy in the U.S. had an unprecedented modern decline in 2015 and 2016. Americans of every income level are unusually likely to die from cars accidents and drugs as well as guns. Obviously, with around 400 million guns in the civilian population, gun access in the U.S. is exceptional. Broadly speaking, states with weaker gun laws see higher rates of deaths from guns, whether murders or suicides, than states with tighter laws. But it’s also true the vast majority of crimes involving guns are committed by illegally possessed guns, not guns legally owned. The decline in crime that started in the early 1990s took place amidst the country’s gun laws, particularly at the state level, becoming more permissive, not less.
Then there is the fact that violence of all sorts, from stabbings to arson, are more common in the U.S. than other first world countries. One may take this a few different ways. It can be argued, for a variety of reasons, that Europe for instance is not a correct comparison to the U.S. Others will argue cultural reasons, often stemming from the ‘frontier’ and the ‘old west’ mythology. Yet simply pointing to ‘culture’ is often just a simple copout.
Related to crime is incarceration. Here too the U.S. is quite exceptional. Actually the U.S. has the highest incarceration rate in the world and second historically only to the Soviet Union under Stalin. Black men born between 1965 and 1969 have been more likely to end up in prison than graduate college. The standard progressive narrative about this is that the incarceration rate stems from prison sentences due to nonviolent drug crimes and that system morphs into a system of racist social control. Michelle Alexander’s The New Jim Crow: Mass Incarceration in the Age of Colorblindness has been the go to source for that point of view.
There is a major hole in this account: only roughly 20-25 percent of U.S. prisoners are in jail on drug charges. If this was whittled down to only the non-repeat, nonviolent user who wasn’t involved in drug dealing, the number is only four percent. Of course, even that number is too high but it is important to note more than half of people in prisoners have been convicted or charged with violent offenses (41 percent) or property crimes (17 percent). Meaning even if prison doors flew open for all those inside for drug charges, which is perfectly reasonable, the U.S. would still have the world’s highest prison population.
While federal policy gets most of the limelight, such as the 1994 Violent Crime Control and Law Enforcement Act, most prisoners in the U.S., 88 percent, are in state and local prisons. So far from law-and-order being the exclusive privy of Republicans running demagogic national campaigns with Nixon’s Southern Strategy, most elected officials involved with crime laws are local. States and localities employ the great majority of police officers and spend the about 80 percent of the total money that goes to courts, prisons, and police.
As William J. Shultz describes in The Collapse of American Criminal Justice, in the generation prior to the very punitive turn criminal justice took in the later stages of the 20th century there was a generation long lenient turn where prisoner per homicide plummeted 60 percent nationwide. Just before it began to rise, in the early 1970s the U.S. imprisonment rate was fewer than 100 per 100,000. Before 1980 the country’s record was 137. This began to shift in the 1970s. When Reagan took office in 1980 the total prison population was 329,000. By the time he left office eight years later the population practically doubled to 627,000.
Again this was a reaction to something real. Crime exploded in the 1960s. From 1960 to 1980 the homicide rate more than doubled to 10.7 per 100,000. Along with this the property crime rate trebled and the overall violent crime roughly quintupled during the course of the wave. The incarceration rate steadily increased reaching 1000 in 2008 then falling from there to a still astronomical 810 in 2019. While plenty of politicians no doubt used implicit and outright explicit racial dog whistles to get elected, the greatest punitive policies were passed in the 1990s, not in response to the Civil Rights movement in the 1960s.
Contrary to popular belief the overall crackdown had the support of much of the African American community. As Michael Javen Fortner’s Black Silent Majority: The Rockefeller Drug Laws and the Politics of Punishment and James Forman Jr.’s Locking up our Own: Crime and Punishment in Black America explain, when it came to issues such as drug legalization and harsher prison sentences local black communities, living amidst a storm of rising crime and violence, supported law-and-order policies.
What accounted for the sharp rise in crime? An argument brilliantly flushed out by John Clegg and Adaner Usmani in their 2019 essay for Catalyst titled ‘The Economic Origins of Mass Incarceration’ explains that the roots of the crime wave are in the unique character of the U.S. agrarian transition. Namely, the U.S. industrialized without a large domestic rural-to-urban migration. Where in countries like Britain and Germany it was the displaced peasantry that provided the army of industrial workers, in the U.S. it was actually the same surplus of European peasants who as immigrants provided the labor for industrialization in the 19th and early 20th centuries while small farming continued to grow in the U.S. into the 20th century.
American industry began to absorb its rural interior during World War I then further when the first restrictions of European immigration went into effect in 1924. Obviously the cheapest source of domestic labor, and closest equivalent to a peasantry, were African-American sharecroppers. The initial wave of the Great Migration led to the collapse of sharecropping in the South and thereby to the second and larger wave in the 1940s and 1950s. The collapse of farming employment in the South was huge: in 1910 almost half of working age black men in the U.S. were employed in agriculture. In 1960, it was less than 8 percent.
As Clegg and Usmani point out, the urban labor markets these migrants stepped into couldn’t replace these jobs. Instead it was a period of government sponsored suburbanization, deindustrialization, and capital flight from cities. As Thomas J. Sugrue describes in The Origins of the Urban Crisis: Race and Inequality in Postwar Detroit, in cities like Detroit deindustrialization actually began in the 1950s as industry moved to the Sunbelt. It was large cities that saw the largest increase in violence.
A prime example of capital flight can be seen in the Bronx. Starting with the Cross Bronx Expressway, built between 1948 and 1963, perhaps the most destructive urban project of Robert Moses’ gruesome career, carving a wedge through a dozen neighborhoods and built mainly to bring traffic through the Bronx to the Westchester suburbs rather than into the Bronx, the area was dotted with highways. The Major Deegan Expressway, the Sheridan, the Sawmill, the Bruckner, all this building displaced thousands of residents and tore through commercial streets. The overall effect was that from the mid-1940s to the mid-1970s Nassau County, a single suburban county on Long Island received more home loans than all of New York City combined (162,669 to 146,691). Next store Suffolk County received 76,543 loans while the Bronx got 9927. Westchester received nearly three times that amount (29,660). The Bronx was soon a symbol of burnt out urban decay.
All of this, combined with the sheer size of the Boomer generation, which meant more young men exposed to these elements, was particularly disastrous for the black working class nationally. Around a quarter of low-skilled black men between the ages of eighteen and fifty were neither in employment nor school in 1960 and this number would rise over the next decade. Not that the white working class was unaffected- during the punitive turn the white incarceration rate increased just as rapidly as the black rate.
This leads to the other side of Clegg and Usmani’s argument, namely the general weakness of the American working class, partly due to racial and geographical divisions, with much of the white working class moving to the suburbs, which to some extent stem from this period and persist to this day. The inability of the working class, partly due to racial and geographical divisions, to demand and enact social reforms that addressed crime at its roots at the federal level, the only level from where it is truly possible to address it, meant that individual states were left to fight violence on the cheap. Much is made about the financial cost of incarceration yet given that this cost is only spent on the small percentage of the population in prison it is significantly less than universal social programs that would have helped reduce the prison population in the first place. A study earlier this year in the journal PLOS ONE found that arrests significantly declined in the three years after the Affordable Care Act was passed, with a 19-29 percent decrease in violence-related arrests in counties that expanded Medicaid eligibility. The U.S. has the lowest ratio of social spending to punitive spending as a share of GDP of any developed country.
Crime would start its long decline in the early 1990s. The reasons for the declined are varied and debated: the crack epidemic burning out, the ageing of the Boomer population, the rise of statistical policing. In his treatise on New York: The City That Became Safe, Frankin E. Zimring found that roughly 50 percent of New York’s crime drop, the largest and longest of any American city, cannot be conclusively accounted for by any particular cause.
It is perhaps likely that some of the unique mid-century conditions mean that subsequent increases in crime will not match the previous high. However, in other respects, some conditions persist. There is still a shoddy welfare state, capital flight, and deindustrialization. As the disruption of the pandemic started crime rising the same solutions are again bubbling to the surface. Eric Adams was elected mayor of New York largely on a law-and-order platform. Joe Biden is calling on spending $13 billion to hire 100,000 more police officers over the next five years. The House of Representatives recently passed, with a large majority, a bill that would give $60 million a year for five years to local police budgets that are already the largest in the world. ‘Defunding the Police’ was never seriously put in practice but efforts to shift even some funding from police budgets to social programs have hit a wall. Without a resurgence of resistance from below we could be facing yet another generation locked up.
|
<urn:uuid:8e8dd5ec-b506-4b6b-8fc8-4dd89f2f403f>
|
CC-MAIN-2024-51
|
https://www.counterpunch.org/2022/10/06/locked-up-crime-and-punishment-in-america/
|
2024-12-04T16:00:58Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00045.warc.gz
|
by
|
2.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.999307
|
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"2.0"
]
}
|
Abstract
Preconditioning nerve injuries activate a pro-regenerative program that enhances axon regeneration for most classes of sensory neurons. However, nociceptive sensory neurons and central nervous system neurons regenerate poorly. In hopes of identifying novel mechanisms that promote regeneration, we screened for drugs that mimicked the preconditioning response and identified a nociceptive ligand that activates a preconditioning-like response to promote axon outgrowth. We show that activating the ion channel TRPV1 with capsaicin induces axon outgrowth of cultured dorsal root ganglion (DRG) sensory neurons, and that this effect is blocked in TRPV1 knockout neurons. Regeneration occurs only in NF200-negative nociceptive neurons, consistent with a cell-autonomous mechanism. Moreover, we identify a signaling pathway in which TRPV1 activation leads to calcium influx and protein kinase A (PKA) activation to induce a preconditioning-like response. Finally, capsaicin administration to the mouse sciatic nerve activates a similar preconditioning-like response and induces enhanced axonal outgrowth, indicating that this pathway can be induced in vivo. These findings highlight the use of local ligands to induce regeneration and suggest that it may be possible to target selective neuronal populations for repair, including cell types that often fail to regenerate.
Significance Statement
After injury or neurodegenerative disease, axons need to regenerate to restore function. Unfortunately, no current therapies achieve this goal. We performed a drug screen in adult sensory neurons to identify agents that effectively reprogram neurons into a progrowth state. We demonstrate that capsaicin, a TRPV1 agonist, activates a pro-axon growth program. This mechanism requires calcium influx and PKA activity and leads to the activation of the pro-regenerative transcription factor CREB. Hence, activation of ion channels can promote axon regeneration, an exciting finding, since many ion channels are druggable targets. Moreover, these findings suggest an approach for enhancing axon regeneration in selective populations of neurons.
Introduction
Axon regeneration is required to restore function after nervous system damage. CNS neurons are notoriously regeneration-resistant, and even some subtypes of peripheral nervous system (PNS) neurons have a decreased capacity to regenerate. Identifying strategies to improve regeneration of otherwise regeneration-resistant neurons could be beneficial after CNS or PNS damage.
After injury, local signaling and cytoskeletal rearrangement establishes new growth cones (Bradke et al., 2012). This step is necessary but not sufficient for long-distance regeneration. Most dorsal root ganglion (DRG) neurons initiate a robust pro-regenerative transcriptional program that reprograms neurons into a regenerative state (Tedeschi, 2011). Prior activation of this program by a conditioning lesion removes that delay and accelerates regeneration following a second test lesion (McQuarrie and Grafstein, 1973; McQuarrie et al., 1977; Smith and Skene, 1997). This preconditioning effect results from activation of the pro-regenerative program by the conditioning injury so that, at the time of the second injury, neurons are already in a pro-regenerative state. Mimicking the preconditioning response is an exciting therapeutic strategy to enhance regeneration, particularly in regeneration-resistant neurons. The cAMP stimulator forskolin was the first discovered agent with this capacity (Kilmer and Carlsen, 1984). Further studies determined that elevating cAMP/PKA signaling not only stimulated regeneration of sensory neurons on growth-permissive substrates, but also stimulated regeneration over inhibitory substrates as well as into the CNS in vivo (Cai et al., 1999; Qiu et al., 2002; Gao et al., 2004). Mechanistically, PKA phosphorylates CREB to induce a pro-regenerative transcriptional program (Cai et al., 2002; Gao et al., 2004). Drugs that manipulate these existing pro-regenerative pathways offer an exciting strategy for nervous system repair.
We set out to perform a screen to identify drugs that mimic preconditioning in cultured adult sensory neurons. Importantly, we sought drugs that work in the absence of injury. Traditionally, regeneration screens apply drugs after injury and assess growth over inhibitory substrates. This strategy has successfully identified signaling cascades such as the PKC and AKT pathways, as well as drugs that alter microtubule density and dynamics (Gao et al., 2010; Samara et al., 2010; Usher et al., 2010). However, these screens were not ideal for finding drugs that mimic the preconditioning phenomenon in the absence of injury. First, the drugs were present as the axons were growing, so it was difficult to know whether these drugs (a) act locally at the growth cone to promote outgrowth or (b) mimic preconditioning to activate the pro-regenerative program. Second, because dissection of DRG neurons from the animal is an injury, the drugs were competing with the endogenous injury-signaling program. Hence, the drugs would need to enhance regeneration beyond the natural injury stimuli to be identified. As an alternative approach, we sought to design a screen in which drugs would be applied in the absence of injury signaling and before the period of axonal outgrowth. To achieve this, we used our previously described assay in which compounds can be applied to neurons in the absence of injury and washed out, and neurons can be replated to initiate new neurite outgrowth (Frey et al., 2015). This allows us to distinguish between the activation phase and growth phase of axonal outgrowth and so identify drugs that mimic preconditioning and “reprogram” uninjured DRG neurons into a regenerative state.
After screening 480 test compounds, we discovered that TRPV1 agonists mimicked preconditioning. Capsaicin upregulated the pro-growth transcription factor phosphorylated CREB and induced PKA-dependent axon outgrowth. Local application of capsaicin to the sciatic nerve also induced axon outgrowth, indicating that TRPV1 activation within the axon can induce this signaling pathway. This demonstrates that ion channel ligands can target selective populations of neurons for regeneration. Furthermore, these results illustrate the utility of this assay in identifying novel pro-regeneration drugs that function in vivo.
Materials and Methods
Animals
Adult CD1 mice were purchased from Charles River. TRPV1 knockout (KO) mice (Caterina et al., 2000) were provided by Dr. Robert Gereau of Washington University in St. Louis. Both male and female mice were used. Mouse husbandry was performed under the supervision of the Division of Comparative Medicine at Washington University.
Primary DRG neuron culture
DRG neurons were cultured as described (Frey et al., 2015). Briefly, all DRG were dissected from adult mice and incubated in 0.35 mg/ml Liberase Blendzyme (Roche), 10 mg/ml bovine serum albumin (Sigma), and 0.6 mg/ml DNase (Sigma) for 15 min, followed by 0.05% trypsin-EDTA (Invitrogen) for 15 min at 37°C. Neurons were dissociated in DMEM (Invitrogen) media containing 10% FBS (Invitrogen), 100 U/ml penicillin, and 100 µg/ml streptomycin (Invitrogen) and plated on culture dishes or glass chamber slides coated with 10 mg/ml of each PDL and laminin (Sigma). Neurons were maintained at 37°C with 5% CO2. Media was changed on day in vitro 1 (DIV1), and 4 and 10 µm AraC (Sigma) was added.
Drug treatment for axon regeneration screen
ICCB Known Bioactives Library (Maxene Iligan) was provided from the high-throughput screening core at Washington University in St. Louis. This library contains 480 drugs dissolved in DMSO. Drugs were diluted in media and applied at 1:5000 and 1:1000 dilutions. This gave final concentrations for most drugs between 1 and 30 µm. DMSO and 1 µm Nocodazole (Sigma) were used as negative and positive controls, respectively (Valakh et al., 2015). Ten negative and positive controls were included on each 96-well plate. Nocodazole-treated wells were normalized to DMSO-treated wells from the same plate to control for plate-to-plate variability. If nocodazole failed to induce robust neurite outgrowth, all data from that plate were excluded, and those compounds were tested on new plates from a fresh culture. Over the entire screen, DMSO-treated neurons had a mean neurite length of 281 ± 29 µm/neuron compared to nocodazole-treated neurons, which extended neurites to 1000 ± 85 µm/neuron.
Capsaicin treatment
Drugs were applied as described in the figures. Capsaicin (10 µm, ApexBio or Cayman Chemical) was applied for 10 min or 24 h. Inhibitors (capsazepine, Cayman Chemical; EGTA, Sigma; H89, Sigma) were pretreated for 10–30 min before capsaicin treatment. All inhibitors were present during capsaicin treatment. H89 was also present during the rest of the 24-h activation phase. All drugs were removed immediately before replating. For phospho-CREB immunostaining, capsaicin was removed 20 min before fixation. For in vivo experiments, surgifoam was dissolved in 200 µm capsaicin or DMSO and applied to the sciatic nerve.
Sciatic nerve surgeries
Mice were anesthetized with isofluorane. The surgical site was shaved and cleaned with betadine solution. A small incision was made along one thigh, and the sciatic nerve was exposed. Surgifoam was applied or the nerve was crushed. For nerve crush, number 5 forceps were used to crush the nerve for 40 s (two 20-s orthogonal crushes). After 2 d, all mice were sacrificed, and L4–6 DRG were collected for culture.
Replating assay
After drug treatment, neurons were washed with DMEM, then treated with 0.025% Trypsin-EDTA for 5 min at 37°C. Neurons were then dissociated and pipetted up and down to strip off axons before being replated onto PDL/laminin-coated 96-well plates (for screen) or glass chamber slides (for manual assay) in culture media.
Immunocytochemistry and dye staining
After treatment, cells were fixed with 4% paraformaldehyde (Electron Microscopy Services) in PBS containing 0.1% Triton (PBST) for 20 min at room temperature. Neurons were blocked in PBST containing 10% normal goat serum. Primary antibody was incubated overnight at 4°C, washed 3 times with PBST, incubated in secondary antibody for at least 1 h at room temperature, and washed again with PBST before being coverslipped with Vectashield (Vector Laboratories). Commercial antibodies used were as follows: mouse anti-Tuj1 (Covance, 1:500; RRID: AB_2313773), rabbit anti-pCREB (Cell Signaling Technologies, 1:500, RRID: AB_2561044), rabbit anti-NF200 (Sigma, 1:500, RRID: AB_477272), goat anti-mouse AF488 (Life Technologies 1:1000, RRID: AB_138404), and goat anti-rabbit Cy3 (Jackson Immuno, 1:1000, RRID: AB_10563288). SCG10 antibody was purified from anti-SCG10 rabbit antiserum (Novus Biologicals) using the SulfoLink Kit (Thermo Fisher). Ethidium homodimer (2 µM, Sigma) and TMRM (50 nM, Sigma) were incubated for at least 15 min before imaging.
Imaging and data analysis
For SCG10 and phospho-CREB, cells were imaged on a Leica DMI 4000B Confocal microscope using 20× or 40× oil objectives. Images are maximum projections of confocal stacks. Identical confocal settings were used for samples within an experiment. Mean intensity of SCG10 in the soma or phospho-CREB in the nucleus was quantified using ImageJ to determine the mean gray value and normalized to the negative control (DMSO) within each experiment. 50–100 neurons were imaged for each group per experiment. For manual axon outgrowth, at least 100 neurons were imaged per group per experiment using a Leica DFC7000T color fluorescence camera. Neurite length was quantified by tracing the longest neurite from each cell using the NeuronJ plugin for ImageJ (Meijering et al., 2004; RRID: SCR_002074). For NF200 experiments, NF200 immunostaining was imaged in addition to βIII-tubulin. NF200 intensity and neurite length were analyzed for at least 300 neurons per experiment and classified as NF200 positive or negative. Cells with intermediate NF200 intensity were excluded from analysis. For the axon regeneration screen, plates were imaged on the Operetta High-Content Imaging System (PerkinElmer) at 20× magnification. ∼50 images were taken from each well. Images were processed in Cell Profiler (Carpenter et al., 2006; RRID: SCR_007358). We generated a pipeline to count cells using Hoechst staining. Neurons were identified as nuclei that were βIII-tubulin positive. This yielded total cell and neuronal cell counts. The area of the somas was subtracted from the βIII-tubulin channel so that only neurites would be quantified. Cell Profiler then quantified the total neurite length in each image. Mean neurite length was calculated from the total neurite length from all neurons in each well then divided by the total number of neurons from the same well. This was then normalized to the neurite outgrowth from negative controls. Cell counts were used to rule out drugs that induced toxicity in the screen. Ethidium homodimer and TMRM were also imaged on the Operetta High-Content Imaging System. At least 100 neurons were imaged from each condition to assess cell health. TMRM intensity was quantified similarly to phospho-CREB and SCG10 immunostaining. For viability, DRG neurons were identified and counted in bright-field images. Cells that were positive for ethidium homodimer were labeled “dead.” For in vivo axon regeneration, nerves were stained for βIII-tubulin and SCG10 and imaged on the Leica DMI 4000B Confocal using the 20× oil objective. The regeneration index was measured as the distance where SCG10 intensity was 50% of the level at the injury site, as we have previously described (Shin et al., 2012a, 2014).
Experimental design and statistical analysis
Previous studies have indicated that a sample size of at least 3 independent experiments is required to detect significant changes between control (DMSO) and experimental conditions, assuming α = 0.05. One independent experiment is defined as a single DRG culture. All conditions were tested in neurons from the same culture; therefore all experimental conditions were compared to their control counterparts. For in vivo experiments, 14 mice were used. Half were treated with DMSO and half were treated with capsaicin. All data are shown as mean ± SEM. Student’s t test, one-way ANOVA with Tukey post hoc test, and two-way ANOVA with Bonferroni post hoc test were used to determine if differences were statistically different. Student’s t test was performed on the following data: Figs. 1G (paired), 2C (paired), 4B (paired), 8C (unpaired). One-way ANOVA with Tukey post hoc test was performed on: Figs. 1E, 3B, 3E, 6C, 7C, 8C. Two-way ANOVA with Bonferroni post hoc test was used with Figs. 1H, 2D, 3C, 3F, 4B, 4C, 5C, 6D, 7D, 8D, 9D . In figures, *, **, and *** indicate p-values <0.05, <0.01, and <0.001, respectively. Exact p-values are given in the text.
Results
An automated cellular imaging assay identifies pro-regenerative drugs
We previously characterized an in vitro axon regeneration assay capable of identifying drugs that mimic preconditioning and activate the pro-regenerative program (Frey et al., 2015). Adult DRG neurons are cultured for 4–6 d to allow the axon regeneration program activated by the initial dissection to turn off (Frey et al., 2015). Drugs are applied for 24 h (activation phase), then are washed away, and neurons are replated and grown for 18 h (growth phase) in the absence of drug (Fig. 1A). This allows us to identify drugs that mimic preconditioning and reprogram neurons into a regenerative state rather than drugs that act locally to regulate growth cone and cytoskeletal dynamics. We used this assay to screen ∼480 drugs for their ability to induce axonal outgrowth.
Previously, we discovered that nocodazole, a drug that disrupts microtubules, activates the pro-regenerative kinase DLK and induces robust regeneration (Valakh et al., 2015). Thus, we used nocodazole as a positive control (Fig. 1A–D). Nocodazole controls were normalized to DMSO controls from the same plate to control for plate-to-plate variability. Nocodazole consistently induced robust growth on each plate, giving a mean value of 3.9-fold over DMSO for the entire screen (Fig. 1D, n = 24 plates, df = 46, p = 0.0001). We identified several drugs that would be expected to induce regeneration. These included cytoskeletal disrupting agents such as podofilox, mebendazole, febendazole, and nocodazole, as well as the PKA stimulator, forskolin (data not shown). We also identified capsaicin and arvanil, 2 TRPV1 agonists, that induced a 2.5- and 2.1-fold increase in neurite outgrowth, respectively (Fig. 1E, df = 6, capsaicin p = 0.01, arvanil p = 0.04). Because TRPV1 had not previously been linked to promoting axonal regeneration, we explored this finding further.
Our automated assay allowed us to screen hundreds of drugs, but it has limitations. For example, the pipeline is not able to determine which neurites belong to which neuron. Instead, the neurite length analysis normalizes total neurite length to the total number of neurons, leaving us blind to the behavior of individual neurons. This is of particular import, because TRPV1 is expressed in only a subset of nociceptive neurons. To get a clearer picture of how the population of neurons responded to these drugs, we measured mean neurite length of individual neurons. Capsaicin induced a ∼1.7-fold increase in mean neurite length (Fig. 1F,G, df = 4, p = 0.04). While not all neurons extended long neurites, capsaicin shifted the distribution of neurons with neurites (Fig. 1H): fewer cells had short neurites, <50 µm (df = 12, p = 0.001) and more neurons had longer neurites, >150 µm (df = 12, p = 0.001, Fig. 1I). We conclude that capsaicin induces axon outgrowth in a subset of neurons.
Acute capsaicin induces axon outgrowth in vitro
Capsaicin is an agonist for the nociceptive ion channel TRPV1 (Caterina et al., 1997). TRPV1 opens transiently in response to stimulation. Therefore, we tested whether transient capsaicin exposure was sufficient to promote outgrowth. Neurons treated with capsaicin for only the first 10 min of the activation phase showed a ∼1.7-fold increase in axon outgrowth compared to DMSO (Fig. 2A–C, df = 4, p = 0.007). This was similar to the increase we saw when capsaicin was applied for 24 h. The increased neurite length was apparent as a shift in the distribution of neurons with long neurites (Fig. 2D). Indeed, capsaicin induces a decrease in neurons with short neurites and an increase in neurons with long neurites (Fig. 2E, df = 12, p = 0.002, 1, 0.002 for each bin, respectively). These results are consistent with a role of an ion channel such as TRPV1 in stimulating a preconditioning-like response.
TRPV1 is required for capsaicin-induced outgrowth
Capsaicin is a well-known agonist for TRPV1. Therefore, we hypothesized that TRPV1 mediates capsaicin-induced axon outgrowth. We first tested this hypothesis using the well-validated TRPV1 inhibitor capsazepine (CPZ). CPZ was added 10 min before capsaicin and left on through the 10-min capsaicin treatment. After capsaicin treatment, both drugs were washed out. Neurons were replated 24 h later and grown for an additional 18 h. CPZ blocked the 2.4-fold increase in outgrowth caused by capsaicin (Fig. 3A,B, df = 9, vehicle p-value = 0.0005, CPZ p-value = 0.6, vehicle vs. CPZ capsaicin p-value = 0.008). Capsazepine also blocked the shift in distribution of neurons with longer neurites (Fig. 3C, df = 27, vehicle p-value = 0.0001, 1, 0.0001 and CPZ p-value = 0.09, 1, 1 for each bin respectively). To further assess the requirement for TRPV1, we tested DRG neurons from TRPV1 KO mice. Physiologic responses to capsaicin are completely absent in these mice (Caterina et al., 2000). DRG neurons from wild-type and TRPV1 KO mice were treated with capsaicin for 10 min and replated (as in Fig. 2A). Genetic loss of TRPV1 completely blocked capsaicin-induced outgrowth as assessed by mean neurite length (Fig. 3D, E, df = 9, WT p-value = 0.006, KO p-value = 1, WT vs. KO p-value = 0.009) as well as the population shift toward having longer neurites (Fig. 3F, df = 27, WT p-values = 0.0004, 1, 0.002, KO p-values = 1, 1, 1, WT versus KO p-values = 0.0004, 1, 0.004 for each bin, respectively). Importantly, TRPV1 KO DRG neurons grew normally in culture following dissection from the animal and were indistinguishable from wild-type neurons before drug treatment (data not shown) indicating that they have the ability to grow after injury. Therefore, the lack of outgrowth following capsaicin is not due to an inability of TRPV1 KO DRG neurons to grow. This demonstrates that axon outgrowth following capsaicin treatment is via TRPV1 activation.
Capsaicin induces axon outgrowth in nociceptive neurons
Having demonstrated that TRPV1 is required for capsaicin-induced outgrowth, we next sought to determine if axon outgrowth was occurring in nociceptive neurons. We used neurofilament 200 (NF200) immunostaining to classify neurons as large-diameter, non-nociceptive neurons (NF200+; Frey et al., 2015). NF200-negative neurons displayed a 2.9-fold increase in mean neurite length (Fig. 4A,B, df = 23, p = 0.003). NF200-positive neurons did not show a significant increase in neurite length (Fig. 4A,B, df = 23, p = 1 compared to DMSO, p = 0.004 capsaicin NF200+ vs. NF200–). Similarly, NF200– neurons showed a significant increase in the percentage of cells having longer neurites, while NF200+ neurons showed no change (Fig. 4C, df = 45, NF200+ p-values = 1, 1, 1, NF200– p-values = 0.0001, 1, 0.0001, NF200+ vs. NF200– p-values = 0.0001, 1, 0.0001 for each bin, respectively). These findings suggest that capsaicin induces a cell-autonomous pro-regenerative signal within nociceptors.
TRPV1-induced axon outgrowth is not due to toxicity of poorly growing neurons
Nociceptive neurons do not regenerate as well as non-nociceptive neurons, and some reports demonstrate that they upregulate pro-death molecules in response to injury (Kalous and Keast, 2010; Hu et al., 2016; Berta et al., 2017). Furthermore, activation of TRPV1 can ablate TRPV1-expressing neurons and axon terminals (Mishra and Hoon, 2010; Wang et al., 2017). Therefore, we considered the possibility that capsaicin induces cell death via TRPV1 and eliminates poorly growing neurons from the population, thereby artificially skewing the distribution of neurons toward better axonal growth. To address this possibility, we assessed the health of DRG neurons after capsaicin treatment. Neurons were treated as in Fig 2A, but instead of replating neurons after 24 h, they were incubated with ethidium homodimer, a cell death marker. Viability was not affected by capsaicin treatment (DMSO = 88.1% and CAPS = 89.6% viable n = 3, df = 4, p = 0.8). To assess general health, neurons were also loaded with TMRM, a mitochondrial potential dye. Again, mitochondrial potential was not affected by capsaicin treatment (DMSO = 1 and CAPS = 1.01 normalized intensity, n = 3, df = 2, p = 0.8). We conclude that capsaicin is not negatively impacting the health of DRG neurons. This indicates that enhanced outgrowth following capsaicin treatment is not due to loss of poorly growing neurons.
Capsaicin activates a pro-regenerative–like program
The pro-regenerative program works by upregulating pro-growth genes. SCG10 is an excellent regeneration marker because it is upregulated after injury, is specific to regenerating neurons, and is robustly elevated after injury in vivo and in vitro (Mason et al., 2002; Grenningloh et al., 2004; Shin et al., 2012b, 2014; Frey et al., 2015). We found that capsaicin upregulates SCG10 protein levels ∼1.8-fold (Fig. 5A,B, df = 4, p = 0.01), The distribution of SCG10 intensity revealed that only a small subset of neurons upregulated SCG10 (Fig. 5C). There is a decrease in the percentage of neurons with low-level expression (<1.25, df = 12, p = 0.005) and a subsequent increase in the percentage of neurons with robust SCG10 expression (>1.75, df = 12, p = 0.007). This is consistent with TRPV1 being activated in a subset of sensory neurons. Together, the induction of SCG10 and the promotion of axon outgrowth provides both molecular and functional evidence that capsaicin “reprograms” cultured dorsal root ganglion neurons into a regenerative-like state.
Extracellular calcium is required for capsaicin-induced outgrowth
Having demonstrated that capsaicin promotes axon outgrowth, we next sought to define the mechanism by which TRPV1 activation leads to the induction of the pro-growth program. TRPV1 is permeable to both Na+ and Ca2+, and thus its activation depolarizes neurons thereby leading to an increase in intracellular calcium. Calcium is a known mediator of neuronal injury responses; injury triggers a calcium influx that is involved in membrane resealing, growth cone formation, and activation of the regenerative program (Bradke et al., 2012; Cho et al., 2013; Rishal and Fainzilber, 2014). It is unknown whether calcium influx via ligand-gated ion channel activation could mediate a regenerative response. Therefore, we tested whether extracellular calcium was required in this paradigm. Neurons were pretreated with EGTA for 10 min before capsaicin treatment. After capsaicin treatment, both drugs were washed out, and neurons were replated 24 h later and grown for 18 h (Fig. 6A). Chelating extracellular calcium with EGTA completely blocked both the increase in mean neurite length (Fig. 6B,C, df = 6, vehicle p-value = 0.004, EGTA p-value = 1, vehicle vs. EGTA p-value = 0.007) and the shift in population of more neurons having longer neurites (Fig. 6D, df = 18, vehicle p-values = 0.0001, 1, 0.0001, EGTA p-values = 1, 1, 1, vehicle vs. EGTA p-values = 0.002, 0.7, 0.0001 for each bin, respectively). These results indicate that there is a calcium-sensitive pathway downstream of TRPV1 activation that induces the pro-regenerative program. Importantly, EGTA did not affect baseline growth. This shows that EGTA is not blocking outgrowth via nonspecific damage to neurons.
Capsaicin activates the PKA pathway to induce axon outgrowth
The cAMP/PKA pathway is stimulated by calcium influx and is well recognized for its ability to activate axon regeneration (Cai et al., 1999; Neumann et al., 2002; Cooper, 2015). To test whether capsaicin activates the PKA pathway, we assessed phosphorylation of the downstream, pro-regenerative transcription factor CREB. Neurons were pretreated with DMSO or the PKA inhibitor, H89, for 30 min, followed by capsaicin for 10 min. Inhibitors were present during the 10-min capsaicin treatment and for 20 min after capsaicin was removed (Fig. 7A). Then neurons were fixed and stained for phosphorylated CREB. Capsaicin induced a ∼2-fold increase in pCREB that was attenuated by PKA inhibition (Fig. 7B,C, df = 12, vehicle p-value = 0.003, PKAi p-value = 0.1). As with SCG10, pCREB was upregulated in only a subset of neurons (Fig. 7D, df = 27, vehicle p-values = 0.0001, 1, 0.0003, PKAi p-values = 0.1, 1, 1 for each bin, respectively).
Next, we tested the functional consequence of the PKA pathway in capsaicin-induced outgrowth. Neurons were pretreated with either DMSO or H89 for 30 min before the 10-min pulse of capsaicin. After capsaicin was removed, DMSO or H89 was added back (Fig. 8A). 24 h after capsaicin treatment, DMSO and H89 were removed, and neurons were replated and grown for 18 h in the absence of any drug. PKA reduced the 2.4-fold increase in outgrowth (Fig. 8B,C, df = 6, vehicle p-value = 0.0004, PKAi p-value = 0.5, vehicle vs. PKAi p-value = 0.009) and the shift in distribution of neurite lengths (Fig. 8D, df = 18, vehicle p-values = 0.002, 1, 0.0006, PKAi p-values = 0.09, 1, 0.1, vehicle vs. PKAi p-values = 0.2, 1, 0.02 for each bin, respectively). This indicates a role for the PKA pathway in capsaicin-induced axon growth. We propose that capsaicin activates TRPV1 to increase intracellular calcium, stimulating the PKA pathway to induce phosphorylation of CREB and initiation of the pro-regenerative program.
Capsaicin induces regeneration signaling in vivo
Having defined the mechanism by which capsaicin induces axon outgrowth in vitro, we set out to determine if axon growth could be enhanced by activating the pro-regenerative program in vivo. Neurons preconditioned in vivo will exhibit robust growth in a short amount of time, for example 18 h, whereas uninjured neurons will not (Shin et al., 2012a). Indeed, we find that neurons that have been pre-injured display 200 ± 13 µm of growth in 18 h compared to only 32 ± 16 µm from uninjured neurons, a 6.3-fold increase (Fig. 9A–C, n = 3 per condition, df = 5, p-value = 0.0005). This robust increase in axon outgrowth is also observed as a decrease in the percentage of neurons with short axons and a subsequent increase in the percentage of neurons with long axons (Fig. 9D, df = 12, p-value < 0.0001, 1, <0.0001 for each bin, respectively). A common paradigm to determine if drugs induce a similar preconditioning-like response in vivo is to apply drug to the sciatic nerve then isolate DRGs a few days later and assess axon regeneration in vitro (Neumann et al., 2002; Valakh et al., 2015). We used this method to ask two questions: (1) does capsaicin induce a preconditioning like response in vivo? and (2) does capsaicin act locally on axons to induce regeneration? Since TRPV1 is expressed in the sciatic nerve, we applied 200 µm capsaicin directly to the sciatic nerve (Gold et al., 2003; Xing et al., 2012). 2 d later, DRGs were collected and cultured for 18 h to determine if treatment mimicked preconditioning (Fig. 9A). In vivo local capsaicin improved mean neurite outgrowth ∼1.5-fold over vehicle (Fig. 9E,F, df = 12, p-value = 0.004) and shifted a subset of neurons toward having longer neurites (Fig. 9G, df = 36, p-values = 0.008, 1, 0.02 for each bin, respectively). Capsaicin-induced axon outgrowth is not as robust as injury-induced outgrowth. This is expected, since capsaicin is inducing outgrowth in only a small subset of neurons, whereas injury will induce regeneration in most neurons. This finding confirms that the pro-regenerative pathway can be activated by capsaicin in vivo. We further tested whether capsaicin was sufficient to promote axon regeneration in vivo. We repeated the previous experiment but crushed the nerve instead of culturing the DRG 2 d after drug treatment. 24 h after crush, nerves were collected and analyzed. We did not observe improved regeneration in this paradigm (Fig. 9H). The measured regeneration index was 300 ± 71 and 390 ± 68 µm for DMSO and Capsaicin, respectively (df = 6, p = 0.4). These values are similar to what is observed from nerves that are not preconditioned (Shin et al., 2012a). This suggest that either capsaicin is not sufficient to activate enhanced regeneration in this fully in vivo paradigm or that this assay is not sensitive to changes in axonal growth in a small subpopulation of neurons.
Discussion
After injury, long-distance regeneration requires a complex and coordinated pro-regenerative transcriptional program. However, this program has limitations. It is often too slow, and distal targets degenerate before reinnervation is achieved (Gordon et al., 2011). Furthermore, some cell types respond poorly or not at all. The preconditioning phenomenon illustrates that the pro-regenerative program can be augmented to improve regeneration. Activation of the program in DRG neurons by injury accelerates regeneration of the peripheral axon and allows for regeneration of the normally regeneration-resistant central axon (McQuarrie and Grafstein, 1973; McQuarrie et al., 1977; Richardson and Issa, 1984). We wished to identify pharmacological agents that mimic the preconditioning program in the absence of injury in hopes of promoting regeneration in regeneration-resistant neurons. We cultured neurons for several days to allow the initial injury signaling cascade, which is activated by dissection of the neurons from the animal, to turn off (Frey et al., 2015). This allowed us to test a drug’s ability to induce a regeneration response in the absence of ongoing injury signaling. This was an important element of our assay, because injury activates all pro-growth pathways and induces extremely robust regeneration. By replating neurons to assess axonal growth, we were also able to separate the “activation” phase from the “growth” phase and expose neurons to drugs only in the activation phase. This allowed us to select for drugs that induce a pro-regenerative program as opposed to drugs that might facilitate growth cone formation or cytoskeletal assembly. In this process, we discovered a method to stimulate known pro-regenerative pathways with a nociceptive ligand. Excitingly, nociceptive neurons are known to be poor at axon regeneration (Leclere et al., 2007; Kalous and Keast, 2010). The concept of targeting specific neuronal populations for regeneration via ligand activation may be generalizable.
Previous studies discovered that electrically stimulating neurons upregulated regeneration-associated genes and improved neurite outgrowth during stimulation (Goldberg et al., 2002). More recently, this technique has been tested in vivo and shown to mimic the preconditioning response (Senger et al., 2018). We discovered that the TRPV1 agonist, capsaicin, mimicked the preconditioning paradigm and induced axon outgrowth. This is unlike previous studies, since we can transiently stimulate a single receptor to mimic preconditioning. Stimulation of TRPV1 induces calcium influx and subsequent activation of PKA and the pro-regenerative transcription factor CREB. Furthermore, we show that local application of capsaicin to the sciatic nerve is sufficient to mimic a conditioning lesion. This indicates that activation of TRPV1 along the nerve can stimulate this pathway in vivo. Interestingly, we found that not all methods of calcium stimulation induced axonal outgrowth. Indeed, ionomycin fails to induce regenerative signaling or enhance neurite outgrowth (data not shown and Valakh et al., 2015). This suggests that TRPV1 may stimulate a signaling complex that is activated by local calcium influx. Scaffolding proteins can organize large complexes of signaling proteins with ion channels. In this case, the adaptor protein AKAP150 is an interesting candidate, as it can anchor PKA and adenylate cyclase and interacts with ion channels (Dell’Acqua et al., 2006; Efendiev et al., 2010). AKAP150 is expressed in 80% of TRPV1-positive neurons and physically interacts with TRPV1 (Schnizler et al., 2008; Efendiev et al., 2013). Therefore, it is possible that a TRPV1/AC/PKA/AKAP150 complex exists, and calcium influx from TRPV1 activation could locally activate this signaling module. We hypothesize that TRPV1 activation triggers a local influx of calcium, either directly or indirectly, to stimulate adenylate cyclase. Local cAMP production then activates PKA to turn on a pro-regenerative program via pCREB-dependent transcription.
The desire to regenerate non-nociceptive neurons is obvious. In the absence of these neurons, patients lose the ability to control their body and interact with their environment. The need to regenerate nociceptive neurons is less obvious but could be beneficial for multiple reasons. First, appropriate pain has its place. After injury, pain elicits guarding behaviors so that the injury is protected and given time to heal. In cases where individuals are unable to sense pain, such as diabetic neuropathy, they must monitor themselves for injury. Second, nociceptive neurons play an important role in neuroinflammation and vasodilation after tissue injury that facilitates wound healing (Barker et al., 2006; Chiu et al., 2012). Therefore, restoring function of nociceptors after injury could facilitate wound healing and prevent additional injuries.
Compared to large myelinated neurons, nociceptive neurons do not regenerate well (Leclere et al., 2007; Kalous and Keast, 2010), likely because of higher expression of growth inhibitory molecules as well as an inability to upregulate growth-promoting molecules (Gardiner et al., 2005; Christie et al., 2010). This study suggests that it may be possible to target regeneration-resistant neurons that express TRPV1 to overcome their inability to regenerate. Moreover, a deeper understanding of this pathway may identify methods to promote axonal regrowth from other regeneration-resistant neurons. The CNS does not regenerate after injury, yet it is susceptible to many types of axon injury (trauma, multiple sclerosis, white matter strokes). Interestingly, TRPV1 is expressed in some brain regions (Cavanaugh et al., 2011). If the components of this regeneration pathway are intact within the CNS, then this pathway may be useful for promoting regeneration in regeneration-resistant CNS neurons.
Prior studies have demonstrated that ion channel inhibition can promote axon regeneration (Tedeschi et al., 2016). Our work highlights the potential of extracellular ion channel ligands to activate known pro-regenerative pathways. Indeed, other ligands may induce complementary regeneration pathways and/or stimulate regeneration of additional neuronal cell types. In theory, with the proper complement of agonists, it may be possible to achieve targeted regeneration of damaged neurons while leaving unaffected neurons undisturbed.
Conclusion
We provide evidence that stimulating TRPV1 mimics preconditioning and induces a pro-regenerative program mediated by calcium influx and PKA activation. PKA subsequently leads to phosphorylation of the pro-growth transcription factor CREB and upregulation of regeneration-associated proteins such as SCG10. This is the first example of an ion channel agonist inducing a signaling cascade to initiate regeneration. Ion channels are attractive therapeutic targets and could promote cell type–specific regeneration.
Acknowledgments
Acknowledgments: We thank members of the DiAntonio and Milbrandt laboratories for helpful discussions.
Footnotes
The authors declare no competing financial interests.
This work was supported by funding from the National Institutes of Health Grants NIH NS087562 to A.D. and J.M. and NIH NS065053 to A.D., National Institutes of Health Grant NIH F32NS093962 to E.F., and the Philip and Sima Needleman Student Fellowship in Regenerative Medicine to S.K.G.
This is an open-access article distributed under the terms of the Creative Commons Attribution 4.0 International license, which permits unrestricted use, distribution and reproduction in any medium provided that the original work is properly attributed.
|
<urn:uuid:61a6811f-6063-4c62-84d6-2b4f75830b71>
|
CC-MAIN-2024-51
|
https://www.eneuro.org/content/5/3/ENEURO.0095-18.2018?utm_source=EN&utm_medium=Webpage&utm_campaign=eneuro_blog
|
2024-12-04T16:09:23Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00045.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.984067
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
FP
base
info
about FPbase
help & FAQs
how to cite FPbase
contributing
API
recent activity
how you can help
contact
tools
spectra viewer
microscopes
FP BLAST
FP collections
FRET calculator
explore
SEARCH
advanced search
BROWSE
protein table
interactive chart
lineages
organisms
spectra
references
SUBMIT
submit a protein
submit a spectrum
sign in
Javascript is disabled! Many pages and features of FPbase will not work properly
Sign In
You may sign in with one of your existing third party accounts.
Log in with Google
Log in with Twitter
Or
Sign up
for an FPbase account and sign in below:
Username
*
Password
*
Remember Me
Forgot Password?
Sign In
|
<urn:uuid:459d6f55-9dc8-4007-a6ce-dfd7ee88e044>
|
CC-MAIN-2024-51
|
https://www.fpbase.org/accounts/login/?next=/bleach_comparison/738/
|
2024-12-04T15:08:36Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00045.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.990989
|
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Verschiedene Möbel / Schlafzimmereinrichtung
Tags
- Design 1740–1750
- Publication 1740–1750
Additional data
- Object type
- Collection
- Inventory numberO1899.7
- DimensionsBlattmaß: Höhe: 17,7 cm; Breite: 29,5 cm
Platte: Höhe: 15,2 cm; Breite: 20,5 cm - Marks and Inscriptionsin der Platte signiert, nummeriert und bezeichnet: "2509 / C. Pr. Maj. / Mart. Engelbrecht excud. A. V. / 9" sowie unten von fremder Hand in Blei: "Emanuel Mai, 1898."
- Category
- Druckgrafik/Druckerzeugnisse (Vorlageblätter)
The image of the object is in the Public Domain and free of known restrictions under copyright law, including all related and neighboring rights. You can copy, modify, distribute and perform the work, even for commercial purposes, all without asking permission, but we would kindly ask you to follow the Fair Use Guidelines.
In case of use for research purposes we would appreciate receiving a copy of the publication or a link to the online publication. Please let us know, if you use images of the object and cite them as we recommend below.
Citation recommendation
We are continuously working on making information on the collection objects available. Please note that the data may nevertheless be incomplete or incorrect and may contain outdated or discriminatory language and only a fraction of the estimated 600.000 objects of the collection are online. If you have any questions, comments or suggestions regarding the objects, please do not hesitate to contact us.
|
<urn:uuid:f3493c44-fb13-4f42-8732-3881a93db3b0>
|
CC-MAIN-2024-51
|
https://www.mkg-hamburg.de/en/sammlung/objekt/verschiedene-mobel-schlafzimmereinrichtung/O1899.7/dc00106717
|
2024-12-04T14:49:21Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00045.warc.gz
|
mark
|
1.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.96056
|
{
"abbr": [
"mark",
"mark"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"1.0",
"1.0"
]
}
|
Share O*NET information with your friends and colleagues! Use the links below to share this page on bookmarking or social media sites. (Note: these links will take you to external sites not created or maintained by the U.S. Department of Labor. See our Privacy Statement and Disclaimer for more information.)
Loading...
|
<urn:uuid:47216895-6b68-42ec-bc18-a913ef85958f>
|
CC-MAIN-2024-51
|
https://www.onetcenter.org/share?u=https%3A%2F%2Fwww.onetcenter.org%2Fspanish.html&t=Spanish%20Language%20Resources
|
2024-12-04T16:28:09Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00045.warc.gz
|
by
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.998281
|
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
OER16 conference Flickr Images Reader Edited by snakepliskens April 21, 2016 12:17 am ac.page posted a photo: OER16 conference in Edinburgh, 19-20 April 2016 Share this:Click to share on Facebook (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Twitter (Opens in new window)
|
<urn:uuid:9e8191ba-f64a-4730-9785-110a8f138b9a>
|
CC-MAIN-2024-51
|
https://oer16.oerconf.org/news/oer16-conference-14/
|
2024-12-05T16:50:52Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066355594.66/warc/CC-MAIN-20241205150341-20241205180341-00845.warc.gz
|
by
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.986718
|
{
"abbr": [
"by",
"by"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
]
}
|
Tags: Home and Community community poverty housing Licenses: Open Government Licence - Northwest Territories
|
<urn:uuid:3d39bf48-0510-4456-8240-2cdcd808eae3>
|
CC-MAIN-2024-51
|
https://opendata.gov.nt.ca/dataset/?tags=Home+and+Community&tags=community&tags=poverty&tags=housing&license_id=GNWT
|
2024-12-05T17:46:56Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066355594.66/warc/CC-MAIN-20241205150341-20241205180341-00845.warc.gz
|
by
|
3.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.919865
|
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
]
}
|
Good evening to you all. This is Chad A. Johnston, director of The Peoples Channel, Chapel Hill and Orange CountyÂ’s non-profit public access television station. My brain is a little fuzzy due to the work load over here, so I apologize if I ramble on. We face very troubling times in the telecommunications world right now, and without community input and support, we could loose valuable community resources.
Telephone companies want to enter into the television business, just like cable companies have entered into the telephone business. Phone companies want to offer services which will look just like cable television, and will use public roads or the public right of way (PROW) to deliver these services. Currently, cable companies, which use the PROW to distribute their networks, are required to make an agreement with each municipality and pay “rent†for using this public space. In that rental agreement, technically called a franchise agreement, municipalities can ask for channel space for public, educational and government access. Here in Chapel Hill we’ve have channel 4, 8, and 18. Municipalities also receive money for use of that space and to support the local channels.
Telephone companies have been lobbying very hard to avoid these local franchise agreements; they call it a “barrier to entry.†Though very few municipalities have actually been approached by a new video service provider, Verizon/AT&T and SBC claim that it is too difficult for them to work with local municipalities and that municipalities have too much power. They would rather have a federal or a state franchise agreement to speed their entrance into the market. I suppose this might be alright, however there are a handful of public service obligations that they would love to avoid.
Enjoy watching a County Commissioners or Town meeting on TV?
Well, most of the proposed federal and state legislation does not include channels for government meetings, or the holiday parade, or Phillips Middle School football games, and if they do provide channel capacity, they donÂ’t provide mechanisms for funding or for the use of the PROW.
Who do you call if you have a cable complaint? You call your local municipality and speak to the cable company liaison.
Well, not under the phone companyÂ’s model. You would have to call the FCC or your state Public Utility Commission. Charlotte receives nearly 3,000 cable complaints a monthÂ…IÂ’m pretty sure our state PUC doesnÂ’t have the resources to respond to that many citizens.
At least the phone companies will provide competition and offer services to the whole municipality. Right?
Actually, telephone companies have no interest in “build out†requirements. In fact the state legislation that passed in Texas has no requirements to offer services to all citizens, letting the phone companies redline neighborhoods. Language used by AT&T internally stated that they would first offer service only to those “high value†neighborhoods, and rates in Texas have actually risen since the entrant of a new provider.
These are just a couple of the issuesÂ…and believe me, it only gets worse.
Currently, many of the federal bills are stalled because of the election year. Because of this, phone companies are hitting the state level, and their coming to NC.
Please join members of SPAT (Save Public Access Television), The Alliance for Community Media, and local community media experts at a workshop and public forum on Saturday, March 25, 10-12 noon at ERUUF (Eno River Unitarian Universalist Fellowship) at 4907 Garrett Rd, Durham to discuss the future of public, educational, and governmental (PEG) access. Join us to learn more about these issues and to discuss what can be done to protect these resources at the local and Federal level.
If you cannot make it to the forum, please come and let your voice be heard at the state legislature. The Revenue Laws Committee, (http://www.ncleg.net/committees/) a non standing committee of the NC legislature, was charged with looking into state video franchising. If legislation is introduced like that in Texas or South Carolina it could potentially cut channel capacity and/or funding for local Public, Educational, and Governmental access (PEG) centers like The Peoples Channel, UNC Student Television and Raleigh Television Network. The committee has heard from many interests in the telecommunications industry, but they haven't yet heard from the people that use and value these PEG centers.
Please join SPAT, the Alliance for Community Media, NC League of Municipalities, local non-profit organizations and concerned citizens April 7th at 10am and let the legislature know that you care about these resources. We have been told that if we don't pack this room, we may not have a chance. April 7th, North Carolina General Assembly, Legislative Building, 16 West Jones Street, Raleigh, NC 27601 at 10am. We are currently organizing car pools from The Peoples Channel. If you need a ride, have a large vehicle and can help transport people or have any further questions, please go to www.thepeopleschannel.org or contact Chad Johnston via email at email@example.com or 919.960.0088.
If you cannot make it to either meeting, we would love it if you could write a letter about your experience with TPC or your local PEG center. This is especially true if you work for a community group or non-profit that has benefited from TPC's services. I will submit these letters with my written testimony and will really help with our campaign.
Thank you for reading through this long postÂ…and please help us preserve local control, equal access and local community media.
Warm regards,
Chad Johnston
Issues:
|
<urn:uuid:7a3347ff-2088-44ce-88c9-d0f8824fa87f>
|
CC-MAIN-2024-51
|
https://orangepolitics.org/comment/18361
|
2024-12-05T16:50:58Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066355594.66/warc/CC-MAIN-20241205150341-20241205180341-00845.warc.gz
|
by-nd
|
3.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.998042
|
{
"abbr": [
"by-nd",
"by-nd"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"3.0",
"3.0"
]
}
|
I have reviewed a lot of letters sent to the Chapel Hill Town Council about whether or not the Town should move forward on expansion of our Library. Letters fall on either side of the issue, but in letters against expansion, I see a theme. Writers often want it known that they are a fan of books, but they don't want to pay more taxes toward making more available to Library users.As a member of the Library Board of Trustees, I want to address this issue, but first, I must make an admission. I am not particularly a fan of books. I have a high school diploma and a college degree or two, so I can read books when forced. I have even read a few for pleasure, but generally I read so sporadically and slowly that I have to renew a book once or twice in order to finish before the due date. My wife has filled my house with books for herself and our children, but the shelf space designated for my library consists of a meager 24 inches. I just don't get excited about books.Why would a person who is so apathetic about books sit on the Chapel Hill Public Library Board of Trustees? Why would he be passionate about the expansion of that library, even when the expansion will be reflected in his tax rates? Well, the Library, though it houses a very extensive literature collection, is so, so much more than a location for free books. The Library provides a laundry list of vital services to all citizen of Chapel Hill. Those services are offered to everyone and important to most, but their need is even more pronounced among under served populations and during times of economic stress.The Library provides access to resources otherwise unavailable to low-income households. Chapel Hill, like any community, is home to many individuals with limited or no access to the Internet or on-line services. You may have heard of the digital divide, which refers to the disadvantages faced by those without access to digital and information technology. Without that technology, individuals face communication roadblocks and a lack of skills or knowledge required in nearly every workplace today. The Library works to bridge this gap by offering computer classes, Internet access, and links to career opportunities, government services, legal resources, and non-profit agencies.The Library also provides social and intellectual opportunities for children and adults. Interaction with others and exposure to reading and culture provides early and measurable advantages for children but is also beneficial to the social and emotional health of adults. Kidzu and the Morehead Planetarium are great places for kids, but the cost of taking a family may be too great for some. Programs offered by the Library such as weekly story times, book clubs, and movie nights give families free opportunities for fun and a chance to socialize with other families who live in town. Adult programs sponsored by the Friends of the Chapel Hill Public Library provide opportunities for anyone to meet new friends and contacts while learning a new hobby or talking about a much loved book. The Library provides access to a community's shared culture. OK, I'm not the book's biggest fan, but I do accept that a vast amount of floor space in our new facility will be dedicated to the printed page. It is important for everyone's mental, social, and emotional development to be linked in to a larger culture. I have yet to accept that the television is an acceptable device for staying linked to that culture. Books (printed, audio, and digital), CDs, DVDs, magazines, and newspapers are all important media for allowing people to stay connected to what is going on in their community. Not everyone in Chapel Hill has the money in their monthly budget to access these resources. If you're rich, poor, employed, unemployed, homeless, or simply, not from around here, all of these resources are available any time at the Library.So, why is it time to expand the Library? Is it because we need more books? Well, given our amazing circulation, yes, partly, but it is also because Chapel Hill citizens need the services of the Library. They need them in a way that the current building will soon be unable to provide. Don't support the Library expansion because you like books. Support the Library expansion because you like Chapel Hill. (Submitted to the Chapel Hill News on February 1, 2010.)
Issues:
|
<urn:uuid:f131fa2f-70c9-4759-94c4-7e9732de8f7f>
|
CC-MAIN-2024-51
|
https://orangepolitics.org/comment/38206
|
2024-12-05T15:51:32Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066355594.66/warc/CC-MAIN-20241205150341-20241205180341-00845.warc.gz
|
by-nd
|
3.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.999493
|
{
"abbr": [
"by-nd",
"by-nd"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"3.0",
"3.0"
]
}
|
Pkgcheck Warnings
- All Versions
- UnstableOnly
for arch: [ amd64 ], all versions are unstable: [ 1.2-r2 ]
- 1.2-r2
- PotentialStable
slot(0), stabled arches: [ ppc, x86 ], potential: [ ~amd64 ]
Pkgcheck is used regularly to generate QA reports. Pkgcheck is a pkgcore-based QA utility for ebuild repos.
|
<urn:uuid:9e4a2e9b-cd62-4572-8faa-de23a7448b71>
|
CC-MAIN-2024-51
|
https://packages.gentoo.org/packages/x11-misc/mgm/qa-report
|
2024-12-05T17:24:03Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066355594.66/warc/CC-MAIN-20241205150341-20241205180341-00845.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.973754
|
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Rosa Heart 'n' Soul 'ORApaymel'
Common Name(s):
- Phonetic Spelling
- RO-zuh
- Description
-
Bred by Pierre Orard in France, the Heart 'n' Soul (the Trade Designation for 'ORApaymel') was introduced in the United States in 2001 by Weeks Wholesale Rose Grower, Inc.
At first glance, the flowers appear to be red, however, they are actually white with red edges. They may have a light tea fragrance.
Spent blooms should be removed from the plant to encourage re-blooming. Flushes of blooms will appear throughout the season.
This plant can be pruned in the spring to remove damaged, dead or diseased wood. Remove any canes that cross. Cut back the canes by 1/3 in warm locations and a bit more in cooler climates.
Insects, Diseases, and Other Plant Problems: New spring growth should be protected from any hard freeze which can cause death of the plant, canker and die-back.For full information on common pests and diseases, please see the Rosa page.
- See this plant in the following landscape:
- Cultivars / Varieties:
-
- Tags:
- Cultivars / Varieties:
-
- Tags:
-
-
Attributes:
- Genus:
- Rosa
- Family:
- Roseaceae
- Life Cycle:
- Perennial
- Woody
- Recommended Propagation Strategy:
- Stem Cutting
- Country Or Region Of Origin:
- France, United States
- Wildlife Value:
- Bees are attracted to the flowers.
- Play Value:
- Attractive Flowers
- Attracts Pollinators
- Colorful
- Screening
- Textural
- Dimensions:
- Height: 4 ft. 0 in. - 5 ft. 0 in.
- Width: 6 ft. 6 in. - 4 ft. 1 in.
-
-
Whole Plant Traits:
- Plant Type:
- Perennial
- Rose
- Shrub
- Woody Plant Leaf Characteristics:
- Deciduous
- Habit/Form:
- Erect
- Spreading
- Growth Rate:
- Medium
- Maintenance:
- Medium
- Texture:
- Medium
- Appendage:
- Prickles
-
-
Cultural Conditions:
- Light:
- Full sun (6 or more hours of direct sunlight a day)
- Soil pH:
- Acid (<6.0)
- Alkaline (>8.0)
- Neutral (6.0-8.0)
- Soil Drainage:
- Good Drainage
- Available Space To Plant:
- 3 feet-6 feet
- NC Region:
- Coastal
- Mountains
- Piedmont
- USDA Plant Hardiness Zone:
- 6a, 6b, 7a, 7b, 8a, 8b, 9a, 9b, 10a, 10b, 11a, 11b
-
-
Flowers:
- Flower Color:
- Red/Burgundy
- Variegated
- Flower Inflorescence:
- Solitary
- Flower Value To Gardener:
- Fragrant
- Showy
- Flower Bloom Time:
- Fall
- Spring
- Summer
- Flower Shape:
- Cup
- Flower Petals:
- more than 20 petals/rays
- Flower Size:
- 1-3 inches
- Flower Description:
- The flowers are borne as solitary blooms in small clusters. They are a medium size of 3" in diameter, forming as semi-double to double blooms. Ranging from 18 to 22 ruffled petals, the petals form a high-centered to cupped form. Its buds have an egg shape.
-
-
Leaves:
- Woody Plant Leaf Characteristics:
- Deciduous
- Leaf Color:
- Green
- Leaf Feel:
- Glossy
- Leaf Value To Gardener:
- Showy
- Leaf Type:
- Simple
- Leaf Arrangement:
- Opposite
- Leaf Shape:
- Ovate
- Leaf Margin:
- Serrate
- Hairs Present:
- No
- Leaf Length:
- 1-3 inches
- Leaf Width:
- < 1 inch
- Leaf Description:
- The medium-sized, dark green foliage has a glossy appearance. Typically, 3-7 leaflets.
-
-
Stem:
- Stem Is Aromatic:
- No
-
-
Landscape:
- Landscape Location:
- Container
- Patio
- Pool/Hardscape
- Walkways
- Landscape Theme:
- Cutting Garden
- Pollinator Garden
- Design Feature:
- Accent
- Barrier
- Border
- Foundation Planting
- Hedge
- Mass Planting
- Screen/Privacy
- Small groups
- Specimen
- Attracts:
- Bees
- Resistance To Challenges:
- Diseases
|
<urn:uuid:092bbd87-e860-491a-87d7-b9ad9c110a6e>
|
CC-MAIN-2024-51
|
https://plants.ces.ncsu.edu/plants/rosa-heart-n-soul-orapaymel/
|
2024-12-05T16:49:39Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066355594.66/warc/CC-MAIN-20241205150341-20241205180341-00845.warc.gz
|
by
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.858321
|
{
"abbr": [
"by",
"by",
"by",
"by",
"by"
],
"in_footer": [
false,
false,
false,
false,
false
],
"in_head": [
false,
false,
false,
false,
false
],
"location": [
"a_tag",
"a_tag",
"a_tag",
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0",
"4.0",
"4.0",
"4.0"
]
}
|
default search action
- 2024
- [i2]Weishun Zhong, Mikhail Katkov, Misha Tsodyks:
Hierarchical Working Memory and a New Magic Number. CoRR abs/2408.07637 (2024) - 2023
- [i1]Antonios Georgiou, Tankut Can, Mikhail Katkov, Misha Tsodyks:
Using large language models to study human memory for meaningful narratives. CoRR abs/2311.04742 (2023) - 2021
- [j5]Yulia Lerner, K. Suzanne Scherf, Mikhail Katkov, Uri Hasson, Marlene Behrmann:
Changes in Cortical Coherence Supporting Complex Visual and Social Processing in Adolescence. J. Cogn. Neurosci. 33(11): 2215-2230 (2021)
- 2018
- [j4]Mikhail Katkov, Hila Harris, Dov Sagi:
1, 2, 3, Many - Perceptual Integration of Motif Repetitions. Symmetry 10(11): 661 (2018) - 2017
- [j3]Stefano Recanatesi, Mikhail Katkov, Misha Tsodyks:
Memory States and Transitions between Them in Attractor Neural Networks. Neural Comput. 29(10): 2684-2711 (2017) - 2015
- [j2]Stefano Recanatesi, Mikhail Katkov, Sandro Romani, Misha Tsodyks:
Neural Network Model of Memory Retrieval. Frontiers Comput. Neurosci. 9: 149 (2015) - 2014
- [j1]Mikhail Katkov, Sandro Romani, Misha Tsodyks:
Word length effect in free recall of randomly assembled word lists. Frontiers Comput. Neurosci. 8: 129 (2014)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-30 01:00 CEST by the dblp team
|
<urn:uuid:dc04b557-9561-4692-96f7-1ff08c0ee7b9>
|
CC-MAIN-2024-51
|
https://dblp1.uni-trier.de/pid/18/8316.html
|
2024-12-06T21:10:57Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00745.warc.gz
|
zero
|
1.0
|
json-ld
| true
| false
| false
| false
|
Latn
|
eng
| 0.991775
|
{
"abbr": [
"zero",
"zero",
"zero",
"zero"
],
"in_footer": [
false,
false,
true,
true
],
"in_head": [
true,
true,
false,
false
],
"location": [
"json-ld",
"json-ld",
"a_tag",
"a_tag"
],
"version": [
"1.0",
"1.0",
"1.0",
"1.0"
]
}
|
Warning: You are browsing the documentation for PrestaShop 1.7, which is outdated.
You might want to read an updated version of this page for the current version, PrestaShop 8. Read the updated version of this page
PrestaShop 1.7.6 introduced Mail themes. This new mail template management feature provides new and powerful ways for Modules to interact with mail templates.
|
<urn:uuid:ca6b8081-45fc-4bea-881c-e6521f1775aa>
|
CC-MAIN-2024-51
|
https://devdocs.prestashop-project.org/1.7/modules/concepts/mail-templates/
|
2024-12-06T20:17:33Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00745.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.996212
|
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Debug your inbox app You can use the XMTP Debug tool to stress and burn-in test your inbox app on the local and dev XMTP environments. To learn more, see XMTP Debug.
|
<urn:uuid:7d33f1c5-e658-4b33-b3bb-3adce7ac9e39>
|
CC-MAIN-2024-51
|
https://docs.xmtp.org/inboxes/debug-your-app
|
2024-12-06T20:48:06Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00745.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.996002
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Entity History Retrieval Profile¶
The performance of programmatically retrieving the history of existing entity instances based on their ID.
The Open Metadata Repository Services (OMRS) interface for a metadata repository defines methods for retrieving the history of entity instances by their ID:
Method | Description |
---|---|
getEntityDetail |
retrieves an entity instance's details at a given point in time, if the entity was known at that point in time, or throws an exception if not |
getEntityDetailHistory |
retrieves the full history of an entity instance's details |
Assertions
ID | Description |
---|---|
repository-entity-history-retrieval-performance-getEntityDetail |
See (2) in detailed logic below. |
repository-entity-history-retrieval-performance-getEntityDetailHistory |
See (3) in detailed logic below. |
For every entity type supported by the technology under test, this profile does the following (in order):
- Searches for
instancesPerType
entity GUIDs of that type. (This usesfindEntities
and its performance is recorded as part of the entity search profile.) - For each of these entity GUIDs,
getEntityDetail
is then called with anasOfTime
using the timestamp captured prior to the execution of the Entity Update profile, to retrieve its historical details from that point in time (prior to any updates). - For each of these entity GUIDs,
getEntityDetailHistory
is then called to retrieve its full history (including current version and all historical versions of the instance).
Example
So, for example, if the technology under test supports 50 entity types, and the instancesPerType
parameter is set to 100, then this profile will retrieve 50 (types) x 100 (instances per type) x 2 (operations) = 10 000 entities. (And it will run findEntities
50 times.)
Raise an issue or comment below
|
<urn:uuid:61fde25b-cdbb-42e4-9885-2a1cdf382a7f>
|
CC-MAIN-2024-51
|
https://egeria-project.org/guides/cts/performance-profiles/entity-history-retrieval/
|
2024-12-06T19:31:31Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00745.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.961447
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Rated 3 out of 5
by TS, 6 maande geledeOften gets the full screen orientation wrong when viewing on mobile. It will change the orientation after it auto skips, if you double tap to manually skip, or sometimes even simplely taping the screen to view the time elapsed. A very bizarre and annoying bug but otherwise works fine.
- Rated 5 out of 5by Antihero, 'n dag gelede
- Rated 5 out of 5by Firefox user 15567185, 2 dae gelede
- Rated 5 out of 5by Fab, 4 dae gelede
- Rated 5 out of 5by TechyonHavok, 5 dae gelede
- Rated 5 out of 5by JuuzouSuzuya, 6 dae gelede
- Rated 5 out of 5by NisforNick67, 6 dae gelede
- Rated 4 out of 5by Nokna, 6 dae gelede
- Rated 5 out of 5by fxs1l, 7 dae gelede
- Rated 5 out of 5by Ellis, 8 dae gelede
- Rated 5 out of 5by Erdem, 8 dae gelede
- Rated 5 out of 5by OTTIMIC, 9 dae gelede
- Rated 5 out of 5by Firefox user 13243261, 10 dae gelede
- Rated 4 out of 5by makaThird, 13 dae geledeNow it does not show and skip segments with default ad server. Even with uninstalled other addons. Have to change it myself. Thanks to other user in comments !
- Rated 5 out of 5by dvi, 16 dae gelede
- Rated 5 out of 5by VANACHROME, 16 dae gelede
- Rated 5 out of 5by Ha2-53, 16 dae geledeGood plugin but automatic skipping on videos doesn't work unless I reload the page. I am on Firefox.
Edit: I fixed it by changing the version of Enhancer For Youtube, thanks to the devs for telling me.Developer response
posted 15 dae geledeThe latest version of "Enhancer for YouTube" causes issues with sponsorblock. You can downgrade that extension until they publish their fix.
https://old.reddit.com/r/SponsorBlock/comments/1gtl3f1/do_this_if_your_extension_has_stopped_working_on/ - Rated 5 out of 5by untohh, 16 dae gelede
- Rated 5 out of 5by malau, 16 dae geledeIf you're skipping has stopped working then it means you have YouTube Enhancer.
Read the dev comments and install the version of YouTube Enhancer that doesn't eff up SB. - Rated 5 out of 5by Ritik, 16 dae gelede
- Rated 5 out of 5by PoemOnTyperacer, 17 dae gelede
- Rated 5 out of 5by Firefox user 18369083, 17 dae gelede
- Rated 3 out of 5by Boeser Waldgeist, 17 dae gelede
- Rated 3 out of 5by Sajrudin, 17 dae gelede
|
<urn:uuid:67145f22-b937-48ab-b13c-4e825942449e>
|
CC-MAIN-2024-51
|
https://addons.mozilla.org/af/firefox/addon/sponsorblock/reviews/2082770/?utm_content=rating&utm_medium=referral&utm_source=addons.mozilla.org
|
2024-12-07T23:58:49Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00645.warc.gz
|
by-sa
|
3.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.772448
|
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
]
}
|
This page assumes you are familiar with Bazel and provides guidelines and advice on structuring your projects to take full advantage of Bazel's features.
The overall goals are:
- To use fine-grained dependencies to allow parallelism and incrementality.
- To keep dependencies well-encapsulated.
- To make code well-structured and testable.
- To create a build configuration that is easy to understand and maintain.
These guidelines are not requirements: few projects will be able to adhere to all of them. As the man page for lint says, "A special reward will be presented to the first person to produce a real program that produces no errors with strict checking." However, incorporating as many of these principles as possible should make a project more readable, less error-prone, and faster to build.
This page uses the requirement levels described in this RFC.
Running builds and tests
A project should always be able to run bazel build //...
and
bazel test //...
successfully on its stable branch. Targets that are necessary
but do not build under certain circumstances (such as,require specific build
flags, don't build on a certain platform, require license agreements) should be
tagged as specifically as possible (for example, "requires-osx
"). This
tagging allows targets to be filtered at a more fine-grained level than the
"manual" tag and allows someone inspecting the BUILD
file to understand what
a target's restrictions are.
Third-party dependencies
You may declare third-party dependencies:
- Either declare them as remote repositories in the
MODULE.bazel
file. - Or put them in a directory called
third_party/
under your workspace directory.
Depending on binaries
Everything should be built from source whenever possible. Generally this means
that, instead of depending on a library some-library.so
, you'd create a
BUILD
file and build some-library.so
from its sources, then depend on that
target.
Always building from source ensures that a build is not using a library that was built with incompatible flags or a different architecture. There are also some features like coverage, static analysis, or dynamic analysis that only work on the source.
Versioning
Prefer building all code from head whenever possible. When versions must be
used, avoid including the version in the target name (for example, //guava
,
not //guava-20.0
). This naming makes the library easier to update (only one
target needs to be updated). It's also more resilient to diamond dependency
issues: if one library depends on guava-19.0
and one depends on guava-20.0
,
you could end up with a library that tries to depend on two different versions.
If you created a misleading alias to point both targets to one guava
library,
then the BUILD
files are misleading.
Using the .bazelrc
file
For project-specific options, use the configuration file your
workspace/.bazelrc
(see bazelrc format).
If you want to support per-user options for your project that you do not want to check into source control, include the line:
try-import %workspace%/user.bazelrc
(or any other file name) in your workspace/.bazelrc
and add user.bazelrc
to your .gitignore
.
Packages
Every directory that contains buildable files should be a package. If a BUILD
file refers to files in subdirectories (such as, srcs = ["a/b/C.java"]
) it's
a sign that a BUILD
file should be added to that subdirectory. The longer
this structure exists, the more likely circular dependencies will be
inadvertently created, a target's scope will creep, and an increasing number
of reverse dependencies will have to be updated.
|
<urn:uuid:3657781d-848b-4f6f-a8ab-7a4ce693daa8>
|
CC-MAIN-2024-51
|
https://bazel.build/configure/best-practices
|
2024-12-08T01:00:45Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00645.warc.gz
|
by
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.998561
|
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
The regions seen here are a beautiful mix of the old & the new, and so are the different kinds of rail transport that pass through these areas. They really give every city a different kind of living atmosphere, don't you think?
We've picked the cities of Cluj, Galati, Iasi and Timișoara to show you the differences. Anyone here able to say which picture belongs to what city? :)
|
<urn:uuid:a28e17d2-2d8f-47ed-a290-ffac470f29db>
|
CC-MAIN-2024-51
|
https://blog.scssoft.com/2019/11/road-to-black-sea-trains.html?m=0
|
2024-12-07T23:29:24Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00645.warc.gz
|
by
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.998671
|
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
28 May 2021
The Fiery End of the Paris Commune
This is the third in a series of blog posts marking the 150th anniversary of the Paris Commune, a radical, popular led government in power between 18 March and 28 May 1871. Discover the first two posts (A Burglarious Attempt to Declaw the Lion and The Toppling of the Vendôme Column) on our blog.
On the evening of 21 May, Versaillais troops climbed over the tattered south-western fortifications of Paris, and the week which would define the Commune began. Known as la semaine sanglante, or Bloody Week, Paris would suffer a ferocious bloodletting.
By the next morning, the Arc de Triomphe flew a tricolour rather than the Commune’s red flag. While the communards had hastily built hundreds of poorly-constructed barricades in the boulevards, some 110,000 troops marched through the city, amongst which were thousands of prisoners of war released by Prussia.
The communards grew disillusioned with the situation. Attempts to trade prisoners with Thiers had been repeatedly denied. The Parisians sought Auguste Blanqui, a legendary figure of French radicalism through the nineteenth century, in exchange for all 74 prisoners held by the Commune, including the liberal archbishop of Paris, Georges Darboy. The repeated rejections, as well as continuous reports on the brutality of the Versaillais troops, saw Darboy and five fellow clerics killed on the night of 24 May. These executions provoked outrage.
The death of Darboy is a key point of anti-Commune propaganda, but it was far from the only one. A slew of reports and images followed the Versaillais march through Paris, as myth-making began to efface the thousands who were killed by the encroaching troops.
Fires which could be seen for miles around engulfed Paris and accompanied the march. Historians generally believe the initial fires to have been started by the missiles launched into Paris by the Versaillais, as well as some being set by Parisians to cover their retreats further into the north-western arrondissements as the army slowly took the city back. They left the city in ruins, with several of the city’s key cultural sites including the Tuileries Palace, the Hotel de Ville and Louvre, partially or completely destroyed.
‘A Pétroleuse: Ah! If her man saw it’, Paris: Imprimerie J. Moronval, (1871)
The denigration of the Commune rose from the ashes of la semaine sanglante. After the final conflicts around Belleville in the north-west of the city, a wave of conservative imagery made clear who they thought were responsible for the fires. Laying the blame of the destruction of Paris on the so-called ‘pétroleuses’, the image above captures the essence of this discourse. We see a woman with almost pig-like features, almost certainly an artistic device to dehumanise her. She carries a torch and a can of petrol, presumably looking for some cultural asset to destroy or some aspect of natural order to subvert.
The caption further indicates the double crime these women were accused of committing – first, the crime against the state and the status quo, and secondly, the crime against her family, her husband and the natural order. The pétroleuse is amongst the most prominent devices of anti-Communard prints, and she is repeatedly invoked to remind viewers of the supposed horrors of women who did not conform to gendered expectations.
‘After the Prussians… My sons with the stranger’ By Emile Gogny, Paris: Imprimerie Lemercier et Cie (1871)
The crimes of the Commune are made clear in this wonderfully macabre print. An aghast female warrior grasping her broken sword looks down at the ground in front of her, to see a range of incendiary devices. Around her, a deluge of destruction emphasises the various aspects of the Commune’s sins.
To the left, we see a communard about to use a holy relic to smash Jesus on the crucifix. Above this morbid scene are soldiers in combat on the boulevards of Paris. To the right we see the corpses of clergymen, punctured by bayonets. In the top right, we see the infamous pétroleuses, setting fire to the buildings of Paris. At the top, we see Death, looking down upon all that is his, scythe in hand. This is a powerful image that reminds us of the forcefulness of anti-Commune propaganda, and that the caricature and print collection at the British Library (14001.g.41, Cup.1001.i.1, Cup.648.b.2 and Cup. 648.b.8) does not just contain humorous lampoons of political figures, the public, and their idiosyncrasies.
Absurd bloodshed marked the end of the Commune. The remaining embers of resistance were routed on 28 May, and thousands of prisoners were executed in public sites which today remain, often without a trace of this barbarity. One of the few memorials is at Père Lachaise cemetery, resting place of Jim Morrison, Edith Piaf and Oscar Wilde, where a simple plaque commemorates 174 National Guard members shot against the wall, and the rest of the deaths through la semaine sanglante. The four thousand who survived were transported across globe to live in France’s penal colony, New Caledonia, before a general amnesty in 1880.
The Commune did not die on 28 May, 1871. The myth of the female fire starters fuelled fears of social revolution across the globe for decades after the fires of Paris, and the pétroleuse is still synonymous with 1871. The Commune itself has a complex role in the French memory. Through this year, Paris’s municipal government has controversially staged events to commemorate the Commune. It remains prescient that people will die for a cause they believe in while others prioritise of cultural and social losses over the losses of human life. Far beyond dying, 150 years later the Commune still leaves no one neutral.
Anthony Chapman, CDP Student at the British Library and Royal Holloway, University of London
Further reading:
Morna Daniels, ‘Caricatures from the Franco-Prussian War of 1870 and the Paris Commune’, Electronic British Library Journal, (2005), pp. 1-19,
Gay Gullickson, Unruly Women of Paris: Images of the Commune, (Ithaca, 1996), YC.1997.a.1077
John Milner, Art, War and Revolution in France, 1870-1871: Myth, Reportage and Reality, (New Haven, 2000). Document Supply m00/44939
David A. Shafer, The Paris Commune, (Basingstoke, 2005). YC.2006.a.16941
Robert Tombs, The Paris Commune, 1871, (London, 1999). YC.1999.a.3641
|
<urn:uuid:6a7509b3-0b1c-4c3b-84ea-80da48a1f223>
|
CC-MAIN-2024-51
|
https://blogs.bl.uk/european/2021/05/the-fiery-end-of-the-paris-commune.html
|
2024-12-08T00:10:23Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00645.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.997433
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Caring for an ash bonsai tree is an art that blends gardening skills with creativity. Bonsai, a Japanese term meaning “planted in a container,” involves growing miniature trees that mimic the shape and scale of full-size trees. Your ash bonsai requires specific attention to thrive, including the right amount of light, water, soil conditions, and more. Let’s explore the essentials of nurturing your ash bonsai so you can enjoy its beauty for years to come.
Scientific Classification
Every living thing, including the ash bonsai tree, has a scientific classification. This helps scientists talk about and study them. Here is where the ash bonsai fits in the big family tree of plants:
- Kingdom: Plantae
- Division: Angiosperms
- Class: Eudicots
- Order: Lamiales
- Family: Oleaceae
- Genus: Fraxinus
- Species: Depends on the type of ash tree
Light
Your ash bonsai tree needs the right amount of light to grow well. Like other plants, it uses light to make food for itself through a process called photosynthesis. If your bonsai gets too little light, it won’t have the energy to stay healthy. On the other hand, too much direct sunlight can burn the leaves. Ideally, place your ash bonsai where it can get bright, indirect light for most of the day. This usually means putting it near a window that faces east or west. If natural light is not enough, you might use grow lights. These are special lights that imitate sunlight. Make sure to turn them on for about 12 hours a day. This will help your bonsai keep a regular cycle, just as if it were outside.
Water
Water is essential for your Ash Bonsai Tree, just like it is for all plants. You need to give it the right amount to keep it healthy. Too little water and your tree can dry out, too much and the roots might rot. You should water your bonsai when the top of the soil starts to feel dry. It’s a good practice to water your tree thoroughly until you see water running out of the drainage holes at the bottom of its pot. This makes sure that the water reaches all the roots. During hot or windy days, your bonsai might need more water. On colder days, it will need less. Always check the soil before watering to avoid overdoing it. Remember, keeping the soil slightly moist is the goal.
Soil
The soil you use for your Ash Bonsai tree is like its home. It needs to be comfortable and have the right mix of ingredients. Good soil helps the roots grow and lets air move through. It also holds water without being too wet. For your Ash Bonsai, you’ll want soil that drains well but still keeps some moisture. You can find special bonsai soil mixes at a garden store. These mixes usually have things like pumice, lava rock, and pine bark. They make sure your bonsai’s roots get enough air and water. If you’re making your own mix, use similar materials. Just remember, the soil should not stay soggy, or the roots might rot. Using the right soil helps your bonsai stay healthy and grow strong.
Temperature
Keeping your Ash Bonsai tree healthy means paying attention to the temperature. These trees prefer a moderate climate. It should not be too hot or too cold. During the day, they like to bask in temperatures between 60 to 70 degrees Fahrenheit. When night falls, they are comfortable with a small drop in temperature. However, if it gets colder than 50 degrees Fahrenheit, your bonsai might not be happy. Make sure to protect it from frost, because a harsh freeze can damage it. Therefore, when winter comes, you might need to move your Ash Bonsai indoors to keep it warm. Remember, a stable temperature helps your tree thrive.
Humidity
Humidity is the amount of water vapor in the air. Your ash bonsai tree needs moisture around it to grow well. Imagine how it feels to breathe in a steamy bathroom; that’s high humidity. Your bonsai likes a certain level of this moisture. When the air is dry, especially during winter when heaters are on, it’s not very good for the tree. The leaves might dry out or turn brown if there’s not enough humidity. You can help by misting the tree with water or using a humidity tray. This tray holds water and pebbles that the pot sits on. The water evaporates and adds moisture to the air around the bonsai. Just be sure the pot doesn’t sit in water, as this can harm the roots. Your ash bonsai will thank you by staying green and healthy.
Fertilizer
Fertilizer is like vitamins for your ash bonsai tree. It gives your tree the important nutrients it needs to grow strong and healthy. Think of it as food that helps your bonsai stay alive and look its best. You should use a balanced fertilizer, which means it has equal parts of the three key nutrients: nitrogen, phosphorus, and potassium. These nutrients each have a special job. Nitrogen helps the leaves grow green, phosphorus is good for the roots, and potassium keeps the whole tree healthy. When you feed your bonsai, do it during the growing season, which is from spring to autumn. Don’t add too much fertilizer, though. It’s like eating too much candy; it can do more harm than good. So, just give your bonsai enough food to stay happy and thriving.
Growth Rate
The growth rate of an ash bonsai tree refers to how fast it grows over a period of time. Ash bonsai trees tend to grow at a moderate pace. They do not shoot up very quickly like some plants, nor do they grow too slowly. Generally, within a growing season, you’ll see noticeable changes in the size and shape of your bonsai if you care for it properly. This change can vary, depending on several factors such as how much light the tree receives, the quality of its soil and water, and the temperature and humidity of its environment. A healthy ash bonsai with all its needs met will have a more consistent and steady growth rate compared to a neglected one. Therefore, paying close attention to its care will help maintain a good growth rate.
Placement
When you’re taking care of an Ash Bonsai tree, where you put it is really important. Just like you might have a favorite spot in your house, your Bonsai needs a place where it feels happy too. Think of placement as the tree’s home, where it gets the right amount of sunlight and is shielded from anything that could hurt it. You can’t just put your Bonsai anywhere. It should be in a spot with good light but not in direct sun for too long. Some breeze is nice, but strong winds can harm the leaves and dry the tree out. Keep it away from heaters or air conditioners because those can mess with the temperature and humidity the tree needs. So, pick a spot that’s just right for your Bonsai, where it gets what it needs and stays protected.
Repotting
Repotting is like giving your ash bonsai a new home. Over time, the old soil can break down and not let the water drain well. The tree’s roots can also fill up the pot, leaving no room to grow. You’ll need to give your bonsai fresh soil and a bit of space so its roots can spread out a bit. This doesn’t mean a bigger pot, just enough space to keep it healthy. Repotting is usually done every two to five years. The best time to repot is early spring when the tree is just waking up from winter. When you repot, trim the roots carefully, but don’t cut too much, as this can harm your tree. Place the tree in its pot with new soil and water it well. This helps your ash bonsai stay healthy and grow better.
Pruning
Pruning means cutting off parts of your ash bonsai tree to shape it and keep it healthy. When you prune, you remove unwanted branches, twigs, and leaves. This helps your tree look like a tiny version of a full-sized tree. You should cut branches that are too long or growing in the wrong direction. Pruning also lets more light and air reach the inner parts of the tree. This is good for the tree’s health. For your bonsai to look its best, prune it during the growing season. That’s when the tree can heal from the cuts quickly. Always use sharp tools to make clean cuts. This way, the tree can heal with less risk of getting sick. Remember, pruning is like giving your tree a haircut. It helps your bonsai stay small and look like a work of art.
Wiring
Wiring is a technique in bonsai care where you wrap wire around the branches and trunks. You use this method to shape and direct the growth of your Ash Bonsai tree. Think of the wire as braces for plants. It helps guide the branches to grow in the direction you want. You must wrap the wire carefully to avoid hurting the tree. It’s like giving your tree a gentle nudge to grow left or right, up or down. Over time, the tree keeps the shape even when you remove the wire. It’s important to check the wire often. The tree grows and the wire can get too tight. This can harm the tree if not corrected. You’ll need to remove or adjust the wire as the tree grows. Wiring is a creative part of bonsai care, allowing you to design your tree’s look.
Common Issues
When you care for an Ash Bonsai tree, you might face some problems. These issues can hurt your tree’s health. Pests like aphids and spider mites can attack the leaves, sucking the sap and weakening the plant. Fungus can also be a problem, causing black spots on the leaves or white powder that looks like flour. This happens when the leaves stay wet for too long. Another issue is the leaves turning yellow or dropping off. This can occur if the tree doesn’t get the right amount of water or light. Roots can rot too if the soil is too wet all the time. By knowing these common problems, you can find them early and fix them fast. This helps your Ash Bonsai stay healthy and beautiful.
Toxicity
When you deal with an Ash Bonsai tree, you need to know about its toxicity. This means you should find out if the tree is poisonous to people or animals if they touch or eat any part of it. Ash trees are generally considered safe, and they don’t have toxins that harm humans or pets. However, it’s always smart to be careful. If you have small children or pets, you should teach them not to chew on any part of your bonsai. Some plants can cause reactions like skin irritation or stomach upset if they are eaten. Always wash your hands after handling any plant, just to be safe. Remember, even if the ash bonsai is not toxic, treating all plants with respect is a good habit.
Pro Tips
Caring for an Ash Bonsai tree can be a rewarding experience. Here are some pro tips to help you ensure its health and beauty:
- Always use sharp tools for pruning to create clean cuts.
- Protect your bonsai from pests by inspecting regularly.
- Rotate your bonsai to provide even light exposure.
- Avoid moving your bonsai too often to reduce stress.
- Learn to distinguish between under and over-watering signs.
- Be patient with growth and enjoy the gradual process.
|
<urn:uuid:c2c2f78b-63be-4a9a-a3d3-adad7e829d3f>
|
CC-MAIN-2024-51
|
https://bonsaiprimer.com/bonsai/tree-species/ash/
|
2024-12-07T23:48:51Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00645.warc.gz
|
by-nd
|
2.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.998049
|
{
"abbr": [
"by-nd"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"2.0"
]
}
|
-
Ethics and Human Rights Guidelines for Big Data for Development Research
-
by
Amber Sinha, Manjri Singh, Rajashri Seal, Pranav Bhaskar Tiwari, Pranav M Bidare
—
published
May 19, 2020
—
last modified
May 20, 2020 07:56 AM
—
filed under:
Researchers at Work,
BD4D,
RAW Research,
Big Data for Development,
Artificial Intelligence
This is a four-part review of guideline documents for ethics and human rights in big data for development research. This research was produced as part of the Big Data for Development network supported by International Development Research Centre, Canada
Located in
RAW
-
Farming the Future: Deployment of Artificial Intelligence in the agricultural sector in India
-
by
Elonnai Hickok, Arindrajit Basu, Siddharth Sonkar and Pranav M B
—
published
Oct 16, 2019
—
filed under:
Internet Governance,
Artificial Intelligence
This case study was published as a chapter in the joint UNESCAP-Google publication titled Artificial Intelligence in Public Service Delivery. The chapter in its final form would not have been possible without the efforts and very useful interventions by our colleagues at Digital Asia Hub,Google, and UNESCAP.
Located in
Internet Governance
Blog
-
Finding Needles in Haystacks - Discussing the Role of Automated Filtering in the New Indian Intermediary Liability Rules
-
by
Shweta Mohandas and Torsha Sarkar
—
published
Aug 03, 2021
—
last modified
Aug 03, 2021 07:28 AM
—
filed under:
Internet Governance,
Intermediary Liability,
Artificial Intelligence
On the 25th of February this year The Government of India notified the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021. The new Rules broaden the scope of which entities can be considered as intermediaries to now include curated-content platforms (Netflix) as well as digital news publications. This blogpost analyzes the rule on automated filtering, in the context of the growing use of automated content moderation.
Located in
Internet Governance
Blog
-
Fostering Strategic Convergence in US-India Tech Relations: 5G and Beyond
-
by
Justin Sherman and Arindrajit Basu
—
published
Jul 05, 2019
—
filed under:
Telecom,
Artificial Intelligence
The 2019 G-20 summit underscores the importance of fostering strategic convergence in U.S.-India tech relations.
Located in
Telecom
Blog
-
Future Tech and Future Law
-
by
Admin
—
published
Dec 05, 2018
—
last modified
Jan 03, 2019 01:17 AM
—
filed under:
Internet Governance,
Artificial Intelligence
The Dept. of IT & BT, Government of Karnataka organised the 21st edition of Bengaluru Tech Summit from November 29, 2018 to December 1, 2018 at Palace Grounds, Bengaluru. Arindrajit Basu was a speaker at the panel on 'Future Tech and Future Law'.
Located in
Internet Governance
News & Media
-
Impact of Industrial Revolution 4.0 - IT and Automotive Sector in India by the Dialogue and FES
-
by
Admin
—
published
Aug 27, 2019
—
filed under:
Industry 4.0,
Internet Governance,
Information Technology,
Artificial Intelligence
On August 21, 2019, Aayush Rathi, attended a report launch event and focus group discussion on the "Impact of Industrial Revolution 4.0 - IT and Automotive Sector in India". Research conducted by the Dialogue in collaboration with the Friedrich-Ebert-Stiftung (FES) were being presented.
Located in
Internet Governance
News & Media
-
Insult to Kannada shows Google AI in a poor light
-
by
Krupa Joseph
—
published
Dec 31, 2020
—
last modified
Jun 26, 2021 05:25 AM
—
filed under:
Internet Governance,
Artificial Intelligence
A Google search for ‘the ugliest language in India’ yielded ‘Kannada’ as the answer late last week, causing widespread outrage.
Located in
Internet Governance
News & Media
-
International Conference on Justice Education:Legal Implications of Artificial Intelligence
-
by
Admin
—
published
Mar 20, 2019
—
last modified
Mar 20, 2019 03:52 PM
—
filed under:
Internet Governance,
Artificial Intelligence
Arindrajit Basu attended the International Conference on Justice Education with the theme "Artificial Intelligence and its Legal Implications" at Institute of Law Nirma University. The event was organized by Nirma University in Ahmedabad on March 15 - 16, 2019. Arindrajit was a theme speaker for the panel on Legal Implications of Artificial Intelligence and was a judge of the presentations in the same session.
Located in
Internet Governance
News & Media
-
MWC19 Shanghai AI and Trust in APAC and China
-
by
Admin
—
published
Jun 05, 2019
—
last modified
Jun 05, 2019 07:10 AM
—
filed under:
Internet Governance,
Artificial Intelligence
Sunil Abraham will be making a presentation at the summit on AI and Trust in APAC and China at MWC19 Shanghai on June 27, 2019. Sunil has been invited as a speaker on panel ‘Framing AI for Digital Upstarts’.
Located in
Internet Governance
News & Media
-
New intermediary guidelines: The good and the bad
-
by
Torsha Sarkar
—
published
Feb 26, 2021
—
last modified
Mar 15, 2021 01:52 PM
—
filed under:
IT Act,
Intermediary Liability,
Internet Governance,
Censorship,
Artificial Intelligence
In pursuance of the government releasing the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021, this blogpost offers a quick rundown of some of the changes brought about the Rules, and how they line up with existing principles of best practices in content moderation, among others.
Located in
Internet Governance
Blog
|
<urn:uuid:a41e2bdb-b1ae-405a-9d1a-a6d1c2919470>
|
CC-MAIN-2024-51
|
http://editors.cis-india.org/@@search?sort_on=sortable_title&b_start:int=30&Subject=Artificial%20Intelligence
|
2024-12-09T04:56:19Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00545.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.973776
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
ERROR: type should be string, got "https://www.entropiauniverse.com/bu...10/what-is-entropia-universe-unreal/index.xml A lot of details here to read about. Enjoy :)\nSeems promising, but if 'the computational load is split among servers in a distributed way', then it won't be run from a single shard.\nI like that they had an advert on their youtube channel before you could watch the video #professionalism. \"We want you to see our game... but first... here's a shitty looking mobile game that someone else made, please watch this first as we need the pedzzzz\"\n\"On a grand scale, systemic design produces a living, vibrant world that reacts to the user and to elements within itself. It can lead to emergent gameplay, i.e. gameplay emerging from the interaction of multiple systems rather than the intentional designs of the developer. These varied interactions are stimulating, motivating users to experiment and explore.\" Sounds great but I find myself of reminded that such emergent gameplay is brought to you by the folks who removed the ability to drop items in the world, and erected invisible barriers around anything someone found a use for that they didn't like, thus eliminating any possibility of emergent gameplay. I'd like to believe they've changed.... but I heard the other day that the Taliban have started requesting women wear full face covers now... it's optional, but husbands will be punished if not implemented.\nSet /sɛt/ or Seth (/sɛθ/; also spelled Setesh, Sutekh, Setekh, or Suty) is a god of the desert, storms, disorder, violence, evil, chaos, war and foreigners in ancient Egyptian religion. In Ancient Greek, the god's name is given as Sēth (Σήθ). Set is not, however, a god to be ignored or avoided; he has a positive role where he is employed by Ra on his solar boat to repel Apep, the serpent of Chaos. Set had a vital role as a reconciled combatant. He was lord of the red (desert) land where he was the balance to Horus' role as lord of the black (soil) land. In Egyptian mythology, Set is portrayed as the usurper who killed and mutilated his own brother Osiris. Osiris' wife Isis reassembled Osiris' corpse and resurrected him long enough to conceive his son and heir, Horus. Horus sought revenge upon Set, and the myths describe their conflicts. This Osiris myth is a prominent theme in Egyptian mythology. https://mythus.fandom.com/wiki/Set?msclkid=abef029dd08d11ec9b12bb13a923b345\nYeh it will. Even today the computational load is split among servers. IIRC they use HP Blade servers or something. Can't comment on exactly how that works (I think they are just a server product name) but I do know that areas are split up because many years ago I discovered a bug that could crash a server meaning that everyone in my area got moved to a different area when they logged back in. I wrote an article about it at the below link File:The Calypso Post No5 June 2007.pdf - EntropiaPlanets Wiki It's a crude system in that it appears to be \"Server Square\" i.e. area segmented rather than say based on load but TBH it works pretty well for the most part. There are only a few areas in game that are regularly crowded. One thing you might notice in game is that there are rarely mobs near a server square boundary. Presumably this is so they can be \"looked after\" by one server or group of servers. You may also notice a slight jerk when crossing a server square boundary, especially when flying. At a guess this is you being handed over from one \"server\" to the next. Something they may want to think about for Untropia would be what Dual Universe did or something similar/equivalent. Not a lot of point in speculating really though as it's complicated stuff. > load test > This said,... while searching those videos out I spotted some video titles that seemed to be implying Dual Universe died already.\nSo... to me most of the info reads a lot like high level discussion. Like folks have been having meeting and trying to create a list of priorities likely stemming from a lot of brainstorming on what they'd really like to make. I guess you have to start somewhere. At least from the thoughts they've had so far I think this: We will focus our efforts on worldbuilding to make exploring our worlds more stimulating and exciting. Exploring will become an end in itself! Thumbs up! Introduction of environmental dangers Good. I've been on about this for forever. Interplanetary jumpgates Interesting and probably a good thought. Essentially this sounds like recognition that they are not going to implement Elite and that even Elite doesn't really have a lot of long treks in it (some I'll grant you). So they are thinking they are better off creating smaller focused areas in space you can leap to where stuff happens and folks congregate. Contract system: inter-user contracts to harness user labor as well as NPC corporate contracts (i.e. 'missions') They been smoking the good shit with Neverdie by the sounds of it More information on resources and creatures Good. Easy to do and adds a lot of depth. A quick win. Ownership (estates, land areas etc.) with a larger range of customizable entry options Design your own door? User revenue from interactions with user-created content Turnstyles? Hubs with centralized facilities and features to encourage users to congregate Sounds like a good idea. Over the years Calypso has lost its key places where people congregated. Port Atlantis, that place with the turret where we used to sweat, Twin Peaks, Atlas Haven. Places like that where everyone used to hang out made the place feel lived in. Hopefully if they are rethinking the backend they can come up with a system that can actually handle a lot of people in one place. That being the case, they'd do well to congregate a lot of the shops and living areas together. Something akin to \"scrapping all the flats and moving them into the unused buildings at Port Atlantis\" would be a good start. In about a year we aim to have a fully playable part of the world with close-to-final visuals, core functionality and mechanics — enabling us to lay the foundations for future systems and gather your valuable feedback. Sounds like a good idea, build up a demo and actually get people to try it out first.\nHmm, seems I misunderstood what single shard meant. I thought it was another way of saying single server hence why I thought there was a contradiction...\nResources governed by consistent, clear rules Consistent : Acting or done in the same way over time, especially so as to be FAIR or accurate. Mindark with clear rules they respect ? Seem UNREAL ... Don't forget to hit the \"Respect The EULA Button\" Mindark, thanks. Mobs cross objects / Disappear and reapear in front of you in Unreal 5? (so like today) Mobs Ninja Exploit respawns attack you immediately on your back in Unreal 5 ? (so like today) Hyriuu Fly underground (only MA/Calypso flying mobs behave this way) in Unreal 5 ? (so like today) Mobs Fly Above obstacles in Unreal 5 ? (so like today) Target Lock Sensivity to 100% but anyway you get tons of misses in Unreal 5 ? (so like today) Move mouse and avatar stops shooting (huh you are so creative mindark to cheat us) in unreal 5 ? (so like today) Mobs cross each others to inflict more unfair damages in Unreal 5 ? (so like today) All players get unusual shit loot for few days and a \"lucky\" avatar gets 43 296 PED Daspletor Young in Unreal 5 ? (so like today) And we continue to get stucked on Walls, Trees, Rock, Ground, since 2003, and don't tell me that noone is able to fix this problem or it means that the GameBryo Engineers are IDIOTS, the CryEnfine Engineers are IDIOTS, and the Unreal 5 Engineers are IDIOTS (so like today). And I still play (so like so many old players hoping for a Mindark company doing things Honnestly and Fairly...) At least me I tell the Truth (Not like all those PCF AssLickers). If all those unfair features (cheats and exploits) could be removed, it would really be UNREAL ! But most those were already existing In GameBryo / Project Entropia and they have been improved to be worse, so a new engine... For blind people probably.\nthe evolution of core systems, such as hunting, mining and crafting Hmm ? You mean change the Camera System and Add options like the \"Target Lock Sensivity\" where we continue to get tons of dishonnest Misses . In the Project Entropia Times, Mindark was accusing the players and suggesting them to call their ISP because they were pretending those misses were not their fault... so what is the excuse today ? Desaligned Aim making us shoot or on the left, or on the right, this an absolutely disgusting exploit. I just cant believe you ask us to respect your rules... what rules if YOU mindark are the first to implement such totally unfair features... YOU should be locked ! And you dispaly yourself like if you are nice people... Not really. i wonder what kind of arguments you showed up against deathifier... Everyday I yell while playing : Who is the fucking idiot @ MA who made this totally BS target system !!! Whatever new feature you bring, it is each time in a cheat purpose... boring people, respect your rules ! Mining ? we lost so much that i'm without voice... The \"Market\" is completly ruined and crafting mainly turns around the Explosive crafting so so sad. At least to add totally disgusting invisible trees and rocks on the ground, is this the Evolution you are talking ? Remove the Hypocrit rule about Cheats and Exploits in the EULA would be a good Evolution. Or may be YOU could start to respect YOUR OWN RULES (after 20 years). the migration of items and value currently present in Entropia Universe Oh Really ? Like for example, Materials not dropping anymore (replaced by this totally DUMB shrapnel) to craft P5A Weapons, clearly killing the investments of players during years, and I took here only 1 example... from SO MANY... Preserve the Soul, Stay Fresh The goal of this evolution and migration is to preserve the soul of Entropia whilst staying fresh. To achieve this we will: Improve and refine the core features of Entropia Universe Appeal to both current and future users. Give me a call : I'll show you the REAL SOUL of Project Entropia that you seem to have forgotten and erased... I'll do things with Integrity to really improve the game and add evolutive features for the Pleasure of Customers ! Ak for CEO ! (no, no, stay cool man. Chill). Many key aspects of Entropia will remain the same: The same ? As what ? As what it used to be ? or what it has never been ? Bring back Taming like it was first designed, and add the Promissed stages 2 3 4. Bring back the Scanning profession (dead today) and fix the Scan vehicles, asked many times but never fixed. Bring back Loots to improve the RCE system that Mindark was SO PROUD to advertise the game. (Reduce this DUMB Shrapnel) Bring back paints for the Colorer Profession (Dead Today) Bring back Animal Skins for the Tailoring and Texturing Professions (Dead today) Bring back all Items necessary to craft for all our BluePrints taking dirt in our books because of this Shrapnel killing the economy. The world will be sci-fi themed and single shard I thought it was already since 2003 ? Too bad flying ships in the sky were removed as fast as they were added... In addition, we will continue to appeal to a niche segment by remaining: A sandbox MMORPG With a user-driven, real-cash economy Based on PED Sorry, is this a joke ? Continue you said ? to destroy everything and kill the RCE system that was GREAT in Project Entropia ? Read above to \"continue\" if you have lack of memories, I can help to bring back the Real Soul and Beating Heart of Entropia. Darkaruki was promissing but ... Ohhh Failed. Ak \"saviour of the universe\" ? \"He'll Save Everyone Of Us, He is a miracle, King of the Impossible\" ( Chill, chill Flash Gordon ). We will focus our efforts on worldbuilding to make exploring our worlds more stimulating and exciting. Exploring will become an end in itself! We will ? Long time the story line is empty me i would say... Less Blablabla and more action in the right direction could be a good start \"Mind\" \"Ark\". Yeah, the rest is just Blablabla going nowhere, just needed to add more text to make us feel there is more to read but... Relative value of items from Entropia to be kept Hard to believe. So many of our items completly devalued in purpose and systematically. Some items renammed and functions removed to become heavily more expensive to use and lose their value, like the Focus Chip and many other items... Introduction of environmental dangers Can feel promissing for a more realistic environment, but all I predict for such feature knowing our dear Friends Mind-Dark, is just more disgusting penalties like they love to add to the game, like if there was not enough cheats and disgusting buffs to dramatically damage our armors (ie dramatically increase the cost to play), or disable the ability to heal and make us die faster (which again dramatically increase the cost to play)... So the only realistic thing is mindark are greedy people always looking for more money to waste and less pleasure to play in this so called \"sci-fi world\". If it rains, will our armors get rusty ? Oh no Ak, dont give them more shit ideas !!! Interplanetary jumpgates Ready to kill the Space MotherShips market ? I heard someone was banned from the game because he was practising lower trip prices, so even if me I would heavily wish for such feature, Interplanetary jumpgates seem to me another promiss that will never see a day to come in the game... I remember in pre-vu 10, mindark telling us we would ride atrox with Taming, or we could trade mining deeds to let another player extract mining claims... but... Remove the space Fee between planets, to improve the RCE aspect, that looks more like \"kill planet partners while we do profits in same time\". Yeah, A Warm Hello to my Friends Deathifier & Neverdie, The Original FOMA Owner, Next Island, The Arkadia Team and the Gold Keys not working anymore. To all Land Areas Owners who saw their lands fucked by tons of mob spawns everywhere on Calypso, the cold shower after investing so much and trusting people they should never... And personnally, a real honnest \"Hello my Friend\" Rick England who was clearly screwed after investing real money in \"Compet\", and here I will say it again, Damn There Is Really No Police In Sweden ? How can such disgusting thing can happen ? Some people really should be in jail today... Our world is really filled of unscrupulous scammers... Roadmap We are currently focusing on Combat and Hunting; with Mining, Resource Gathering and Crafting to follow. Translation : we completly killed all cool features which were making the diversity and originality of Entropia, in the profit of Basic Systems that all MMO have... We are very good to talk in the wind and to be Sand Sellers, where no cool vision is in perspective. Ak.\nIs this refering to the original soul of Entropia, or the post-VU10 soul of Entropia? If the latter, I'd like to hear a definition of what the soul of Entropia is considered to be, because whatever it used to be never made it into VU10. In other words, fly below the radar in order to avoid being investigated for gambling. Gotcha. Well, it used to be. And then flying vehicles were introduced that removed all risk involved in exploration. Some of my fondest memories of the old PE were when I was a wee noob trying to make my way north to Zychion, but got stuck at an outpost south of it, courtesy of a bunch of Atroxes. After posting on the forums, a team came and bailed me out. Nowadays, one can simply fly from TP to TP and grab all points of interest that way. Thriving community, eh? Care to provide some numbers to back that statement? No? Didn't think so. Well, technically speaking, that exists already. However, MindArk carefully and deliberately fucked all that up. There are hundreds of components and items that do have a function and purpose. But they are intended for poorly thought-out parts or professions that became useless due to the very changes MindArk made. I still have a ton of animal leathers, but the tailoring profession is dead. I have countless blueprints and ingredients for components nobody in the thriving community uses. If this statement means that all of this garbage cluttering up all the inventories will be consolidated into a far lesser number of components that actually will be crucial in the natural progression of things, then there might be some hope. This just sounds like some middle-manager is barfing up a bunch of buzzwords. What is it you're actually trying to say? We used to have all this. People used oil barrels and objects to create art. For whatever reason, that got removed as an option by MindArk. Pretty much anything that was \"outside the box\" (i.e. outside of the intentional designs of the developer) is killed off. Sometimes for good reasons (the MindArk developers aren't particularly good at anticipating out how their designs can be exploited), and other times because it allows for players to enjoy their time inside the universe, without actually spending any PED.\nIt did amuse me that they started with the \"Holistic\" buzzword that all the corporate types were throwing about a few years ago in the hopes that no one would know what it meant and be impressed. It's only a wonder they didn't put phosfluorescently drive distinctive internal or \"organic\" sources on their roadmap. https://www.atrixnet.com/bs-generator.html You are welcome.\nThis can still happen if you've forgotten that you've put all your vehicles in PSU, as I discovered the other day.\nTricky on a noob budget I know. But some things I keep with me when out in the wilderness. 1. The emergency sword (way over my level but still does enough hurt to get me out of tight spots on occasion) 2. TP chip and mind essence 3. BigTP chip (again, way over my skill level and only used for emergencies - likely sending me somewhere entirely random but hopefully away from anything with sharp teeth) There is always the Calypso Rescue Team too. CRT channel I think.\nVery tricky indeed, especially as I have no TP chip of any kind and was seriously overloaded with almost worthless loot, so running or walking almost made no difference. In future I'll try and remember the CRT channel if I ever leave my vehs in psu again ;)"
|
<urn:uuid:7007baf1-58ad-40a4-9103-2d520d387474>
|
CC-MAIN-2024-51
|
http://entropiaplanets.com/threads/entropia-universe-unreal-development-blog.23181/#post-141121
|
2024-12-09T04:18:19Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00545.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.998841
|
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
In this paper, we will deliberate how to control home appliances, safety and security system using GSM technology by using android application through android mobile phone. We will also show that we can control the appliances even in the absence of an android phone by sending a normal SMS. The advantage of using GSM technology is that we can control the home appliances from remote places anywhere in the world. This system allows the owner to control the appliances and to receive a feedback status of the home appliances by sending instructions in form of SMS as well as through an android application. For the home security system we are using an antitheft reporting system which will report the owner by ringing an alarm and by sending an SMS. Also for the safety system in case of fire or gas leakage it will report the owner by sending a SMS and also by ringing an alarm. Thus by using GSM technology, it provides the wireless access to the devices to be controlled. Index Terms Microcontroller, GSM modem, sensors, appliance control, android app.
|
<urn:uuid:80d421a7-e6aa-472f-8f55-5800d1f4f584>
|
CC-MAIN-2024-51
|
http://mail.journalcra.com/article/gsm-based-home-automation-safety-and-security-system-using-android-mobile-phone-0
|
2024-12-09T03:17:05Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00545.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.998051
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Test: ARIA readonly grid (NVDA/Edge)
Expectation: columnheader role: MUST convey its role
Property | Value |
---|---|
Support | yes |
AT Name | NVDA |
AT Version | 2021.1 |
Browser Name | Edge |
Browser Version | 92 |
OS version | Windows 10 version 21h1 |
Date | 2021-07-28 |
Notes |
Commands and Output
These are specific commands used to access the target element in the test, along with the resulting output.
Command | Result | Output | Notes |
---|---|---|---|
forms_mode_keyboard_command (<keyboard command>) | pass | "name, column header, row 1, name, column 2" |
|
<urn:uuid:be5654af-624f-4264-a9cf-1d09cdfdcd4c>
|
CC-MAIN-2024-51
|
https://a11ysupport.io/tests/tech__aria__grid/aria__columnheader_role/convey_role/nvda/edge
|
2024-12-09T03:10:42Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00545.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.729498
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Articles | Volume 11, issue 2
https://doi.org/10.5194/tc-11-707-2017
© Author(s) 2017. This work is distributed under
the Creative Commons Attribution 3.0 License.
the Creative Commons Attribution 3.0 License.
https://doi.org/10.5194/tc-11-707-2017
© Author(s) 2017. This work is distributed under
the Creative Commons Attribution 3.0 License.
the Creative Commons Attribution 3.0 License.
Impact of icebergs on net primary productivity in the Southern Ocean
Shuang-Ye Wu
CORRESPONDING AUTHOR
School of Geographic and Oceanic Sciences, Nanjing University, Nanjing, 210093, China
Department of Geology, University of Dayton, Dayton, Ohio, 45469, USA
Viewed
Total article views: 4,571 (including HTML, PDF, and XML)
Cumulative views and downloads
(calculated since 15 Jul 2016)
HTML | XML | Total | BibTeX | EndNote | |
---|---|---|---|---|---|
2,483 | 1,868 | 220 | 4,571 | 164 | 196 |
- HTML: 2,483
- PDF: 1,868
- XML: 220
- Total: 4,571
- BibTeX: 164
- EndNote: 196
Total article views: 4,068 (including HTML, PDF, and XML)
Cumulative views and downloads
(calculated since 17 Mar 2017)
HTML | XML | Total | BibTeX | EndNote | |
---|---|---|---|---|---|
2,233 | 1,646 | 189 | 4,068 | 140 | 166 |
- HTML: 2,233
- PDF: 1,646
- XML: 189
- Total: 4,068
- BibTeX: 140
- EndNote: 166
Total article views: 503 (including HTML, PDF, and XML)
Cumulative views and downloads
(calculated since 15 Jul 2016)
HTML | XML | Total | BibTeX | EndNote | |
---|---|---|---|---|---|
250 | 222 | 31 | 503 | 24 | 30 |
- HTML: 250
- PDF: 222
- XML: 31
- Total: 503
- BibTeX: 24
- EndNote: 30
Cited
24 citations as recorded by crossref.
- The atmospheric iron variations during 1950–2016 recorded in snow at Dome Argus, East Antarctica K. Liu et al. 10.1016/j.atmosres.2020.105263
- Glacial Iron Sources Stimulate the Southern Ocean Carbon Cycle C. Laufkötter et al. 10.1029/2018GL079797
- Evaluation of geomagnetic relative palaeointensity as a chronostratigraphic tool in the Southern Ocean: Refined Plio-/Pleistocene chronology of IODP Site U1533 (Amundsen Sea, West Antarctica) B. Hopkins et al. 10.1016/j.quascirev.2023.108460
- Antarctic iceberg melt rate variability and sensitivity to ocean thermal forcing E. Enderlin et al. 10.1017/jog.2023.54
- Collapse of a giant iceberg in a dynamic Southern Ocean marine ecosystem: In situ observations of A-68A at South Georgia G. Tarling et al. 10.1016/j.pocean.2024.103297
- Remarkable structural resistance of a nanoflagellate-dominated plankton community to iron fertilization during the Southern Ocean experiment LOHAFEX I. Schulz et al. 10.3354/meps12685
- Sensitivity of ocean biogeochemistry to the iron supply from the Antarctic Ice Sheet explored with a biogeochemical model R. Person et al. 10.5194/bg-16-3583-2019
- Bacterial Metabolic Response to Change in Phytoplankton Communities and Resultant Effects on Carbon Cycles in the Amundsen Sea Polynya, Antarctica B. Kim et al. 10.3389/fmars.2022.872052
- The iron records and its sources during 1990–2017 from the Lambert Glacial Basin shallow ice core, East Antarctica Z. Du et al. 10.1016/j.chemosphere.2020.126399
- Variations and Environmental Controls of Primary Productivity in the Amundsen Sea J. Feng et al. 10.3389/fmars.2022.891663
- The history of a cluster of large icebergs on leaving the Weddell Sea pack ice and their impact on the ocean G. Bigg & R. Marsh 10.1017/S0954102022000517
- Observing the disintegration of the A68A iceberg from space A. Braakmann-Folgmann et al. 10.1016/j.rse.2021.112855
- Highly variable iron content modulates iceberg-ocean fertilisation and potential carbon export M. Hopwood et al. 10.1038/s41467-019-13231-0
- Antarctic ecosystems in transition – life between stresses and opportunities J. Gutt et al. 10.1111/brv.12679
- Antarctic petrels ‘on the ice rocks’: wintering strategy of an Antarctic seabird K. Delord et al. 10.1098/rsos.191429
- Variations in export production, lithogenic sediment transport and iron fertilization in the Pacific sector of the Drake Passage over the past 400 kyr M. Toyos et al. 10.5194/cp-18-147-2022
- Impact of Giant Iceberg A68A on the Physical Conditions of the Surface South Atlantic, Derived Using Remote Sensing R. Smith & G. Bigg 10.1029/2023GL104028
- Dissolved iron concentration in the recent snow of the Lambert Glacial Basin, Antarctica K. Liu et al. 10.1016/j.atmosenv.2018.10.011
- Quantifying dissolution rates of Antarctic icebergs in open water O. Orheim et al. 10.1017/aog.2023.26
- Southern Ocean food-webs and climate change: A short review and future directions J. Queirós et al. 10.1371/journal.pclm.0000358
- The role of biota in the Southern Ocean carbon cycle P. Boyd et al. 10.1038/s43017-024-00531-3
- Direct link between iceberg melt and diatom productivity demonstrated in Mid-Pliocene Amundsen Sea interglacial sediments H. Furlong & R. Scherer 10.5194/jm-43-269-2024
- Tracking changes in the area, thickness, and volume of the Thwaites tabular iceberg “B30” using satellite altimetry and imagery A. Braakmann-Folgmann et al. 10.5194/tc-15-3861-2021
- Glacial interglacial variations in the natural iron fertilization during the low sea ice periods along the eastern continental margin of Antarctica T. Sarathchandraprasad et al. 10.1016/j.scitotenv.2024.176745
24 citations as recorded by crossref.
- The atmospheric iron variations during 1950–2016 recorded in snow at Dome Argus, East Antarctica K. Liu et al. 10.1016/j.atmosres.2020.105263
- Glacial Iron Sources Stimulate the Southern Ocean Carbon Cycle C. Laufkötter et al. 10.1029/2018GL079797
- Evaluation of geomagnetic relative palaeointensity as a chronostratigraphic tool in the Southern Ocean: Refined Plio-/Pleistocene chronology of IODP Site U1533 (Amundsen Sea, West Antarctica) B. Hopkins et al. 10.1016/j.quascirev.2023.108460
- Antarctic iceberg melt rate variability and sensitivity to ocean thermal forcing E. Enderlin et al. 10.1017/jog.2023.54
- Collapse of a giant iceberg in a dynamic Southern Ocean marine ecosystem: In situ observations of A-68A at South Georgia G. Tarling et al. 10.1016/j.pocean.2024.103297
- Remarkable structural resistance of a nanoflagellate-dominated plankton community to iron fertilization during the Southern Ocean experiment LOHAFEX I. Schulz et al. 10.3354/meps12685
- Sensitivity of ocean biogeochemistry to the iron supply from the Antarctic Ice Sheet explored with a biogeochemical model R. Person et al. 10.5194/bg-16-3583-2019
- Bacterial Metabolic Response to Change in Phytoplankton Communities and Resultant Effects on Carbon Cycles in the Amundsen Sea Polynya, Antarctica B. Kim et al. 10.3389/fmars.2022.872052
- The iron records and its sources during 1990–2017 from the Lambert Glacial Basin shallow ice core, East Antarctica Z. Du et al. 10.1016/j.chemosphere.2020.126399
- Variations and Environmental Controls of Primary Productivity in the Amundsen Sea J. Feng et al. 10.3389/fmars.2022.891663
- The history of a cluster of large icebergs on leaving the Weddell Sea pack ice and their impact on the ocean G. Bigg & R. Marsh 10.1017/S0954102022000517
- Observing the disintegration of the A68A iceberg from space A. Braakmann-Folgmann et al. 10.1016/j.rse.2021.112855
- Highly variable iron content modulates iceberg-ocean fertilisation and potential carbon export M. Hopwood et al. 10.1038/s41467-019-13231-0
- Antarctic ecosystems in transition – life between stresses and opportunities J. Gutt et al. 10.1111/brv.12679
- Antarctic petrels ‘on the ice rocks’: wintering strategy of an Antarctic seabird K. Delord et al. 10.1098/rsos.191429
- Variations in export production, lithogenic sediment transport and iron fertilization in the Pacific sector of the Drake Passage over the past 400 kyr M. Toyos et al. 10.5194/cp-18-147-2022
- Impact of Giant Iceberg A68A on the Physical Conditions of the Surface South Atlantic, Derived Using Remote Sensing R. Smith & G. Bigg 10.1029/2023GL104028
- Dissolved iron concentration in the recent snow of the Lambert Glacial Basin, Antarctica K. Liu et al. 10.1016/j.atmosenv.2018.10.011
- Quantifying dissolution rates of Antarctic icebergs in open water O. Orheim et al. 10.1017/aog.2023.26
- Southern Ocean food-webs and climate change: A short review and future directions J. Queirós et al. 10.1371/journal.pclm.0000358
- The role of biota in the Southern Ocean carbon cycle P. Boyd et al. 10.1038/s43017-024-00531-3
- Direct link between iceberg melt and diatom productivity demonstrated in Mid-Pliocene Amundsen Sea interglacial sediments H. Furlong & R. Scherer 10.5194/jm-43-269-2024
- Tracking changes in the area, thickness, and volume of the Thwaites tabular iceberg “B30” using satellite altimetry and imagery A. Braakmann-Folgmann et al. 10.5194/tc-15-3861-2021
- Glacial interglacial variations in the natural iron fertilization during the low sea ice periods along the eastern continental margin of Antarctica T. Sarathchandraprasad et al. 10.1016/j.scitotenv.2024.176745
Discussed (final revised paper)
Latest update: 08 Dec 2024
Short summary
The primary productivity in the Southern Ocean (SO) is limited by the amount of iron available for biological activities. Recent studies show that icebergs could be a main source of iron to the SO. Based on remote sensing data, our study shows that iceberg presence is associated with elevated levels of ocean productivity, particularly in iron-deficient regions. This impact could serve as a negative feedback to the climate system.
The primary productivity in the Southern Ocean (SO) is limited by the amount of iron available...
|
<urn:uuid:4ac41b1e-9896-438c-901c-9230e76214f9>
|
CC-MAIN-2024-51
|
https://tc.copernicus.org/articles/11/707/2017/tc-11-707-2017-metrics.html
|
2024-12-09T03:53:17Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00545.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.652391
|
{
"abbr": [
"by",
"by",
"by",
"by"
],
"in_footer": [
true,
true,
false,
false
],
"in_head": [
false,
false,
false,
false
],
"location": [
"a_tag",
"a_tag",
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0",
"3.0",
"3.0"
]
}
|
The new season of Stranger Things is coming May 27. But before that, fans can interact with the show while ordering pizza, putting on makeup and buying Doritos.
As the fourth season of the hit streaming sci-fi-horror drama, approaches, Netflix is rolling out a series of brand collaborations to draw the public's attention. But it's not just putting the Stranger Things name on products. It's creating new ways to interact with the show, and its characters.
Let’s take a look at the recent drops:
Mind ordering with Domino’s
(Image: Domino's)
Domino’s and Netflix went into the lab to create a new app.
The new Mind Ordering app is designed to place subjects inside Hawkins National Lab, the secretive government lab from the show. In this immersive environment, they can explore the lab and discover the Noid or Demogorgon along the way.
But users can really turn it up to Eleven by ordering pizza without even pressing a button. Thanks to facial recognition and eye-tracking technology, users can make gestures and expressions to place a Domino’s order. Taking things one step further into the show, a pizza ordered with the app is delivered in a retro Domino’s box.
Domino’s and Netflix also rolled out a landing page for the app, complete with a backstory video featuring Dustin and Lucas.
M·A·C X Stranger Things
(Photo: M·A·C Cosmetics)
Stranger Things now has its own makeup collection thanks to a collab with the beauty brand M·A·C Cosmetics.
Though all roads lead to ‘80s looks for this collab, it has a choose-your-own-adventure feel. Users can pick between the human world and the upside down world, or choose between the Hawkins Class of 1986 palette and the Void Eye Palette. It also has shades specific to the show. M·A·C’s famous Lipglass has Eerie El, while powder blush offers a shade called Friends Don’t Lie.
“Coming of age in a small town in the 80s, I completely relate to the vibe and characters of Stranger Things,” Fatima Thomas, M·A·C senior artist, said in a news release. “This collaboration perfectly captures the essence of the era: spirited, adventurous and fun.”
The limited edition collection is available at Ulta Beauty, Ulta’s website, and M·A·C’s website.
A virtual concert with Doritos
(Photo: Doritos)
You’ve got the makeup and ordered a pizza. Now you’re ready to take in a virtual concert.
This tie-in with Doritos features activations on multiple levels. There’s limited edition packaging of Doritos and Doritos 3D Crunch that’s particular to Stranger Things. There’s also a limited edition flavor for the occasion. Dubbed Doritos 3D Crunch Three Cheese, it mixes cheddar, Monterey Jack and parmesan cheese.
But these bags are not merely a vessel for chips. They are also a portal through which fans can reserve a ticket for "Live From The Upside Down,” a virtual concert that is set to be held on June 23. It features 80s stars The GoGo’s, Soft Cell and Corey Heart performing their classic material from the era. Plus, one of the bands will perform with current pop icon Charlie XCX.
As with the Domino’s collab, this also has a backstory. Per Domino’s press release:
The story goes that back in 1986, a tour bus crashed near Hawkins, Ind., headed to Doritos Music Fest '86 – the greatest concert that never happened. The musicians disappeared into another dimension and the show was canceled… until now.
Stranger Things plant-based nuggets
(Photo: Skinny Butcher)
The plant-based trend in food can't be overlooked, even when it comes to streaming TV activations. Skinny Butcher rolled out a line of Stranger Things-themed plant-based nuggets ahead of the new season, making the vegan eats available at Walmart stores nationwide. It's a chance for the brand to tout its Crazy Crispy Chick'n Nuggets, which replace chicken with pea protein and a progressive vegetable fiber strain. It gives Stranger Things a place in the freezer section, and appeals to those who are opting for a meat alternative.
It's also a chance to bring noteriety to the brand itself, which is the result of a collaboration between former Garden Fresh Gourmet Vice Chairman Dave Zilko and the Los Angeles-based Golden West Food Group.
"No secret experiments were conducted here – just some ingenuity from the team at Golden West Food Group!" Zilko quipped in the announcement.
What’s the takeaway?
For one, Netflix is putting lots of marketing resources behind Stranger Things’ latest season. For another, its team is getting creative, and the teams at some big brands are right there with them, ready to do something new.
Going a level deeper, these collaborations show how marketing doesn't have to limit brands to a single category. A promotion for a streaming TV show is crossing into food and beauty. It’s bringing in tech, music and retail. Each individual partnership in turn offers a way for Stranger Things to reach a unique audience. After all, the Venn diagram overlap between the Doritos crowd and the Skinny Butcher crowd probably isn't too big. With each collaboration, Netflix in turn creates additional mediums where Stranger Things is represented, making it seem ubiquitous.
These collaborations also show brand strength for Stranger Things itself. To have the leeway to create these new experiences, a brand must already be recognizable enough to build around.
Stranger Things’ brand has a pair of elements, which play off each other. For one, it has recognizable characters and vocabulary that brands can have fun with. Zilko's quote was just one of many examples of cheeky comments in press releases for these collaborations.
The show is also highly associated with 80s nostalgia. This is present throughout these collaborations, with the vintage pizza box, mall-era makeup shades and, of course, the 80s bands playing at the virtual concert.
It’s this blend of the recognizable and the new that has driven success for Stranger Things to date.
Stranger Things’ marketing has gotten attention in its own right before with an interactive billboard, an off-menu Demogorgon Frappuccino at Starbucks and an unexpected boost for Eggo waffles. With collaborations that bring together other brands and interactive media, it continues to break new ground.Trending in Marketing
On the Move has the latest from Amazon, Lovesac and more.
This week, leadership is changing at GameStop, Sorel and Beautycounter. Meanwhile, key executives are departing at Amazon, Wayfair and Lovesac.
Here’s a look at the latest shuffles:
GameStop CEO fired
GameStop announced the termination of Matthew Furlong as CEO on Wednesday. A brief statement did not provide a reason for the firing.
With the move, Chewy founder and activist investor Ryan Cohen was named executive chairman of the video game retailer. Cohen will be responsible for capital allocation and overseeing management.
It came as the company reported a 10% year-over-year decline in net sales for the first quarter. Meanwhile, the company’s net loss improved by 62%.
In an SEC filing, GameStop further added this “We believe the combination of these efforts to stabilize and optimize our core business and achieve sustained profitability while also focusing on capital allocation under Mr. Cohen’s leadership will further unlock long-term value creation for our stockholders.”
Cohen was revealed as GameStop's largest shareholder when he disclosed a 10% stake in the retailer in 2020. GameStop went on to become a leading name in the meme stock rise of 2021.
Sorel president steps down
Mark Nenow is stepping down as president of the Sorel brand in order to focus on his health.
After rising to the role in 2015, Nenow spearheaded a transformation of Columbia Sportswear-owned Sorel from a men’s workwear brand to a fashion-focused brand that led with a women’s offering of boots, sandals and sneakers.
“Mark led the brand to sales of $347 million in net sales in 2022,” said Columbia Sportswear CEO Tim Boyle, in a statement. “His leadership has been invaluable to this company, and we wish him the very best.”
Columbia will conduct a search for Nenow’s replacement. Craig Zanon, the company’s SVP of emerging brands, will lead Sorel in the interim.
Beautycounter appoints interim CEO
Beautycounter appointed board member Mindy Mackenzie as interim CEO, succeeding Marc Rey. According to the brand, Rey and the board “mutually decided to transition to a new phase of leadership for Beautycounter.”
McKenzie, a former executive at Carlyle, McKinsey and Jim Beam, will lead the company as it conducts a search for a permanent CEO. Additionally, former Natura & Co CEO Roberto Marques will join Beautycounter’s board as chair.
As part of the transition, Nicole Malozi is also joining the company as chief financial officer. She brings experience from Tatcha, Nike, and DFS Group Limited.
Amazon’s North America fulfillment chief departs
Melissa Nick, a VP of customer fulfillment for North America at Amazon, will leave the company, effective June 16, CNBC reported. Nick joined the company in 2014, and oversaw a region that included nearly 300 fulfillment centers. After doubling its supply chain footprint during the pandemic, Amazon recently reorganized its fulfillment operations to take a regional approach, as opposed to a national model that often resulted in items shipping across the country.
Wayfair’s chief commercial officer to retire
Jon Blotner (Courtesy photo)
Steve Oblak will retire from the role of chief commercial officer at home goods marketplace Wayfair. With the move, Jon Blotner will be promoted to chief commercial officer.
"Steve has served as a critical part of our leadership team and played a pivotal role in Wayfair's growth, helping us grow from a $250 million business when he joined to $12 billion in net revenue today,” said Wayfair CEO Niraj Shah, in a statement. “He oversaw countless milestones, from helping to launch the Wayfair brand as we brought together hundreds of sites into a single platform, to launching new categories, business lines, and geographies while overseeing our North American and European businesses, to leading our debut into physical retail.”
Blotner previously oversaw exclusive and specialty retail brands, as well as digital media at Wayfair. Before joining the company, he served as president of Gemvara.com prior to its 2016 acquisition by Berkshire Hathaway.
Lovesac announces CFO transition
Furniture retailer Lovesac said Donna Dellomo will retire as EVP and CFO, and move to an advisory role, effective June 30. Dellomo was with Lovesac for six years.
Keith Siegner was appointed as the next EVP and CFO. He brings experience as CFO of esports company Vindex, as well as executive roles at Yum! Brands, UBS Securities and Credit Suisse.
Additionally, Jack Krause will retire from the role of chief strategy officer, effective June 30. His responsibilities will be divided between CEO Shawn Nelson and president Mary Fox.
“Since joining Lovesac, Jack has played an instrumental role in transforming the Company into a true omni channel retailer by helping expand our physical touchpoints and digital platform as we continue to disrupt the industry,” said Nelson, in a statement.
NRF adds board members
The National Retail Federation announced the addition of five new board members. They include:
- Marguerite Adzick, founder and CEO, Addison Bay
- Harley Finkelstein, president, Shopify
- Ian Kahn, partner, PwC
- Sharon Leite, CEO, Ideal Image
- Carrie Tharp, VP, strategic industries, Google Cloud
|
<urn:uuid:fc1e67d8-3dd4-4f81-b6b2-f485047b543a>
|
CC-MAIN-2024-51
|
https://thecurrent.media/stranger-things-season-4-collabs
|
2024-12-09T04:11:29Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00545.warc.gz
|
by-sa
|
2.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.998555
|
{
"abbr": [
"by-sa"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"2.0"
]
}
|
An Evaluation of the Regulatory Review System in the Southern African Development Community Work Sharing Initiative (ZaZiBoNa): Enhancing the Review Process and Patients’ Access to Medicines
Abstract
Countries on the African continent have varying capacities to regulate medical products, although all 54 countries, except one, have a regulatory authority or department within the ministry of health responsible for the regulation of medicines. These challenges in capacity have led to protracted timelines delaying access to quality assured medicines as well as the problem of substandard and falsified medicines. To mitigate these challenges, regulatory harmonisation and collaboration through the pooling of expertise and resources of the regulatory authorities in the regional economic communities (RECs) has been implemented through the African Medicines Registration Harmonisation Initiative (AMRH), established in 2009. One such collaboration is the Southern African Development Community work sharing initiative, ZaZiBoNa.
The aim of this research programme was to evaluate the regulatory review system in the ZaZiBoNa initiative with a view to enhancing the review process and ensuring patients’ access to medicines. This was achieved through a review of the history of the ZaZiBoNa initiative focusing on what had been realised in its eight years of operation and what still needed to be achieved. The registration process of the agency responsible for coordinating ZaZiBoNa, MCAZ, was evaluated and compared with mature regulatory authorities of comparable size in order to benchmark best practices. The regulatory review processes of the individual participating countries that contribute to the ZaZiBoNa reviews and GMP inspections were evaluated and strategies for alignment proposed. Lastly, the applicants’ and regulatory authorities’ views on the effectiveness and efficiency of the ZaZiBoNa initiative were evaluated. A mixed methods research design, incorporating both quantitative and qualitative methods was selected. A purposive sampling technique was used for data collection using techniques such as narrative literature review, self-administered questionnaires and semi-structured interviews.
The results of the evaluation of the MCAZ indicated that the agency successfully implemented the three review models and was largely able to achieve comparable timelines to mature regulatory agencies by using reliance. However, the results also showed that in its current capacity the MCAZ was not able to achieve its target timelines due to issues related to Covid-19 pandemic. The results of the evaluation and comparison of the regulatory review processes of the individual participating countries showed that although the processes were similar, there was great variation among the countries in the target timelines set for key milestones and the frequency of expert committee meetings which contributed to the differences in the implementation of ZaZiBoNa recommendations by member countries. The results of the evaluation of the ZaZiBoNa initiative by regulatory authorities and pharmaceutical companies documented the successes and challenges of this initiative as well as measures that might improve its effectiveness and efficiency. The benefits and challenges to regulators, applicants and patients were also identified. Overall, the results of these studies culminated in the development of a proposed improved model for the ZaZiBoNa initiative.
This research programme has provided insight into the regulatory review processes of low-and-middle income countries in the SADC region and how these impact the ZaZiBoNa initiative. The evaluation of the initiative by regulatory agencies and pharmaceutical industry provides valuable stakeholder feedback which if implemented will enhance the review process and patients’ access to medicines. This programme of research has presented, in a vital piece of work, key recommendations for the improvement of the regulatory review system in ZaZiBoNa including a proposed improved new model.
Publication date
2022-07-14Funding
Default funderDefault project
Other links
http://hdl.handle.net/2299/25858Metadata
Show full item recordThe following license files are associated with this item:
|
<urn:uuid:61452d79-c26d-4440-8181-d913a3901c74>
|
CC-MAIN-2024-51
|
https://uhra.herts.ac.uk/handle/2299/25858
|
2024-12-09T04:08:00Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00545.warc.gz
|
by
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.993465
|
{
"abbr": [
"by",
"by"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"3.0"
]
}
|
2020- 2022 Policy Process | Green Party of Canada
Where GPC membership collaborates to develop our policies
We use cookies to ensure the basic functionalities of the website and to enhance your online experience. You can configure and accept the use of the cookies, and modify your consent options, at any time.
These cookies enable key functionality of the website and help to keep its users secured. They are automatically saved in the browser and cannot be disabled.
These cookies allow the website to remember the choices you have made in the past on this website to provide a more personalized experience for the website users.
These cookies are used to measure and analyse the website audience to help improve the website.
These cookies collect information about how you use the website and they can be utilized to provide you more personalized marketing across the different websites you use.
Where GPC membership collaborates to develop our policies
You need to enable all cookies in order to see this content.
Change cookie settings
|
<urn:uuid:76ecee5e-96a3-4794-9e69-33bc7842eea6>
|
CC-MAIN-2024-51
|
https://wedecide.green.ca/processes/Policy2021/f/275/proposals/2392/versions?
|
2024-12-09T05:02:34Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00545.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.999085
|
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
New 5D Hyperchaotic System Derived from the Sprott C System: Properties and Anti Synchronization
Abstract:
This study introduces a new ten-term 5-D hyperchaotic system, derived from the 3-D Sprott C system. The proposed system has coexisting two attractors: the self-excited and hidden attractors. This system exhibits a rich array of characteristics, taking inspiration from various forms of equilibrium points, stable focus-nodes, saddle-focus, and non-hyperbolic unstable points. These features are shown to be dependent on parameter adjustments. The coexistence of chaotic and hyperchaotic attractors within a 5-D system coupled with three types of equilibrium points is an intriguing phenomenon. A spectrum of numerical methodologies, including phase portraits, computation of Lyapunov exponent, estimation of Lyapunov dimension, and multistability analysis, have been employed to effectively illustrate the diverse attractors. The stability theory is utilized for investigating the synchronization problem, a topic that is elucidated in depth. An assortment of dynamical behavior, such as hyperchaotic, hyperchaotic with 2-tours, chaotic, and chaotic with 2-tours, is recognized. Validation of the primary findings is conducted via theoretical and numerical simulations, fortifying the theoretical conclusions, with numerical simulations executed using MATLAB2021.
1. Introduction
Chaotic and hyperchaotic systems have garnered significant attention from the scientific community in the recent past, due to their promising applicability in diverse areas, including but not limited to, cryptosystems, data encryption [1], [2], [3], [4], neural networks [5], synchronization [6], robotics [7], and electronic circuits [8]. The concept of a hidden attractor was first unveiled by Kuznetsov et al. in 2010, but it remained relatively unnoticed until the development of Chua's circuit by Leonov et al. [9] in 2011. Consequently, systems are now generally classified as possessing either self-excited or hidden attractors. Notably, renowned classical 3-D systems such as the Lorenz system [10], Rosslers system [11], and most Sprott systems (with the exception of the Sprott A system) [12], harbor self-excited attractors.
Hidden attractors in dynamical systems can be categorized into three types [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], whereas self-excited attractors conform to one type [25], [26], [27], [28], [29], [30], as depicted in Figure 1. However, the existence of systems incorporating both self-excited and hidden attractors has largely been overlooked in prior research [31]. This gap in knowledge prompted the unveiling of a unique, relatively simple 5-D system showcasing coexistence of multiple attractors and a spectrum of behaviors. A tabulated summary of various 5-D systems with self-excited and hidden attractors is presented in Table 1. This study contributes to the field by introducing:
• A novel 5-D hyperchaotic system, derived from the 3-D Sprott C system.
• This system harbors two fundamental types of multi-attractors (self-excited and hidden).
• The presence of two equilibria points, stable and unstable, lends to a variety of attractors.
• Simplicity is showcased in this system through its composition of merely ten terms, as exhibited in Table 1.
• It bears three positive Lyapunov exponents and possesses a higher Largest Kaplan-York Dimension in comparison to ten other systems, as elucidated in Table 1.
• The system comprises three types of equilibria points: focus-nodes, saddle-focus, and non-hyperbolic.
• Implementation of anti-synchronization is demonstrated.
No. | System Behavior | No.+ve LEs | No. Term | Lyapunov Dimension $D_L$ | Attractors Behavior | References |
1 | Hyperchaotic | n-3 | 17 | 3.9785 | Self-excited | 2018 [32] |
2 | Hyperchaotic | n-3 | 17 | 3.0011 | Hidden | 2019 [18] |
3 | Hyperchaotic | n-2 | 15 | 4.0502 | Hidden | 2015 [33] |
4 | Chaotic | n-4 | 13 | ------ | Hidden | 2020 [16] |
5 | Hyperchaotic | n-3 | 13 | 4.0216 | Hidden | 2018 [34] |
6 | Hyperchaotic | n-3 | 13 | 4.0216 | Hidden | 2019 [35] |
7 | Hyperchaotic | n-2 | 12 | 4.0669 | Self-excited | 2009 [36] |
8 | Hyperchaotic | n-3 | 11 | 3.1899 | Hidden | 2021 [37] |
9 | Chaotic | n-4 | 9 | 4.002 | Hidden | 2022 [38] |
10 | Hyperchaotic | n-2 | 13 | 4.189 | Self-excited | 2022 [39] |
11 | Hyperchaotic | n-2 | 10 | 4.3801 | Multi-Attractors (Hidden & Self-excited) | This work |
2. Derivation of the Novel 5D Hyperchaotic System
In his seminal work in 1994, Sprott presented nineteen simple chaotic systems, inclusive of the Sprott C system, which can be represented as follows [12]:
where, $x_1, x_2$, and $x_3$ are variables of the system. This system presents two equilibria points $E_{1,2}( \pm 1, \pm 1,0)$. With Lyapunov exponents of the chaotic system $\mathit{LE}_{\textit {i}}=(0.163,0,-1.163)$, and the corresponding Lyapunov dimension $\left(D_L=2.140\right)$. The roots $\lambda_1=-1, \lambda_2=\mp 1.4142 i$, therefore, classify the system's equilibrium points as non-hyperbolic and unstable.
Expanding upon system (1) and leveraging the principles of the state feedback control [39], [40] and coupling strategy [40], [41], [42], a new 5D hyperchaotic system was devised, expressed as follows:
This system (2) encompasses ten terms, with $\mathit{x}_1, \mathit{x}_2, \mathit{x}_3, \mathit{x}_4, \mathit{x}_5$ as variables, a, b, and c, p are coupling and control parameters, respectively $(c, b \neq 0)$. It can be observed in Figure 2 that the 5-D system (2) demonstrates hyperchaotic behavior when parameters and initial conditions (ICs) from Eq. (3) and Eq. (4) are applied:
3. Dynamic Properties of New System
The dynamic characteristics of the newly proposed system, System (2), were investigated. By solving the following equations, derived from System (2):
Two equilibrium points, denoted $E_{1,2}$, were determined to be
System (2)'s Jacobian matrix at point $E_1$ is given by
The corresponding characteristic equation via the law $|J-\lambda I|=0$ is
System (2) can be characterized as either conservative or dissipative, contingent upon the trace of Matrix (7), which is parameterized by b, as given by
System (2) manifests as a dissipative system for $b<1$, conservative for $b=1$, and unbounded if $b>1$. Crucial roles in dictating the system's stability are played by parameters $b$ and $c$, as illuminated by Theorem 1.
Theorem 1. Stability of System (2) can be adjudicated by parameters $b$ and $c$, given that $p$ is set to 1, as follows:
• System (2) achieves stability if $b \in(-\infty, 0)$ and $c \in(-0.26376,0)$.
• System (2) is unstable and non-hyperbolic for $b=0$.
• System (2) is unstable and unbounded for $b \in(0,1)$.
The proof was derived by solving the characteristic Eq. (8) to attain the following equation:
where, $A=1, B=3+\mathrm{c}, C=2-2 \mathrm{c}$, and $D=-2 \mathrm{c}$.
Based on Routh–Hurwitz criterion for a fourth order system [43], several conditions must be met from Eq. (10) to ensure system stability.
$\left\{\begin{array}{l}A > 0 \\ D > 0 \\ (A B-C) C-A^2 D > 0 \\ A B-C > 0\end{array}\right.$
•$\rightarrow A=1 > 0$
•$\rightarrow D > 0 \Rightarrow-2 c > 0 \Rightarrow c < 0$
•$\rightarrow A B-C > 0 \Rightarrow 3+c-(2-2 c) > 0 \Rightarrow c > -\frac{1}{3}$
•$\rightarrow(A B-C) C-A^2 D > 0 \Rightarrow(1+3 c)(2-2 c)-(-2 c) > 0 \Rightarrow 1+3 c-3 c^2 > 0 \Rightarrow-0.2637 < c$
$< 1.2637 \Rightarrow c \in(-0.2637,1.2637)$
The intersecting conditions $c < 0, c > -1 / 3$, and $c \in(-0.2637,1.2637)$ yield the range $\mathrm{c} \in(-0.2637,0)$. Under these conditions, the stability of system (2) is assured given a parameter value of $b$ within the range $(-\infty, 0)$. Notably, an instability is introduced to system (2) when $b$ equals 0, due to the presence of a non-hyperbolic root. Additionally, system (2) presents instability for parameter values within the range $b \in(0,1)$ as the presence of a positive root results in unbounded instability.
Remark 1. The insertion of $b=-1$ and $p=1$ into Eq. (8) enables a classification of the attractors for system (2). The characteristic Eq. (8), with a substituted value of $c=-0.1$ within the range of (-0.2637,0), results in the equation:
\[(-1-\lambda)\left(\lambda^4+\lambda^3+2.9 \lambda^2+2.2 \lambda+0.2\right)=0\]
This equation yields the roots: $\lambda_1=-1, \lambda_2=-0.1050, \lambda_3=-0.7121, \lambda_{4,5}=-0.0915 \mp 1.6332 i$. The negative nature of the roots $\lambda$ directs the system's orbits towards the fixed point, thus stabilizing system (2). The roots thereby classify the system as Focus-node, indicative of hidden attractors.
In contrast, the insertion of $c=-0.3$, which falls outside the range (-0.2637,0), into the characteristic Eq. (8) yields:
\[(-1-\lambda)\left(\lambda^4+\lambda^3+2.7 \lambda^2+2.6 \lambda+0.6\right)=0\]
Solving the equation gives the roots: $\lambda_1=-1, \lambda_2=-0.3423, \lambda_3=-0.6999, \lambda_{4,5}=0.0211 \mp 1.5824 i$. Due to the positive real part of the complex roots $\lambda_{4,5}$, the system classifies as Saddle-Focus, leading to the instability of system (2), thus, suggesting a Self-excited system.
In the mathematical field of differential equations and dynamical systems, one encounters various types of equilibrium points, namely saddle-focus, node-focus, and non-hyperbolic points.
• A Saddle-Focus point, a critical juncture, presents a unique characteristic within the linearized system: it contains one eigenvalue with a positive real part and two complex conjugate eigenvalues with a non-zero real part. Geometrically, the trajectories proximal to a saddle-focus point demonstrate a blend of saddle-like and spiral-like behaviour.
• On the other hand, a Node-Focus point emerges as a critical juncture wherein the linearized system possesses two complex conjugate eigenvalues with negative real parts and non-zero imaginary parts. The distinguishing factor here is the trajectory behaviour, which solely exhibits a spiral-like movement without any semblance of saddle-like behaviour.
• Lastly, non-hyperbolic points are critical junctures in the linearized system, bearing at least one eigenvalue with a zero real part. The geometric behaviour observed near non-hyperbolic points tends to be more multifaceted, potentially including phenomena like bifurcations, limit cycles, and various types of attractors.
The significance of these classifications is underscored in the qualitative analysis of dynamical systems. They shed light on the stability and behaviour of solutions in proximity to these critical points. By analysing the linearized system around these junctures, it becomes feasible to infer aspects about the local dynamics and the potential existence of various orbit or trajectory types within the system.
Remark 2. Table 2 elucidates the root types, stability, and attractors of system (2) as determined by Eq. (8) when the parameters $b=-1$ and $p=1$ are substituted. Depending on the parameter $c$, the system oscillates between stability and instability.
c | Roots | Type points | Stability | Attractors |
0.006 | $\begin{aligned} & \lambda_1=-1 \\ & \lambda_2=0.006 \\ & \lambda_3=-0.7154 \\ & \lambda_{4,5}=-0.1453 \mp 1.6682 i\end{aligned}$ | Saddle-Focus | Unstable | Self-excited |
-0.27 | $\begin{aligned} & \lambda_1=-1 \\ & \lambda_2=-0.3046 \\ & \lambda_3=-0.7027 \\ & \lambda_{4,5}=0.0036 \mp 1.5885 i\end{aligned}$ | Saddle-Focus | Unstable | Self-excited |
-0.2637 | $\begin{aligned} & \lambda_1=-1 \\ & \lambda_2=-0.2967 \\ & \lambda_3=-0.7032 \\ & \lambda_{4,5}=\mp 1.5898 i\end{aligned}$ | Non-hyperbolic | Critical case | Self-excited Or Hidden |
-0.006 | $\begin{aligned} & \lambda_1=-1 \\ & \lambda_2=-0.006 \\ & \lambda_3=-0.7151 \\ & \lambda_{4,5}=-0.1395 \pm 1.6641 i\end{aligned}$ | Node- Focus | Stable | Hidden |
Remark 3. From a differential equation standpoint, critical cases in the stability theory refer to scenarios where all the eigenvalues of the characteristic polynomial exhibit negative real parts, with at least one eigenvalue possessing a real part equal to zero.
The rate of divergence or convergence of nearby trajectories in a dynamical system is effectively quantified by the Lyapunov exponent. This metric provides insights into the long-term behaviour and stability of a system. A dynamical system is suggested to be unstable or exhibit chaotic behaviour when the Lyapunov exponent is positive, while a negative exponent indicates convergence towards a stable equilibrium. Conversely, the Lyapunov dimension aids in identifying the fractal dimension of a chaotic system and evaluating its effective dimensionality by analysing the scaling properties of the Lyapunov exponents.
The Lyapunov dimension, with its ability to capture the complexity and intricacy of the system's attractor, offers significant insight into the nature of the system. Higher Lyapunov dimensions typically suggest more complex systems with an increased number of degrees of freedom.
Based on numerical simulations conducted using the Wolf Algorithm [44], Figure 3 represents the Lyapunov exponent's spectrum for typical parameters (3) & IC (4):
$\left\{\begin{array}{l}L E_1=0.3049 \\ L E_2=0.1218 \\ L E_3=0.0027 \\ L E_4=-\mathbf{0 . 0 0 0 2} \\ L E_5=-1.1293\end{array} \quad \Rightarrow \quad \sum_{i=1}^5 L E_i=-0.7001\right.$
The sum of the first five exponents is $\sum_{i=1}^5 L E_i=-0.7001$, which is approximately equal to $\operatorname{tr}\left(J\left(E_1\right)\right)=-0.7$. This implies that system (2) displays dissipative behaviour. System (2) features a greater Maximum Lyapunov Exponent (MLE) $\left(\mathrm{LE}_1=0.3049\right)$ compared to system (1) $\left(\mathrm{LE}_1=(0.163)\right)$, highlighting its distinctness and higher efficiency. The presence of two positive Lyapunov exponents in system (2) is indicative of its hyperchaotic nature.
The Lyapunov dimension of a system is crucial in characterizing the degree of chaotic behaviour. According to the Kaplan-Yorke conjecture [45], the Lyapunov dimension is defined as:
\[D_L=J+\frac{1}{\left|L E_{J+1}\right|} \sum_{i=1}^J L E_i \Rightarrow D_L=4+\frac{\sum_{i=1}^4 L E_i}{\left|L E_5\right|}=4.3801\]
With taking different values for control parameters and initial condition, in Table 3 and Table 4. Different types of chaotic were obtained.
IC | $L E_1$ | $L E_2$ | $L E_3$ | $L E_4$ | $L E_5$ | Sign of $L E_S$ | Behavior |
0.1, 0.1, 0.3, 0.4, 0.5 | 0.3049 | 0.0302 | 0.0011 | 0.0001 | -1.0362 | (+, +, +,0, -) | Hyperchaotic |
0.01, 0.2, 0, 0.7, 0.8 | 0.2994 | 0.1583 | 0.0017 | -0.0009 | -1.1585 | (+, +, +,0, -) | Hyperchaotic |
0.3, 0.1, 0.2, 0.1, 0.7 | 0.3046 | 0.1274 | 0.0006 | -0.0053 | -1.1273 | (+, +,0, -, -) | Hyperchaotic |
0.1, 0.1, 0.2, 0.1, 0.4 | 0.3049 | 0.0893 | 0.0001 | 0.0008 | -1.0952 | (+,+, 0, 0, -) | Hyperchaotic 2-tours |
b | $L E_1$ | $L E_2$ | $L E_3$ | $L E_4$ | $L E_5$ | Sign of $L E_S$ | Behavior |
0.8 | 0.7991 | 0.1401 | 0.0031 | 0.0007 | -1.1430 | (+, +, +, 0, -) | Hyperchaotic |
0.02 | 0.1506 | 0.0146 | -0.0002 | -0.0026 | -1.1423 | (+, +, 0, -, -) | Hyperchaotic |
0.94 | 0.9397 | 0.1394 | 0.0001 | -0.0005 | -1.1387 | (+, +, 0, 0, -) | Hyperchaotic 2-tours |
0.002 | 0.1003 | -0.0007 | -0.0016 | -0.0031 | -1.0929 | (+, 0, -, -, -) | Chaotic |
0.0029 | 0.1101 | 0.0001 | 0.0001 | -0.0019 | -1.1055 | (+, 0, 0, -, -) | Chaotic 2-tours |
Multistability, a hallmark of complex systems like nonlinear systems or systems with feedback loops, is an underpinning concept across multiple fields, including physics, biology, economics, and engineering. It is essential for elucidating phenomena such as phase transitions, cell differentiation, decision-making processes, and pattern formation. The significance of understanding and analyzing multistability in dynamical systems cannot be understated as it offers deep insights into the behavior of the system, enables accurate predictions of system responses to perturbations, and aids in the design of control strategies aimed at guiding the system towards specific attractors or states.
Evidence of multistability in system (2) is presented in this section, showcasing how various attractors can coexist within the same parameter region, provided the initial conditions are varied. These findings, encapsulated in Table 5, highlight the diverse dynamical behavior the system can display under different initial conditions.
Figure 4 further reinforces these observations, illustrating the coexistence of distinct dynamical behaviors within the new system.
Figure 4 | Parameters | Initial Conditions | Color |
Figure 4 (a) | b=0.002 c=0.002 | (0.1, 7, 9, 0.2, 0.2) | Red |
(12, 5, 5, 0.5, 0.2) | Blue | ||
(-12, 6.5, 6, 0.2, 0.9) | Magenta | ||
Figure 4 (b) | b=0.3 c=0.006 | (0.5, 0.3, 2, 2, 0.2) | Red |
(-0.1, 1, 1, 1, 1) | Blue | ||
(0.1, 0.1, 1, 2,2) | Magenta | ||
Figure 4 (c) | b=0.9 c=0.004 | (30, 0.1, 0.1, 0.1, 0.1) | Red |
(-30, - 0.1, -0.1, -0.1, -0.1) | Blue |
4. Discussion
Insights gleaned from Table 6 underscore the enhanced efficacy of the newly implemented system (2), particularly when contrasted against the performance of the original system (1).
Details | 3D Sprott C System | New 5D system (2) |
Equilibria points $E_{1,2}$ | (±1, ±1, 0) | $\left( \pm 1, \pm 1,-\frac{1}{p}, \pm \frac{a}{b p}, \mp \frac{1}{c p}\right)$ |
Sign of $L E_s$ | (+, 0, -) chaotic | (+, +, +, 0, -) hyperchaotic (+, +, 0, -, -) hyperchaotic (+, +0, 0, -) hyperchaotic 2-torus (+, 0, -, -, -) chaotic (+, 0, 0, -, -) chaotic 2-torus |
Type point | $\bullet$ Non-hyperbolic unstable | $\bullet \rightarrow$ Stable focus-nodes $\bullet \rightarrow$ Saddle-focus unstable $\bullet \rightarrow$ Non-hyperbolic unstable |
Attractors behavior | Self-excited | Hidden & Self-excited |
Max. $L E_s$ | 0.163 | 0.3049 |
Lyapunov dimension $D_L$ | 2.140 | 4.3801 |
5. Anti-Synchronization
Projective synchronization bifurcates into two distinctive types: Complete Synchronization (CS) and Anti-Synchronization (AS). The possibility of synchronization was initially doubted until its existence was first observed by Fujisaka and Yamada in 1983 [46]. However, it was not until 1990 when the phenomenon received notable attention, following Pecora and Carrol's discovery of this occurrence between two identically chaotic systems bearing different initial values [47]. This discovery was subsequently christened Complete Synchronization (CS).
The phenomenon known as Anti-Synchronization (AS) is characterized by the asymptotic reduction of the sum of the drive and response systems to zero. In other words, Anti-Synchronization can manifest between a drive system and a response system when the states of the synchronized systems share the same absolute values, yet display opposite signs, implying that all elements of $(\alpha=-1)$ [48]. In this section, a systematic process for the anti-synchronization of chaos is proposed. The drive systems are represented by system (2), and the corresponding response system is described as follows:
The error dynamics in Anti-Synchronization (AS) are defined as: $e_i=y_i-\alpha x_i$, where $i=1,2,3,4,5, \alpha=-1$, fulfilling the condition:
\[\lim _{t \rightarrow \infty}\left\|e_i(t)\right\|=\left\|y_i-\alpha x_i\right\|=0.\]
The error dynamical system is as follows:
Theorem 2. If designed nonlinear control as follows:
Then the error dynamical system (12) is asymptotically stable.
Proof. By inserting the proposed controller (13) into Eq. (12), we obtain
In accordance with Lyapunov stability theory, we choose a Lyapunov function as follows: $V\left(e_i\right)=e^T P e, i=1,2, \ldots, 5, \quad P=\operatorname{diag}\{0.5,0.5, \ldots, 0.5\}$, i.e.,
and their derivative Lyapunov as:
$\dot{V}\left(e_i\right)=-e_1^2-e_2^2-e_3^2-b e_4^2-e_5^2 \Rightarrow \dot{V}\left(e_i\right)=-\left[\begin{array}{lllll}e_1 & e_2 & e_3 & e_4 & e_5\end{array}\right] \underbrace{\left[\begin{array}{ccccc}1 & 0 & 0 & 0 & 0 \\ 0 & 1 & 0 & 0 & 0 \\ 0 & 0 & 1 & 0 & 0 \\ 0 & 0 & 0 & b & 0 \\ 0 & 0 & 0 & 0 & 1\end{array}\right]}_{Q_1}\left[\begin{array}{c}e_1 \\ e_2 \\ e_3 \\ e_4 \\ e_5\end{array}\right]$
where, $Q_1=\operatorname{diag}(1,1,1, b, 1), b=0.3$, this yields that $Q_1>0$, thus $\dot{V}\left(e_i\right)$ is negative definite matrix on $R^5$. The corresponds law $\lim _{t \rightarrow \infty}\left\|e_i(t)\right\|=0$ satisfied and he drive and response systems is anit-synchronize. Time series of anti-synchronization for error dynamical system (12) are depicted in Figure 5, with the ICs (0.5, 0.1, -0.2, 0.3, -0.3), and (0.1, -0.2, 0.4, 0.2, 0.1), Figure 6 provides a numerical explanation of the anti-synchronization between (2) and (11), this demonstrates that the theoretical results Theorem 2.
6. Conclusions
In this study, a novel five-dimensional hyperchaotic system has been introduced, composed of ten terms and evolved from a three-dimensional Sprott C system. This unique system is characterized by the exhibition of two coexisting attractors: a self-excited attractor and a hidden attractor. Various attributes derived from diverse types of equilibrium points, such as stable focus-nodes, saddle-focus, and non-hyperbolic unstable points, are incorporated into the system, the presence of which is dictated by the system parameters. The occurrence of chaotic and hyperchaotic attractors coexisting within a single five-dimensional system that accommodates three types of equilibrium points presents a compelling phenomenon.
A plethora of numerical methods, including phase portraits, Lyapunov exponents, Lyapunov dimensions, and Multistability, have been utilized to elucidate the distinct attractors. Furthermore, the synchronization issue of the proposed system is scrutinized extensively in the study by employing stability theory. A myriad of dynamic behaviors, including hyperchaotic, hyperchaotic with 2-tours, chaotic, and chaotic with 2-tours, have been documented. Both theoretical proofs and numerical simulations, executed with MATLAB 2021, have confirmed the legitimacy of these theoretical findings.
This study's impact extends beyond the establishment of the new hyperchaotic system. By unveiling the complexity and richness of the dynamical behaviors within the five-dimensional system, it provides insights for a deeper understanding of chaotic dynamics. Additionally, the identification of different types of equilibrium points under various parameters underscores the role of parameter values in shaping a system's behavior. The coexistence of different types of attractors in the same system also offers a valuable case study of the complex dynamics of hyperchaotic systems. Future research could further explore the implications of these findings for system control and synchronization, potentially opening new avenues for practical applications in secure communication, signal processing, and complex network dynamics.
The data supporting our research results are included within the article or supplementary material.
The authors declare no conflict of interest.
|
<urn:uuid:b3beb92d-08ae-4318-a506-962f0f4e5e39>
|
CC-MAIN-2024-51
|
https://www.acadlore.com/article/JISC/2023_2_2/jisc020205
|
2024-12-09T04:51:44Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00545.warc.gz
|
by
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.964049
|
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Satomi' (born March 7, 1989) is a Japanese pop singer. She also goes under the names Satomi and Satton. In 2003, she began vocal and dance lessons simultaneously. She had her first live performance at 15 at the MIDEM 2005 International Music Conference where she was discovered by a sports magazine. She debuted in the United Kingdom in 2005 with the song "love shouts" under the hiptones label as the label's first featured artist.
On October 24, 2006, Satomi released "Heartbreaker" single in the UK with simultaneous releases in the UK and Japan iTunes stores. The single reached the Top 10 in the R&B and comprehensive charts. She debuted in Japan with the double A-side single "Yesterday/Love to stay" on February 8, 2006. Currently, she is under the Aozora Records Label in Japan.
|
<urn:uuid:368bb9ac-3d01-47f3-a3c4-1b6117eba2bc>
|
CC-MAIN-2024-51
|
https://hi.wn.com/Candy_Magic_Satomi
|
2024-12-10T08:54:23Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00669.warc.gz
|
by-sa
|
3.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.993419
|
{
"abbr": [
"by-sa",
"by-sa"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"3.0",
"3.0"
]
}
|
The policy to state HOTS in Basic Competence (KD) of 2013 English curriculum and English teachers’ practice in developing indicator achievement
Abstract
Higher order thinking skills (HOTS) are already a trend in educational sector. The concepts of HOTS are applied in statements of ‘basic competences’ (as known as KD) in the 2013 English Curriculum (syllabus). The purpose of stating HOTS concepts in ‘KD’ to make all of the process of teaching and learning resulted on the students’ ability to be able to think and practice higher order thinking skills in their daily life. As represented in the ‘basic competences’ (KD) of 2013 English curriculum (syllabus revised edition), HOTS can be considered as the significant point in developing indicator (as the objective) of teaching and learning. The development of indicators should be in line with the theory of HOTS, from analyzing, evaluating and creating (based on the revised Bloom taxonomy). However, there are a lot of English teachers who still get difficulties in developing appropriate teaching learning indicators in fulfilling HOTS concepts. In national practice, the policy of implementing HOTS as the basic competences may not be carried out fully by the Indonesian English teachers. There is also a tendency to ignore the discussion of developing appropriate indicator achievement as the learning objectives.
HIGHLIGHTS:
- Curriculum developers should comprehend the concepts of the curriculum and the language theories applied to the curriculum.
- Basic competence should be developed following the level of Bloom's cognitive skills, particularly to generate students' higher-order thinking.
- Implementation of Higher Order Thinking Skills (HOTS) as a policy in the 2013 English Curriculum Basic Competencies (KD) and English teachers' practices in developing competency achievement indicators
Downloads
References
Anderson, L. W., Krathwohl, D., Airasian, P., Cruikshank, K., Mayer, R., Pintrich, P., Raths, J., & Wittrock, M. (2001). Anderson and Krathwohl Bloom’s Taxonomy Revised Understanding the New Version of Bloom’s Taxonomy.
Anderson, L. W., & Krathwohl, D. R. (2001). A Taxonomy for learning, teaching, and assessing: A revision of Bloom’s Taxonomy of educational objectives. Allyn & Bacon. Pearson Education Group.
Beacco, J.-C., Fleming, M., Goullier, F., Thürmann, E., & Vollmer, H. (2016). A handbook for curriculum development and teacher training.
Cuoco, A., Goldenberg, E. P., & Mark, J. (2021a). Contemporary curriculum issues: Organizing a curriculum around Mathematical habits of mind. The Mathematics Teacher, 103(9), 682–688.
Cuoco, A., Goldenberg, E. P., & Mark, J. (2021b). Contemporary curriculum issues: Organizing a curriculum around Mathematical habits of mind. The Mathematics Teacher, 103(9), 682–688. https://doi.org/10.5951/mt.103.9.0682
Dharma, Y. P., Joni, T., Aristo, V., Persada, S., & Sintang, K. (2018). An analysis of English textbook relevance to the 2013 English curriculum. Journal of English Educational Study, 1(1), 6611. https://doi.org/10.31932/JEES.V1I1.277
Ghonsooly, B., & Showqi, S. (2012). The effects of foreign language learning on creativity. English Language Teaching, 5(4), 161–167. https://doi.org/10.5539/elt.v5n4p161
Graves, K., & Lopriore, L. (2009). Developing a New Curriculum for School-Age Learners. TESOL Language Curriculum Development Series. Teachers of English to Speakers of Other Languages, Inc. 1925 Ballenger Avenue Suite 550, Alexandria, VA 22314.
Guardado, M., & Light, J. (2020). Curriculum Development in English for Academic Purposes: A Guide to Practice. Springer Nature.
Indriyana, B. S., & Kuswandono, P. (2019). Developing Students Higher Order Thinking Skills (HOTS) in reading: English teachers strategies in selected Junior High Schools. JET (Journal of English Teaching), 5(3), 204. https://doi.org/10.33541/jet.v5i3.1313
Indriyanto, B. (2012). Pengembangan kurikulum sebagai intervensi kebijakan peningkatan mutu pendidikan. Jurnal Pendidikan Dan Kebudayaan, 18(4), 440. https://doi.org/10.24832/jpnk.v18i4.100
Kaya, S., & Ok, A. (2016). The second grade English language curriculum: Theory-practice congruence. Pegem Eğitim ve Öğretim Dergisi, 6(4), 491–512. https://doi.org/10.14527/pegegog.2016.024
Kohler, M. (2019). Language education policy in Indonesia: A struggle for unity in diversity. In The Routledge international handbook of language education policy in Asia (pp. 286-297). Routledge. https://doi.org/10.4324/9781315666235-20
Kostka, I., & Bunning, L. (2017). Curriculum design in English language teaching. TESOL Press. Available from: TESOL International Association. http://www.tesol.org.
Li, H., Liu, J., Yang, X., Xiao, J., & Yang, G. (2016). An empirical study on developing higher-order thinking skills of primary students with e-schoolbag. Proceedings - 2016 International Symposium on Educational Technology, ISET 2016, 44–49. https://doi.org/10.1109/ISET.2016.26
Lie, A. (2007). Education policy and EFL curriculum in Indonesia: Between the commitment to competence and the quest for higher test scores. TEFLIN Journal, 18(1), 1–14. https://doi.org/10.15639/TEFLINJOURNAL.V18I1/1-15
Madya, S. (2002). Developing standards for EFL in Indonesia as part of the EFL teaching reform. TEFLIN Journal, 13(2), 142–151. https://doi.org/10.15639/TEFLINJOURNAL.V13I2/142-151
Mickan, P., & Wallace, I. (2019). The routledge handbook of language education curriculum design. In The Routledge Handbook of Language Education Curriculum Design. https://doi.org/10.4324/9781315661032
Moore, A. (2012). Teaching and learning: Pedagogy, curriculum, and culture. Taylor and Francis.
Null, W. (2017). Curriculum: From theory to practice (Second Edi). Rowman & Littlefield Publishers, Inc. www.rowman.com
Nurhattati, Matin, Buchdadi, A. D., & Yusuf, C. F. (2020). Teacher certification in Indonesia: An education policy analysis. Universal Journal of Educational Research, 8(5), 1719–1730. https://doi.org/10.13189/ujer.2020.080508
Permendikbud No. 20, 21, 22, dan 23 Tahun 2016 dan Permendikbud No.24 Tahun 2016. (n.d.). Retrieved August 18, 2022, from http://20283530.siap-sekolah.com/2016/09/02/permendikbud-no-20-21-22-dan-23-tahun-2016/#.Yv4GoHZBw2w
Porter, P. A., & Brown, D. (1997). The elements of language curriculum: A systematic approach to program development. TESOL Quarterly, 31(4), 814. https://doi.org/10.2307/3587769
Rachmawati, D. L., Purwati, O., Anam, S., & Setiawan, S. (2021). Between perception and practice: The emergency of encouraging EFL teachers to implant HOTS in their classrooms. TESOL International Journal, 16(4.4), 40–58.
Richards, J. C. (2001). Curriculum development in language teaching. Cambridge University Press. https://doi.org/10.1017/cbo9780511667220
Setyono, B. (2016). Providing variations of learning modalities to scaffold pre-service EFL teachers in designing lesson plan. Prosiding Ictte Fkip Uns 2015, 1(1), 336–343.
Sholikah, E., Suprihadi, S., & Nuraeningsih, N. (2021). Relationship between Higher-order Thinking Skills (HOTS) and English achievement. Prominent, 4(1), 45–53. https://doi.org/10.24176/pro.v4i1.5791
Soenoewati, D. I. D. (2015). English core competencies, basic competencies, and assessment for junior high school in curriculum 2013; between facts and hopes. Register Journal, 8(2), 1. https://doi.org/10.18326/rgt.v8i1.1-18
Sukmawijaya, A., Yunita, W., & Sofyan, D. (2020). Analyzing Higher Order Thinking Skills on the compulsory English textbook for tenth graders of Indonesian Senior High Schools. JOALL (Journal of Applied Linguistics & Literature), 5(2), 137–148. https://doi.org/10.33369/joall.v5i2.10565
Widodo, H. P. (2016). Language policy in practice: Reframing the English language curriculum in the Indonesian secondary education sector. In English language education policy in Asia (pp. 127-151). Springer, Cham. https://doi.org/10.1007/978-3-319-22464-0_6
Wilson, L. O. (2013). Understanding the new version of Bloom’s Taxonomy. The Second Principle, 721(2001), 1–16.
Yunita, W., Syahrial, & Hati, G. M. (2020). English teachers’ knowledge on higher order thinking skills (HOTS). ENGLISH REVIEW: Journal of English Education, 9(1), 205–216. https://doi.org/10.25134/ERJEE.V9I1.3800
Copyright (c) 2022 Dr. Gusti Nur Hafifah, Oikurema Purwati, Ahmad Munir
This work is licensed under a Creative Commons Attribution 4.0 International License.
|
<urn:uuid:482f195b-d277-4e81-bc8e-883d1468f9a6>
|
CC-MAIN-2024-51
|
https://jees.umsida.ac.id/index.php/jees/article/view/1662
|
2024-12-10T09:15:29Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00669.warc.gz
|
by
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.783111
|
{
"abbr": [
"by",
"by"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
]
}
|
Optimalisasi Pengelolaan Aset Tetap oleh BPKAD Kabupaten Jember
DOI:
https://doi.org/10.26593/copar.v2i1.8321.16-32Keywords:
Fixed Assets, Organizational Performance, Regional Asset ManagementAbstract
Regional assets management is a critical component of financial management. Jember county's financial management and regional assets are in charge of financial management, in accordance with Peraturan Bupati Nomor 8 Tahun 2023. According to the performance report of the BPKAD government district jember 2023, annual performance gains on target asset percentage remains with legal documentation by 2023 went down and almost reached the target. Although there has been a decline, the attainment has been highly satisfactory. The goal of this study is to describe the performance of BPKAD assets in the management of jember's permanent assets. The study uses the "quasi-qualitative" approach by using data collection techniques through observation, interviews, documenting and gathering of some documents by viewing the four dimensions of organization's performance of effectiveness, efficiency, accountability, and transparency. This study shows that asset field performance in general has been consistent with the duties and functions seen from the four dimensions of the organization. But there are problems in asset management, such as many uncertified land assets, weak coordination with local device organizations, limited number of employees, and no fixed asset storage.
|
<urn:uuid:fe6c1620-1ca0-4fae-900f-cc35d7e43268>
|
CC-MAIN-2024-51
|
https://journal.unpar.ac.id/index.php/CoPAR/article/view/8321
|
2024-12-10T09:18:50Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00669.warc.gz
|
by
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.982455
|
{
"abbr": [
"by",
"by"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
]
}
|
White lesions are selectively frequent in the oral cavity. The prevalence of oral leukoplakia is quite prevalent among such lesions. There are many variants of oral leukoplakia, one of which is oral proliferative verrucous leukoplakia (OPVL), it is a rare clinico-pathological entity which is slow growing, long term progressive lesion, but remains an enigmatic and difficult to define. According to the published case series, OPVL regarded as a disease with aggressive biological behaviours due to its high probability of recurrence and high rate of malignant transformation. This article presents the clinico-pathologic characteristic of verrucous leukoplakia turning into squamous cell carcinoma involving right buccal mucosa and commissural area of a sixty eight years old male patient.
|
<urn:uuid:d4a574d5-4c8c-41e0-b4c4-e0921f5e7925>
|
CC-MAIN-2024-51
|
https://journalcra.com/article/transformation-oral-squamous-cell-carcinoma-oral-verrucous-leukoplakia-case-report
|
2024-12-10T07:13:36Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00669.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.994852
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Our Second Open Call results checking is finalized and we are happy to announce KATANA Top10 consortia! You can see the list below and more details about each of the winners will follow at our website.
Nr | Title of campaign | Category |
1 | HIPPOCRATES FARM | Functional Foods |
2 | Mushroom’s Ideas Brewers | Functional Foods |
3 | SWARM Protein – The Insect Bar | Functional Foods |
4 | Rosey’s mark – food from roses | Functional Foods |
5 | SOLARVIBES – A REVOLUTIONARY STEP IN AGRICULTURE | Precision Agriculture Services |
6 | KEEP IT FRESH | Mobile Services |
7 | smark – 24/7 pickup station for regional groceries | Mobile Services |
8 | IntelliSTEM – Intelligent solution for Agriculture | Precision Agriculture Services |
9 | BLUETENTACLES IRRIGATION SYSTEMS | Precision Agriculture Services |
10 | Smartfooding: where healthy products meet great prices, finally! | Mobile Services |
|
<urn:uuid:d985d6f4-34b0-4b64-80d8-d7404f56abde>
|
CC-MAIN-2024-51
|
https://katanaproject.eu/news/katana-top10-info/
|
2024-12-10T07:38:20Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00669.warc.gz
|
by
|
3.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.79834
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
]
}
|
Illinois Natural History Survey - Plant Collection (ILLS-PLANT)
There are three plant herbaria housed at the Evers Laboratory: Illinois Natural History Survey Herbarium (ILLS), the University of Illinois Plant Biology Herbarium (ILL), and the University of Illinois Crop Evolution Laboratory Herbarium (CEL). Together, these collections contain over 1,000,000 specimens making this the second largest herbarium in Illinois and one of the 15th largest in the United States.
Illinois Natural History Survey - Plant Collection. Occurrence dataset (ID: 3a962f1f-7122-432c-bb7d-b625050392e4) accessed via the INHS Collections Data Portal, biocoll.inhs.illinois.edu/portal, 2024-12-11).
|
<urn:uuid:d3bc4e1c-e867-40ef-a29e-9388c8966408>
|
CC-MAIN-2024-51
|
https://biocoll.inhs.illinois.edu/portal/collections/misc/collprofiles.php?collid=51&stat=taxonomy&family=Araucariaceae
|
2024-12-11T13:52:10Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00569.warc.gz
|
zero
|
1.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.826151
|
{
"abbr": [
"zero"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"1.0"
]
}
|
Bugzilla needs a legitimate login and password to continue.
If you don't have a Bugzilla account, you can create a new account. A user account is required to file a new bug or to comment into existing ones so that you can be contacted if more information is needed.
|
<urn:uuid:4aff1e51-b65b-485d-89ea-8ce33153dcb5>
|
CC-MAIN-2024-51
|
https://bugs.documentfoundation.org/show_bug.cgi?id=111892&GoAheadAndLogIn=1
|
2024-12-11T13:49:18Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00569.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.999336
|
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Nimeke
Stockholm, National Archives, E 1984 (3), Bielkesamlingen, 01 Hogenskild Bielkes samling, Handlingar rörande Nynäs gård i Nousis socken, Åbo län. Vol. 10. Financial registers pertaining to the landed estates of Anna Hansdotter Tott in Finland
Kuvaus
A register of finances
Julkaisija
Finnish Literature Society (SKS)
Codices Fennici
Aikamääre
1524-1529
Oikeudet
Images:
Concerning all other rights see .
Formaatti
Paper
Kieli
Swedish
Identifiointitunnus
Stockholm
National Archives
E 1984
Bielkesamlingen, 01 Hogenskild Bielkes samling, Handlingar
rörande Nynäs gård i Nousis socken, Åbo län. Vol. 10.
Unit 3
National Archives
E 1984
Bielkesamlingen, 01 Hogenskild Bielkes samling, Handlingar
rörande Nynäs gård i Nousis socken, Åbo län. Vol. 10.
Unit 3
Stockholm, National Archives, E 1984 (3), Bielkesamlingen, 01 Hogenskild Bielkes
samling, Handlingar rörande Nynäs gård i Nousis socken, Åbo län. Vol. 10. Financial
registers pertaining to the landed estates of Anna Hansdotter Tott in Finland
1524–1529
A
register of finances
A
register of finances
concerning the Finnish possessions of
Anna Hansdotter Tott
, namely
Nynäs
, Vik
, and
Lahis
. The contents are not fully in chronological order,
although the first few folios are the oldest ones (1524−1525). The contents mostly
consist of notes concerning tenants of the aforementioned estates (or possibly only
one or two of them).Paper
51 folios.
11cm × 29,5cm
11cm × 29,5cm
Foliation in upper right-hand corner, possibly made with a
stamp.
An unclear quire structure. Folios cut out and extra ones pasted in.
Associated leaves are roughly as follows: 1−6, 7−10, 11−20, 21−25, 26−29, 30−35,
36−44, 45−51.
Text in a single column, not ruled.
Several hands and different inks.
No decoration.
Limp binding of brown leather. The back cover is extended into a wrap-around flap
with a tie of sturdy light-coloured string sewn onto the flap used to close the
volume.
A somewhat disorganized manuscript written in a style similar to other
registers surviving from the same time period from
Nynäs
and related estates. Most
likely written little by little over a period of several years. Clearly not a
transcription.This manuscript is part of a large block of records from the
16th century
pertaining to the estates of Nynäs
, Vik
, and Lahis
, which were managed
as a whole. A likely place of writing is Nynäs
estate, but the records could equally
well have been written elsewhere.The financial records of
Nynäs
and related estates came to the Swedish Crown, and
later the Swedish National Archives
, when the possessions and
archives of Hogenskild Bielke
were confiscated
following his execution in 1605
(see Introduction
to these descriptions).Cataloguer
Seppo Eskola
Finnish Literature Society (SKS)
Codices Fennici
Creative Commons BY 4.0
|
<urn:uuid:62b12d35-2b27-4360-9989-9e45b013b64e>
|
CC-MAIN-2024-51
|
https://codicesfennici.fi/items/show/127
|
2024-12-11T12:08:10Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00569.warc.gz
|
mark
|
1.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.92004
|
{
"abbr": [
"mark"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"1.0"
]
}
|
id
asin
(
n, cognition
)
An
Indonesian
term in
ConceptNet 5.8
Source:
Open Multilingual WordNet
View this term in the API
Documentation
FAQ
Chat
Blog
Documentation
FAQ
Chat
Blog
Synonyms
en
salt
(
n, cognition
)
➜
ConceptNet 5 is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License
. If you use it in research, please cite
this AAAI paper
.
See
Copying and Sharing ConceptNet
for more details.
|
<urn:uuid:874ec314-a3a5-4b4b-b5fd-65af3e55c672>
|
CC-MAIN-2024-51
|
https://conceptnet.media.mit.edu/c/id/asin/n/wn/cognition
|
2024-12-11T13:08:46Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00569.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.89455
|
{
"abbr": [
"by-sa",
"by-sa"
],
"in_footer": [
true,
true
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
]
}
|
Dataset of grain yield, its components and the nitrogen and phosphorus economies of bread wheat in two contrasting plant arrangements growing in a high yield potential environment
Description
Dataset of GY and its components, as well as nitrogen (N) and phosphorus (P) economies, under highly contrasting plant densities. This dataset comes from a field experiment in which two wheat cultivars - Bacanora (higher grain number and medium grain weight) and Kambara (lower grain number and higher grain weight) - were sown at two seeding rates, a low seeding rate of 44 plants m-2 with a square planting pattern (LSR) and a farmer's seeding rate of 350 plants m-2 (CON), over two growing seasons in Valdivia, Chile. Grain yield (GY) and its numerical components and grain and straw dry weight were measured, and plant height and internode height/weight were recorded. N and P concentrations in grain and straw were determined, and nutrient use efficiencies (NUE and PUE, respectively) for N and P and their components were calculated. Climatological information is also available. Our study aimed at assessing: (i) the response of GY, biomass and harvest index of wheat under two contrasting seed rates; (ii) trade-offs among yield components in response to seed rate; and (iii) the sensitivity of grain and crop N and P content and nutrient use efficiency under conventional and low seed rates in the highyielding environment of southern Chile. Bacanora showed fully compensated GY components, achieving the same GY under both LSR and CON treatments. On the other hand, Kambara yielded 12% more in the LSR treatment than in the CON treatment. The LSR treatment resulted in a reduction in plant height of 0.14 m (19% and 15% in Bacanora and Kambara, respectively), leading to an improved harvest index. While Bacanora showed a slight reduction in grain number under the LSR treatment, Kambara showed no significant effect. However, both varieties showed an increase in average grain weight under the LSR treatment. In addition, Bacanora showed an increase in grain N concentration and both cultivars showed an improvement in grain P concentration under the LSR treatment. In addition, both Bacanora and Kambara showed an 18% increase in P uptake and P uptake efficiency under the LSR treatment. This dataset supports the information presented in the research article [1] “Low seed rate in square planting arrangement has neutral or positive effect on grain yield and improves grain nitrogen and phosphorus uptake in wheat” (Field Crops Research 288, 2022, 108699, https://doi.org/10.1016/j.fcr.2022.108699).
Files
Steps to reproduce
A field trial was conducted at the Austral Agricultural Experimental Station in Valdivia, Chile (39°47'S, 73°14'W, 19 m.a.s.l.) for two consecutive growing seasons. The soil at the experimental site was Duric Hapludand. The experiment was sown at the optimum date for spring wheat in Valdivia. The experimental plots received fertiliser at sowing and additional nitrogen at the beginning of tillering. Weeds were removed manually, and insecticides and fungicides were applied as recommended. Plots were irrigated as required. The experiment consisted of two spring wheat varieties and two seeding rates. It was a split-plot design with seed rate as the main plot and variety as the subplot. Seed rate treatments included a conventional seed rate (CON) and a low seed rate (LSR). Two CIMMYT varieties, Bacanora T88 and Kambara, were used. Each experimental unit consisted of 9 rows of 2 m length and 0.15 m spacing. Stem emergence, booting, anthesis and maturity dates were recorded. Plant height, stems, spikes and grain components were measured. Thousand grain weight (TGW), grain number (GN) and harvest index (HI) were calculated. Internodes were measured, oven dried and weighed to determine weight/length ratios. Chemical analysis was performed on the above-ground biomass, divided into grain and remaining above-ground organs. N and P concentrations were determined by acid digestion and calcination, respectively. N and P yield, uptake and harvest index were calculated from grain and straw N and P concentrations. N and P use efficiency, including uptake efficiency, utilisation efficiency and efficiency for biomass production, was determined. ANOVA was used to analyse the effects of treatments on yield, traits and N/P variables. One-way ANOVA was used for inter-individual measurements. Statistical significance was set at P < 0.05. Curvilinear regression analysis was used for data fitting and visualisation using GraphPad Prism software.
Institutions
Categories
Funding
Fondo Nacional de Desarrollo Científico y Tecnológico
1040125
|
<urn:uuid:d3fc3533-45a3-42d0-b236-9bd78ec9ab0a>
|
CC-MAIN-2024-51
|
https://data.mendeley.com/datasets/7dk3syphgv/1
|
2024-12-11T13:37:00Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00569.warc.gz
|
by
|
4.0
|
json-ld
| true
| false
| false
| false
|
Latn
|
eng
| 0.994138
|
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
true
],
"location": [
"json-ld"
],
"version": [
"4.0"
]
}
|
Cuttlefish communication with arm wave signs through vision and mechanoreception
Description
This dataset is a a subset of the dataset of the preprint study "Cuttlefish communicate with arm wave signs perceived visually and through mechanoreception in the lateral line" by Sophie Cohen-Bodénès & Peter Neri (Ecole Normale Supérieure, Paris), 2024. The aim of this partial dataset is to allow an impression of the data and the study. It consists in three subfolders: 1) The ethograms of the arm waves : presents videos of the 4 different new communication signal discovered with supplementary video examples. 2) The visual experiment : presents 10 videos of 10 examplary trials on different animal executing the first behavioral experiment of the study. The associated annotations are in .txt files. The python code allows to compute the probability of response (= arm wave signing) in front of the stimuli. The folder also contains a "stimuli" subfolder with an example of displayed wave sign and a video presenting the set-up 3) The playback experiment : presents 10 videos of 10 examplary trials on different animal executing the second behavioral experiment of the study. The associated annotations are in .txt files and .npz files. The npz files contains the displayed stimuli for each trial. The python code allows to compute the probability of response (= arm wave signing) in front of the stimuli.
|
<urn:uuid:95aa824b-1d62-4a6c-a91c-78a7978801f9>
|
CC-MAIN-2024-51
|
https://data.mendeley.com/datasets/f3sp55762b/2
|
2024-12-11T12:41:12Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00569.warc.gz
|
by
|
4.0
|
json-ld
| true
| false
| false
| false
|
Latn
|
eng
| 0.994119
|
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
true
],
"location": [
"json-ld"
],
"version": [
"4.0"
]
}
|
Formulaire de recherche
Nombre de résultats: 52
Trier par:
-
news UNHCR, 15 Dec 2021 (2 years ago )UNHCR is advocating for women and girls in South Africa to acquire identity documents which can help reduce the risk of statelessness, and physical and psychological abuse.
-
news UNHCR, 07 Apr 2021 (3 years ago )As thousands flee non-state armed groups attacks in northern Mozambique, urgent resources are needed to support them and the communities hosting them.
|
<urn:uuid:bbf546bc-7c90-4d40-8c4a-1b3073fe11b0>
|
CC-MAIN-2024-51
|
https://data.unhcr.org/fr/search?type=news&sv_id=37&geo_id=0&sort=titleSort&direction=asc&page=6
|
2024-12-11T13:53:10Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00569.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.994105
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Skip to main content
Back to top
Ctrl
+
K
Search
Ctrl
+
K
edx-platform Documentation
“How-To” Guides
How to write a celery task
How To Use the REST API
References
Authentication Related Code Samples
Feature Toggles
LMS APIs
Settings
Preparing static assets for edx-platform
docs
cms
djangoapps
common
djangoapps
lms
djangoapps
openedx
core
features
scripts
user_retirement
xmodule
docs
modulestore
Python Docstrings
cms
common
lms
lms
openedx
openedx package
Concepts and Guides
Options for Extending the edX Platform
Testing
JavaScript in edx-platform
Styling in edx-platform
Working with Bootstrap
edx-platform Static Asset Pipeline Plan
edx-platform REST API Concepts
Open edX Hooks Extension Framework
TinyMCE (Visual Text/HTML Editor) Plugins
Repository
Suggest edit
Open issue
.rst
.pdf
docs
docs
#
decisions
|
<urn:uuid:f17ddc87-373f-4a60-9ff2-fb1d0fb8d2e6>
|
CC-MAIN-2024-51
|
https://docs.openedx.org/projects/edx-platform/en/latest/references/docs/xmodule/docs/index.html
|
2024-12-11T12:27:52Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00569.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.821133
|
{
"abbr": [
"by-sa",
"by-sa"
],
"in_footer": [
true,
true
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
]
}
|
moulthrop
Despite talk of endings and absences at Eastgate Systems, Dave Ciccoricco investigates continuities in the work of Michael Joyce and Mark Bernstein.
On the futures of electronic scholarship - an exchange among editors.
In looking to the future of the 'electronic book,' Ciccoricco digs up some of ebr's manifesto-like remarks of old.
Dave Ciccoricco returns to Stuart Moulthrop, considers Operation Enduring Freedom (2003) in light of Operation Desert Storm (1991), and consults the annals of World War II for a likely source of "Victory Garden," the title of Moulthrop's 1991 network fiction on the Gulf War.
|
<urn:uuid:8c58dae6-debf-4377-8387-29839fe3cd4d>
|
CC-MAIN-2024-51
|
https://electronicbookreview.com/tag/moulthrop/
|
2024-12-11T11:58:07Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00569.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.995714
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Nursing and Primary care Journal offers open access opportunity to assemble the requirements of authors and increases article visibility. Annals of Nursing & Primary care Journals consist of technical, nontechnical and social aspects as evidences about the practice, impact and outcomes of primary care services and community health programs. The journal covers all aspects of clinical topical catering to the academic requirements of physicians, doctors, community surgeons, health workers, nurses and providers of community obstetrical & pediatric care, emergency physicians, occupational physicians and public health specialists. It includes the self-directive and collaborative care of persons of all ages, groups, sick and all communities. Nursing incorporates the encouragement of health, prevention of poor health and the care of sick persons, disabled and dying people.
Annals of Nursing and Primary Care (ISSN-2640-6756) follows double blinded peer review process and publishes highest standards of articles. Each submitted article undergoes review process with at least two reviewers or an editorial board member who are expertise in the field of submitted article. The journal focuses on research papers and professional discussion papers and papers in any of the following fields will be considered: Original Research, Review, Mini-review, Original case reports, Case studies, Clinical images, Clinical videos, Short communication, Editorials.
|
<urn:uuid:5c59e3e9-be09-45ec-afa8-e434bbd94de2>
|
CC-MAIN-2024-51
|
https://www.remedypublications.com/annals-of-nursing-and-primary-care-aims-scope.php
|
2024-12-11T13:40:50Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00569.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.995039
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
940×627-is-right-now-tollifson by Sanjiv Manifest | Apr 27, 2021 Submit a Comment Cancel replyYour email address will not be published. Required fields are marked *Comment * Name * Email * Website Δ
|
<urn:uuid:3779869f-a42c-47d1-b48e-62284c257a0d>
|
CC-MAIN-2024-51
|
https://www.stillnessspeaks.com/self-improvement-elusive-obvious-tollifson/940x627-is-right-now-tollifson/
|
2024-12-11T12:28:58Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00569.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.983591
|
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Write a brief biography and present it to the world. This can be a wonderful, heartwarming experience for all.
Family and Relatives
More informations
View the latest documents, pictures, photos and images of or upload the files of your loved one.
Consider uploading your photo - so that your pictures are included in our genealogy, family trees & family history records. Sysoon enables anyone to create a free online tribute for a much loved relative or friend who has passed away.
Attention: Death verified by Social security index. - Accuracy of the file
Hashtag: sysoon45021, memorial45021, grave45021, death, funeral, findagrave, buria , obituary, afdd, ett H Cowan, obits, ssn, family,
Share Your Memories and Sympathies and Join the Bereaved! to show all important data, death records and obituaries absolutely for free!
This page was created on 2015-12-31T00:00:00
Last changed on 2021-01-20T19:53:00
Data collected by GINN / Akropola s.r.o.
We're very sorry for your loss!
Comments
Post a comment / Comments guidelines
└─ Please, to post your comments.
|
<urn:uuid:061ab687-01d3-4e87-a3b9-89952f84b412>
|
CC-MAIN-2024-51
|
https://www.sysoon.com/deceased/everett-h-cowan-35
|
2024-12-11T12:36:24Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00569.warc.gz
|
by-sa
|
4.0
|
link_tag
| true
| false
| false
| false
|
Latn
|
eng
| 0.99728
|
{
"abbr": [
"by-sa"
],
"in_footer": [
false
],
"in_head": [
true
],
"location": [
"link_tag"
],
"version": [
"4.0"
]
}
|
Gets unique elements and their counts from the input dataset
.
tff.analytics.data_processing.get_unique_elements_with_counts(
dataset: tf.data.Dataset, string_max_bytes: Optional[int] = None
) -> tuple[tf.Tensor, tf.Tensor]
This method returns a tuple of elements
and counts
, where elements
are
the unique elements in the dataset, and counts is the number of times each one
appears.
The input dataset
must yield batched rank-1 tensors. This function reads
each coordinate of the tensor as an individual element and caps the total
number of elements to return.
Args |
dataset
A tf.data.Dataset to elements from. Element type must be
tf.string .
string_max_bytes
The maximum length (in bytes) of strings in the dataset.
Strings longer than string_max_bytes will be truncated. Defaults to
None , which means there is no limit of the string length.
Returns |
elements
A rank-1 Tensor containing all the unique elements of the input
dataset .
counts
A rank-1 Tensor containing the counts for each of the elements in
elements .
Raises |
ValueError
-- If the shape of elements in dataset is not rank 1
-- If string_max_bytes is not None and is less than 1.
TypeError
If dataset.element_spec.dtype must be tf.string is not
tf.string .
|
<urn:uuid:80ecd58c-b678-4346-be3f-dbc6325880da>
|
CC-MAIN-2024-51
|
https://www.tensorflow.org/federated/api_docs/python/tff/analytics/data_processing/get_unique_elements_with_counts
|
2024-12-11T12:04:38Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00569.warc.gz
|
by
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.980309
|
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Interaction annotations are curated by BioGRID and include physical or genetic interactions observed between at least two genes. An interaction annotation is composed of the interaction type, name of the interactor, assay type (e.g., Two-Hybrid), annotation type (e.g., manual or high-throughput), and a reference. Experimental details, phenotype, modification, and multiple mutant information are included when available.
Source: All physical and genetic interaction annotations listed in SGD are curated by BioGRID.
An interaction is defined as an experimentally observed physical or genetic interaction between two genes. There may be more than one row listed for the same interactor if the interaction between it and the given gene was observed in separate studies. All interactions listed in SGD are curated by BioGRID.
Increase the total number of rows showing on this page by using the pull-down located below the table, or use the page scroll at the table's top right to browse through the table's pages; use the arrows to the right of a column header to sort by that column; filter the table using the "Filter" box at the top of the table; click on the small "i" buttons located within a cell for an annotation to view further details about experiment type and any other genes involved in the interaction.
Evidence ID | Analyze ID | Interactor | Interactor Systematic Name | Interactor | Interactor Systematic Name | Allele | Assay | Annotation | Action | Phenotype | SGA score | P-value | Source | Reference | Note |
---|
An interaction is defined as an experimentally observed physical or genetic interaction between two genes. There may be more than one row listed for the same interactor if the interaction between it and the given gene was observed in separate studies. All interactions listed in SGD are curated by BioGRID.
Increase the total number of rows showing on this page by using the pull-down located below the table, or use the page scroll at the table's top right to browse through the table's pages; use the arrows to the right of a column header to sort by that column; filter the table using the "Filter" box at the top of the table; click on the small "i" buttons located within a cell for an annotation to view further details about experiment type and any other genes involved in the interaction.
Evidence ID | Analyze ID | Interactor | Interactor Systematic Name | Interactor | Interactor Systematic Name | Assay | Annotation | Action | Modification | Source | Reference | Note |
---|
This diagram displays physical (purple lines) and genetic (green lines) interactions between the given gene (yellow circle) and its interactors (gray circles) based on the number of experiments supporting each interaction (adjustable using the slider at the bottom). Interactions between the interactors for a given gene are also shown.
Click on a gene to go to its specific page within SGD; drag any of the gene objects around within the visualization for easier viewing; filter by interaction type (genetic or physical) using the radio buttons; click “Reset” to automatically redraw the diagram; filter the number of interactors displayed by adjusting the number of experiments supporting a gene's interaction with the given gene by clicking anywhere on the slider bar or dragging the tab to the desired filter number.
|
<urn:uuid:34c552a4-387f-4ccc-b9c9-4c1431144a0d>
|
CC-MAIN-2024-51
|
https://www.yeastgenome.org/locus/S000006773/interaction
|
2024-12-11T12:41:08Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00569.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.996228
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Everyone who hates his brother is a murderer, and you know that no murderer has eternal life abiding in him.
“You have heard that it was said to those of old, ‘You shall not murder; and whoever murders will be liable to judgment.’ But I say to you that everyone who is angry with his brother will be liable to judgment; whoever insults his brother will be liable to the council; and whoever says, ‘You fool!’ will be liable to the hell of fire.
Whoever hates disguises himself with his lips and harbors deceit in his heart; when he speaks graciously, believe him not, for there are seven abominations in his heart; though his hatred be covered with deception, his wickedness will be exposed in the assembly.
But as for the cowardly, the faithless, the detestable, as for murderers, the sexually immoral, sorcerers, idolaters, and all liars, their portion will be in the lake that burns with fire and sulfur, which is the second death.”
You are of your father the devil, and your will is to do your father's desires. He was a murderer from the beginning, and does not stand in the truth, because there is no truth in him. When he lies, he speaks out of his own character, for he is a liar and the father of lies.
You shall not go around as a slanderer among your people, and you shall not stand up against the life of your neighbor: I am the Lord. “You shall not hate your brother in your heart, but you shall reason frankly with your neighbor, lest you incur sin because of him. You shall not take vengeance or bear a grudge against the sons of your own people, but you shall love your neighbor as yourself: I am the Lord.
What causes quarrels and what causes fights among you? Is it not this, that your passions are at war within you? You desire and do not have, so you murder. You covet and cannot obtain, so you fight and quarrel. You do not have, because you do not ask.
They went to the chief priests and elders and said, “We have strictly bound ourselves by an oath to taste no food till we have killed Paul.
Then desire when it has conceived gives birth to sin, and sin when it is fully grown brings forth death.
idolatry, sorcery, enmity, strife, jealousy, fits of anger, rivalries, dissensions, divisions, envy, drunkenness, orgies, and things like these. I warn you, as I warned you before, that those who do such things will not inherit the kingdom of God.
When it was day, the Jews made a plot and bound themselves by an oath neither to eat nor drink till they had killed Paul.
but whoever drinks of the water that I will give him will never be thirsty again. The water that I will give him will become in him a spring of water welling up to eternal life.”
And Herodias had a grudge against him and wanted to put him to death. But she could not,
But I say to you that everyone who looks at a woman with lustful intent has already committed adultery with her in his heart.
But Absalom spoke to Amnon neither good nor bad, for Absalom hated Amnon, because he had violated his sister Tamar. After two full years Absalom had sheepshearers at Baal-hazor, which is near Ephraim, and Absalom invited all the king's sons. And Absalom came to the king and said, “Behold, your servant has sheepshearers. Please let the king and his servants go with your servant.” But the king said to Absalom, “No, my son, let us not all go, lest we be burdensome to you.” He pressed him, but he would not go but gave him his blessing. Then Absalom said, “If not, please let my brother Amnon go with us.” And the king said to him, “Why should he go with you?”
Now Esau hated Jacob because of the blessing with which his father had blessed him, and Esau said to himself, “The days of mourning for my father are approaching; then I will kill my brother Jacob.”
since you have been born again, not of perishable seed but of imperishable, through the living and abiding word of God;
Unless otherwise indicated, all content is licensed under a Creative Commons Attribution License. All Scripture quotations, unless otherwise indicated, are taken from The Holy Bible, English Standard Version. Copyright ©2001 by Crossway Bibles, a publishing ministry of Good News Publishers. Contact me: openbibleinfo (at) gmail.com.
|
<urn:uuid:f8de8d5a-b2e6-499a-9233-132f95607405>
|
CC-MAIN-2024-51
|
http://www.openbible.info/labs/cross-references/search?q=1+John+3%3A15
|
2024-12-12T17:22:21Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00469.warc.gz
|
by
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.999272
|
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Low Carbon Consumer Lending Fintech Product Design Report
Abstract
In short, green growth will play a central role on the road to a more resilient recovery, and financial technology will be a key driver. Fintech, as an essential support in building a green financial system, will play a key role in supporting green finance to serve the real economy more efficiently.
This article focuses on the design of low-carbon consumer credit as a financial technology product, given the high costs of green transformation for businesses and the financing and credit risks they face. Through big data, cloud computing, machine learning and other technologies, the product will help businesses to go green, create value for users and bring positive energy to society. In response to the national “dual carbon” target, low-carbon consumer credit will become an important driver to foster the development of emerging industries. This design differs from generic financial technology products in that the design focuses on green, economic benefits, while taking into account corporate social responsibility, and the use of machine learning to create an anti-fraud system throughout credit risk management, loan withdrawal, and detection of all aspects to ensure maximum security for users.Full Text:
PDFDOI: https://doi.org/10.22158/rem.v8n3p94
Refbacks
- There are currently no refbacks.
Copyright (c) 2023 Lilong Lv, Chen Yang, Zhao Cai
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright © SCHOLINK INC. ISSN 2470-4407 (Print) ISSN 2470-4393 (Online)
|
<urn:uuid:4c9a0cfa-1e41-44af-a6f1-69b9d9a983d8>
|
CC-MAIN-2024-51
|
http://www.scholink.org/ojs/index.php/rem/article/view/31463
|
2024-12-12T18:03:14Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00469.warc.gz
|
by
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.990413
|
{
"abbr": [
"by",
"by"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
]
}
|
Modal and Spectrum Analysis of Vibration-Free Transportation System Using Finite Element Analysis
DOI:
https://doi.org/10.3329/jsr.v16i3.71919Abstract
The transportation trailer system comprises numerous delicate components that require careful handling throughout transit. During transportation, the system is subjected to vibrations and shock loads resulting from road conditions, trailer acceleration, and deceleration. If these loads are transferred to the system, it could adversely affect many of its elements, particularly at resonance. To mitigate such vibration-induced stress on the system, a vibration isolation system has been designed and analyzed. The transportation system is modelled and analyzed using the finite element method. The Power Spectral Density (PSD) based on ISO-8606 standard for random road profiles is utilized for spectrum analysis computations in the Finite Element Analysis (FEA). Natural frequencies in the transportation system with isolator obtained from the finite element analysis are compared with the mathematically calculated values and any discrepancies are reported as error percentages.
Downloads
97
85
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
© Journal of Scientific Research
Articles published in the "Journal of Scientific Research" are Open Access articles under a Creative Commons Attribution-ShareAlike 4.0 International license (CC BY-SA 4.0). This license permits use, distribution and reproduction in any medium, provided the original work is properly cited and initial publication in this journal. In addition to that, users must provide a link to the license, indicate if changes are made and distribute using the same license as original if the original content has been remixed, transformed or built upon.
|
<urn:uuid:d804385d-3858-4eae-b780-6c25ee217fcb>
|
CC-MAIN-2024-51
|
https://www.banglajol.info/index.php/JSR/article/view/71919
|
2024-12-12T16:53:26Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00469.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.987034
|
{
"abbr": [
"by-sa",
"by-sa",
"by-sa",
"by-sa"
],
"in_footer": [
false,
false,
false,
false
],
"in_head": [
false,
false,
false,
false
],
"location": [
"a_tag",
"a_tag",
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0",
"4.0",
"4.0"
]
}
|
“While Shepherds Watched Their Flocks by Night“
by Nahum Tate and Alan Gray
Sung by The Seminar “Music and Poetry in Elizabethan and Jacobean England“
WHILE shepherds watched their flocks by night,
All seated on the ground,
The angel of the Lord came down,
And glory shone around.
‘Fear not,’ said he (for mighty dread
Had seized their troubled mind);
‘Glad tidings of great joy I bring
To you and all mankind.
‘To you in David’s town this day
Is born of David’s line
A Saviour, who is Christ the Lord;
And this shall be the sign:
The heavenly Babe you there shall find
To human view displayed,
All meanly wrapped in swathing bands,
And in a manger laid.’
Thus spake the seraph; and forthwith
Appeared a shining throng
Of angels praising God, who thus
Addressed their joyful song:
‘All glory be to God on high,
And on the earth be peace;
Good-will henceforth from heaven to men
Begin and never cease.’
From Little Women
by Louisa May Alcott
Read by Capucine Blanc; Sung by Louise Neubronner
THE JUNGFRAU TO BETH
God bless you, dear Queen Bess!
May nothing you dismay,
But health and peace and happiness
Be yours, this Christmas day.
Here’s fruit to feed our busy bee,
And flowers for her nose.
Here’s music for her pianee,
An afghan for her toes,
A portrait of Joanna, see,
By Raphael No. 2
Who laboured with great industry
To make it fair and true.
Accept a ribbon red, I beg,
For Madam Purrer’s tail,
And ice cream made by lovely Peg,
A Mont Blanc in a pail.
Their dearest love my makers laid
Within my breast of snow.
Accept it, and the Alpine maid,
From Laurie and from Jo.
From A Child’s Christmas in Wales
by Dylan Thomas
Read by Julia Schatz
…One, two, three, and we began to sing, our voices high and seemingly distant in the snow-felted darkness round the house that was occupied by nobody we knew. We stood close together, near the dark door.
And then a small, dry voice, like the voice of someone who has not spoken for a long time, joined our singing: a small, dry, eggshell voice from the other side of the door: a small, dry voice through the keyhole. And when we stopped running we were outside our house; the front room was lovely; balloons floated under the hot-water-bottle-gulping gas; everything was good again and shone over the town…
From Vincent
by Tim Burton
Read by Gero Guttzeit
…Her anger now spent, she walked out through the hall
And while Vincent backed slowly against the wall
The room started to swell, to shiver and creak
His horrid insanity had reached its peak
…
He saw Abercrombie, his zombie slave
And heard his wife call from beyond the grave
She spoke from her coffin and made ghoulish demands
While, through cracking walls, reached skeleton hands
…
Every horror in his life that had crept through his dreams
Swept his mad laughter to terrified screams!
To escape the madness, he reached for the door
But fell limp and lifeless down on the floor…
From the Cider with Rosie
by Laurie Lee
Read by Laurie Atkinson
The week before Christmas, when the snow seemed to lie thickest, was the moment for carol-singing; and when I think back to those nights it is to the crunch of snow and to the lights of the lanterns on it. Carol-singing in my village was a special tithe for the boys, the girls had little to do with it. Like hay-making, blackberrying, stone-clearing and wishing-people-a- happy-Easter, it was one of our seasonal perks. By instinct we knew just when to begin it; a day too soon and we should have been unwelcome, a day too late and we should have received lean looks from people whose bounty was already exhausted. When the true moment came, exactly balanced, we recognised it and were ready…
Illustration by Mark Hearld, in Laurie Lee, Cider with Rosie (London: Vintage, 2014), p. 138
From A Good Man is Hard to Find
by Flannery O’Connor
Read by Curtis Runstedler
Alone with The Misfit, the grandmother found that she had lost her voice. There was not a cloud in the sky nor any sun. There was nothing around her but woods. She wanted to tell him that he must pray. She opened and closed her mouth several times before anything came out. Finally she found herself saying, “Jesus. Jesus,“ meaning, Jesus will help you, but the way she was saying it, it sounded as if she might be cursing. “Yes’m,” The Misfit said as if he agreed. “Jesus shown everything off balance…
“In Memoriam [Ring out, wild Bells]“
by Alfred Lord Tennyson
Read by Amanda Vernon
Ring out, wild bells, to the wild sky,
The flying cloud, the frosty light:
The year is dying in the night;
Ring out, wild bells, and let him die.
Ring out the old, ring in the new,
Ring, happy bells, across the snow:
The year is going, let him go;
Ring out the false, ring in the true.
Ring out the grief that saps the mind
For those that here we see no more;
Ring out the feud of rich and poor,
Ring in redress to all mankind.
Ring out a slowly dying cause,
And ancient forms of party strife;
Ring in the nobler modes of life,
With sweeter manners, purer laws.
Ring out the want, the care, the sin,
The faithless coldness of the times;
Ring out, ring out my mournful rhymes
But ring the fuller minstrel in.
Ring out false pride in place and blood,
The civic slander and the spite;
Ring in the love of truth and right,
Ring in the common love of good.
Ring out old shapes of foul disease;
Ring out the narrowing lust of gold;
Ring out the thousand wars of old,
Ring in the thousand years of peace.
Ring in the valiant man and free,
The larger heart, the kindlier hand;
Ring out the darkness of the land,
Ring in the Christ that is to be.
FromThe Wind in The Willows
by Kenneth Grahame
Read by Robert McColl
Villagers all, this frosty tide,
Let your doors swing open wide,
Though wind may follow, and snow beside,
Yet draw us in by your fire to bide;
Joy shall be yours in the morning!
Here we stand in the cold and the sleet,
Blowing fingers and stamping feet,
Come from far away you to greet–
You by the fire and we in the street–
Bidding you joy in the morning!
“It Came Upon The Midnight Clear“
by Edmund Sears (Text) and Arthur Sullivan (Melody)
Sung by The Seminar “Music and Poetry in Elizabethan and Jacobean England“
IT came upon the midnight clear,
That glorious song of old,
From angels bending near the earth
To touch their harps of gold:
‘Peace on the earth, good-will to men,
From heaven’s all gracious King!‘
The world in solemn stillness lay
To hear the angels sing.
Still through the cloven skies they come,
With peaceful wings unfurled;
And still their heavenly music floats
O‘er all the weary world;
Above its sad and lowly plains
They bend on hovering wing;
And ever o‘er its Babel sounds
The blesséd angels sing.
Yet with the woes of sin and strife
The world has suffered long;
Beneath the angel-strain have rolled
Two thousand years of wrong;
And man, at war with man, hears not
The love-song which they bring:
O hush the noise, ye men of strife,
And hear the angels sing!
For lo! the days are hastening on,
By prophet bards foretold,
When, with the ever-circling years,
Comes round the age of gold;
When peace shall over all the earth
Its ancient splendours fling,
And the whole world give back the song
Which now the angels sing.
From A Christmas Carol
by Charles Dickens
Read by Léa Fourure
Upon its coming in, the dying flame leaped up, as though it cried, “I know him; Marley’s Ghost!“ and fell again. The same face: the very same. Marley in his pigtail, usual waistcoat, tights and boots; the tassels on the latter bristling, like his pigtail, and his coat-skirts, and the hair upon his head. The chain he drew was clasped about his middle…
From Alice’s Adventures in Wonderland
by Lewis Carroll
Read and sung by Vera Yakupova
“Will you walk a little faster?“ said a whiting to a snail.
“There’s a porpoise close behind us, and he’s treading on my tail.
See how eagerly the lobsters and the turtles all advance!
They are waiting on the shingle—will you come and join the dance?
Will you, won’t you, will you, won’t you, will you join the dance?
Will you, won’t you, will you, won’t you, won’t you join the dance?
“You can really have no notion how delightful it will be
When they take us up and throw us, with the lobsters, out to sea!“
But the snail replied “Too far, too far!“ and gave a look askance—
Said he thanked the whiting kindly, but he would not join the dance.
Would not, could not, would not, could not, would not join the dance.
Would not, could not, would not, could not, could not join the dance.
“What matters it how far we go?“ his scaly friend replied.
“There is another shore, you know, upon the other side.
The further off from England the nearer is to France—
Then turn not pale, beloved snail, but come and join the dance.
Will you, won’t you, will you, won’t you, will you join the dance?
Will you, won’t you, will you, won’t you, won’t you join the dance?“
From Mr. Splitfoot
by Samantha Hunt
Read by Molly Bronstein
Every record in the collection is old. No one has lived here for a while. No one buys records anymore. Whatever the reason, each album feels like a forgotten archive of the way life once was here on Earth. She chooses the Bee Gees, Spirits Having Flown. She likes the title…
|
<urn:uuid:a9b077d1-8689-47c2-94ed-651bf609e14b>
|
CC-MAIN-2024-51
|
https://www.connotations.de/debate/the-road-not-taken-in-hemingways-the-snows-of-kilimanjaro/
|
2024-12-12T17:18:09Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00469.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.996173
|
{
"abbr": [
"by-sa",
"by-sa"
],
"in_footer": [
true,
true
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
]
}
|
“I literally have a small version of it in my wallet,” said Pamela Senegal, president of Piedmont Community College and chair of the technology committee for the North Carolina Community College Presidents Association.
The “it” is the North Carolina community colleges’ cyber incident response call tree information sheet.
After a cyberattack at Richmond Community College (RCC), the technology committee put together a list of contacts for community colleges to call in the event of a suspected cyberattack.
Once a cyberattack occurs, investigation and recovery involve the community college system office information technology (IT) personnel, State Bureau of Investigation, Federal Bureau of Investigation, Department of Public Safety, Department of Information Technology, the North Carolina National Guard, and the North Carolina Local Government Information Systems Association “Strike Team.”
While efforts to enhance security across the system continue, colleges won’t be able to toss out the call tree list any time soon.
“Cyberthreat, in my mind, is not going away in the near future,” said Jim Parker, senior vice president and CIO of technology solutions and distance learning at the North Carolina Community College System (NCCCS).
Between 2019 and 2020, ransomware attacks on colleges nationwide doubled. Ransomware is a type of malware that threatens to publish a company or individual’s data from a computer. The average ransomware demand in the U.S. was $312,493 in 2020 – more than double the ransomware demand in 2019.
While the FBI discourages victims from paying cyberattackers, several colleges across the country have admitted to paying the ransom. In July 2020, the University of California, San Francisco paid $1.14 million to hackers. In fall 2020, the University of Utah paid $475,000.
And potential financial loss is not the only concern for colleges. When hit by a cyberattack, colleges can lose personal data, time, resources, and sometimes years worth of class material.
Cyberattacks at North Carolina community colleges
Since 2019, there have been four major cyberattacks at community colleges in North Carolina.
“We are in a threat pattern where higher educational institutions and medium to large-sized businesses are targets,” Parker said.
RCC experienced one of the first major cyberattacks in the system. A Trickbot locked and encrypted the college’s Windows-based servers in July 2019. It took all online services down.
“Payroll went from taking an hour and a half to about 14 and a half hours,” said Dale McInnis, president of RCC.
It took weeks to recover and impacted how students paid and registered for classes. And while student and employee information was unaffected, the college had to get creative. RCC staff registered people on paper and rigged phones for receptionists in key positions.
By fall 2020, two more community colleges experienced cyberattacks that locked down systems and interrupted daily operations. Ransomware attacks shut down Guilford Technical Community College and Piedmont Community College for one day.
“The minute my IT staff saw some corrupted data, they stopped what they were doing, and they called that [incident response call tree] number,” said Senegal.
Even though each college’s core business operations were only down for one day, they’re still mitigating the effects of the cyberincidents.
“I’d say we’re almost 100% recovered, but we’re not completely there,” said Guilford Technical Community College’s president, Anthony Clarke.
Central Piedmont Community College (CPCC) experienced the longest shutdown in February 2021 after a ransomware attack put the college on pause for almost two weeks. The attack on CPCC disrupted their day-to-day operations and wiped out a number of classes.
At the time of the attack, CPCC was in the process of phasing out Blackboard, the learning management system (LMS) used for delivering courses online. But the phase out of Blackboard and full implementation of the new LMS, Brightspace, wasn’t supposed to happen until fall 2021.
Classes still housed in Blackboard were lost in the cyberattack. Everything from course plans to assignments and grades were gone.
“It really requires the college to pull together and do so pretty quickly,” said Jeff Lowrance, vice president of communications, marketing, and public relations at CPCC.
Colleges across the state stepped up, offering Brightspace course shells for lost CPCC classes, but some faculty members still had to rebuild their courses from scratch.
“That’s when you had faculty helping faculty,” Lowrance said.
Taking a systemwide approach
Before the cyberattack at RCC, the system’s approach to security was on an individual level, Parker explained.
But that’s since changed.
The system office established a memorandum of understanding (MOU) last year with the North Carolina Department of Information and Technology (DIT). The MOU is an agreement between NCCCS and DIT that says NCCCS will follow the state’s policies with regard to security.
“What this does is it requires us to come together a little bit more as a system … to establish some common approaches,” said Parker.
One of the first things the system office spent money on was a multi-year contract with an education and training vendor.
“We didn’t just go with basic training,” Parker said. “We went to the vendor and said, ‘We handle student FERPA-related information in addition to [personal identifiable information] and health information that needs to be protected.”
The educational material trains community college employees on how to handle such information and be cognizant of cyberthreats.
While education is a first step, leaders around the state say that they need a deeper bench of IT experts.
At February’s State Board of Community Colleges meeting, the system office outlined the impact of the four ransomware attacks and asked the State Board to approve a legislative request of $1,497,301 in recurring state funds to hire nine regional security officers.
These nine regional officers would be spread out across the state and would provide staff leadership, support, policy, development, localized training, and program evaluation.
“Their total responsibility is to stay current with the latest cyberattack tactics, to monitor our logs for suspicious activity, and to make recommendations about policy settings that we should have, or make, as a result of potential new vulnerabilities that literally come out every day,” said Senegal.
How can colleges prepare?
While the system is revising its cybersecurity approach, individual colleges are taking steps to protect themselves as well.
Caldwell Community College & Technical Institute (CCC&TI) is educating network users about suspicious emails and what to do if they receive one.
“I think the best defense for cybercrime right now is our users,” said Susan Wooten, vice president of technology and instructional support services at CCC&TI.
The IT department at CCC&TI uses software that allows them to simulate phishing attacks. If the user falls for the phishing attack, they are redirected to a training site that provides them with information on what they did wrong and what to look for next time.
Overall, system and college leaders have advice for colleges looking to protect themselves:
- Train your users. Remind them that “It’s you they are coming for,” said Wooten.
- Keep your phone tree list close. If a cyberattack is suspected, start your call tree immediately. “Colleges should establish contacts with state and federal authorities and perhaps discuss their systems beforehand — making sure they are in as good of a position as they can be,” Lowrance said.
- Know what kind of cybersecurity insurance you need. Senegal reminds presidents to have conversations with their insurance agents about what their cybersecurity insurance should cover.
- Assume your systems could be impacted. “Colleges and universities are being targeted,” Lowrance said.
And at the end of the day, understand there is no magic bullet for cybersecurity.
“The more we can make our faculty and staff and students aware to be on the ready and alert and prepared to deal with the threat … I think the better and more effective we’re going to be,” said Parker.
|
<urn:uuid:18ff2b36-b010-4364-a632-44a4cf9dc439>
|
CC-MAIN-2024-51
|
https://www.ednc.org/nc-community-colleges-prepare-cyberattack-ransomware-phishing-response-training/
|
2024-12-12T17:50:29Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00469.warc.gz
|
by-nd
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.998906
|
{
"abbr": [
"by-nd",
"by-nd",
"by-nd"
],
"in_footer": [
false,
false,
false
],
"in_head": [
false,
false,
false
],
"location": [
"a_tag",
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0",
"4.0"
]
}
|
All Categories:
Plugs
Title: | Audio and Video component plugs |
By: | Petr Kratochvil (Website) |
Views: | 665 |
Downloads: | 191 |
Keywords: | Audio, Audio Objects, Cables, Cords, Electrical Plugs, Isolated, Music, Objects, Recreation, Technology, Technology Objects |
License: | Public Domain By downloading this image, you agree to abide by the terms of use of this license. |
PD Info: | This image is licensed under Public Domain. Released to the Public Domain by author. |
Download: Largest
Size: 1280 x 853
File size: 96.8 KB
File type: jpg
File size: 96.8 KB
File type: jpg
Free
Download: Small
Size: 958 x 638
File size: 71.5 KB
File type: jpg
File size: 71.5 KB
File type: jpg
Free
Free Stock Photos: Plugs
(16 results)
|
<urn:uuid:9f1b3d9b-50db-4924-9c4a-9e976020e4db>
|
CC-MAIN-2024-51
|
https://www.freestockphotos.biz/stockphoto/8206
|
2024-12-12T18:16:37Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00469.warc.gz
|
zero
|
1.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.844973
|
{
"abbr": [
"zero",
"zero",
"zero"
],
"in_footer": [
false,
false,
false
],
"in_head": [
false,
false,
false
],
"location": [
"a_tag",
"a_tag",
"a_tag"
],
"version": [
"1.0",
"1.0",
"1.0"
]
}
|
Just In Time for Small Business Saturday
Philadelphia, PA (November 2019) - Start checking holiday gifts off your list withNextfab’s 2019 Holiday Gift Guide, filled with local, handmade products, perfect for Small Business Saturday. NextFab operates locations in South Philadelphia, Downtown Wilmington, Delaware, and NextFab’s new 30,000 sq.ft. North Philadelphia location will open in Spring of 2020. NextFab is a network of membership-based makerspaces that provide access to tools, technology, education, events, and services for makers. With a new location in North Philadelphia opening soon and its fundamental mission in driving artisan entrepreneurs in building their business, this Gift Guide showcases the talent of many of those already successful and budding artisan entrepreneurs. NextFab’s members have a wide range of products that showcases their creativity and craftsmanship. This year's Gift Guide is divided into six categories. 38 local makersare included in the guide that provides a little something for everyone. The categories are:
-
In The Kitchen: Handcrafted kitchen items from local businesses such asPellegrino Cutlery and Ben Doar Studio aspire to provide you with high-quality affordable items. The Gift guide features customizable kitchen items fromDestined Goods that are a daily reminder of life’s best moments. From customizable travel mugs to tumblers, Mark Brandon provides buyers with the ability to commemorate milestones.
-
Home Goods: Featuring home good items, The Fox and Sun make customizable farm-house style signs that are personable to your home. The high-quality affordable signs are available for purchase online. The Gift Guide also features local makers such as Marsau Botanicals, Plaid, and Untitled_Co.
-
Children: Between Pal Socks and Twee Made, these two makers have cultivated gifts that children will love. Former Philadelphia preschool teacher, Kate Leibrand, created Twee Made to focus on a child’s mental health and physical growth. Leibrand designed the sidewalk chalk with eco-friendly ingredients to help children stimulate artistic ability and to encourage imaginative thinking.
-
Jewelry: Jewelry makers like Cody Heller and Idol Light craft their jewelry pieces directly in NextFab space. The guide also features affordable unique jeweler Kpellé Designs. The jewelry line made for women to feel inspired and empowered within their cultures.
-
Small Gifts: With the passion for the art form of hand lettering, Lauren Gagliardi Kelley created Girl Holding A Pen. The unique handcrafted products started with stationery and invitation designs but now offers small personalized home items. It’s not always about the size of the gift. The Gift Guide also includes small gift ideas from Philly Phlights, Loma Living, and Techcharge.
-
Custom Furniture: DNL - DSN features custom commercial and residential furniture by Dan Saldutti. Saldutti created DNL - DSN in 2012 with a mission to find a solution to every problem by using creativity. This section also features custom furniture like Design Studio 312 and Marc DiGaimo Design.
To explore the Gift Guide and see all the companies featured please visit: https://nextfab.com/blog/2019-holiday-gift-guide/
“At NextFab, we believe in local artisan entrepreneurs and our team dedicates itself to helping more people to make things for themselves - and to feel empowered, to create new art, new products, and new businesses. With the opening of our new North Philadelphia space, we will be able to do that at an unprecedented level.”
Evan Malone, President, NextFab
The working space gives the opportunity for makers to craft innovated creations and incredible stories within the NextFab community. With the new North Philadelphia location opening, this gives NextFab the ability to expand their impact reach. Not only does the Gift Guide provide exposure for craft makers and online businesses within the local community it provides everyone a chance to “shop local” and support these local entrepreneurs.
Anyone can enjoy the access to NextFab features by becoming a member athttps://nextfab.com/join/. Stay up to date on what is happening at NextFab by following them on Facebook, Twitter, and Instagram. NextFab can also be found through #NextFabMade. Explore the creations and ideas that were created at NextFab for the 2019 Holiday Gift Guide at https://nextfab.com/blog/2019-holiday-gift-guide/. This Holiday Gift Guide is filled with incredible stories and projects that were created in the NextFab community.
For media inquiries, please contact by email at [email protected].
About NextFab
Founded by Dr. Evan Malone in 2009, NextFab provides professional services and is dedicated to supporting small-scale local manufacturing. The network consists of membership-based makerspaces that allow local community members services to fabricate their needs. NextFab owns and operates three locations in the mid-Atlantic Region that provide access to tools, technology, education, events, and services for makers.
|
<urn:uuid:c4a81922-aa6f-4608-96f5-7e9f6a649172>
|
CC-MAIN-2024-51
|
https://www.gloucestercitynews.net/clearysnotebook/2019/11/nextfab-returns-with-annual-gift-guidejust-in-time-for-small-business-saturday-wide-range-of-products-supporting-local-busin.html
|
2024-12-12T17:45:21Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00469.warc.gz
|
by-sa
|
2.5
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.997168
|
{
"abbr": [
"by-sa",
"by-sa"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"2.5",
"2.5"
]
}
|
Jump to content
Kingdom Hearts - General
KH13 · for Kingdom Hearts
Existing user? Sign In
Sign In
Remember me
Not recommended on shared computers
Sign in anonymously
Sign In
Forgot your password?
Or sign in with one of these services
Sign in with Facebook
Sign in with Twitter
Sign in with Google
Sign in with Twitch
Sign in with Discord
Sign Up
News
Archives
Gallery
Videos
Interviews
Forums
More
More
Like us on Facebook
Follow us on Twitter
Follow us on Tumblr
Follow us on YouTube
Watch us on Twitch
Join the conversation on Discord
Search In
Everywhere
Topics
More options...
Find results that contain...
Any
of my search term words
All
of my search term words
Find results in...
Content titles and body
Content titles only
All Activity
Home
Forums
Kingdom Hearts Forums
Kingdom Hearts - General
*SPOILERS!* Kingdom Hearts HD Re:coded movie cutscenes in English
All
(5)
Like
(5)
Thanks
(0)
Haha
(0)
Confused
(0)
Sad
(0)
Handsome_the_Wise
December 13, 2014
Green Sparrow
November 29, 2014
Yuya Sakaki
November 29, 2014
Alicia Maddox
November 29, 2014
Movies798
November 29, 2014
×
Existing user? Sign In
Sign Up
News
Archives
Back
Gallery
Videos
Interviews
Forums
×
Create New...
|
<urn:uuid:02e32cf0-72ab-4d84-b759-c3b79411854b>
|
CC-MAIN-2024-51
|
https://www.kh13.com/forums/topic/82040-spoilers-kingdom-hearts-hd-recoded-movie-cutscenes-in-english/?do=showReactionsComment&comment=1551393&reaction=1
|
2024-12-12T17:26:38Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00469.warc.gz
|
by
|
3.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.919276
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
]
}
|
UPDATE (5/31/2022) : Each item is now available for pre-order until June 26th, 2022. We have updated our galleries with respective product images and have added hyperlinks to each store page. Additionally, shipments are expected to occur in early November 2022.
Following the announcement of Japanese luxury fashion brand Samantha Thavasa collaborating with Kingdom Hearts' 20th anniversary, the celebratory products have finally been unveiled. Each item is viewable via our galleries below alongside their respective price points and store links.
Aitai Kuji store links are listed in this article's conclusion.
The first wave of products, save for the strap depicting Sora's Station of Awakening, is themed around Sora and Riku.
Round Zip Long Wallet - ¥27,500
L-Zip Fold Wallet - ¥22,000
Round Zip Key Case - ¥15,400
Pouch - ¥12,100
Mini Shoulder Pouch - ¥12,100
Bag Charm - ¥6,050 each
The second wave of products is themed around Organization XIII.
Organization XIII Wallet (¥27,500) / Keychain (¥6,050)
Organization XIII Smartphone Shoulder Bag - ¥22,000
Organization XIII King Mickey Backpack - ¥27,500
Organization XIII Bag Charm - ¥4,400
The final wave of products comprises Keyblade charms, with all 7 making up an obtainable collection. However, each charm will also have its own dedicated store page. The individual charms cost ¥4,950, while the collection housing all of them costs ¥13,200.
Kingdom Key
Way to the Dawn
Kingdom Key D
Star Seeker
KH1 Ultima Weapon
Oathkeeper
Oblivion
Collection
Thanks to @rote_punkt on Twitter for sharing the collective hub page revealing all of these products.
UPDATE (6/1/2022) : Aitai Kuji has now listed each of the aforementioned items on its digital storefront. These items' store links are provided below alongside their price points, which differ from Samantha Thavasa's. No estimated shipment times are available yet.
Round Zip Long Wallet - ¥28,000 ($220.47)
L-Zip Fold Wallet - ¥24,000 ($188.98)
Round Zip Key Case - ¥16,500 ($129.92)
Pouch - ¥13,500 ($106.30)
Mini Shoulder Pouch - ¥13,000 ($102.36)
Bag Charm - ¥6,500 ($51.18)
Organization XIII Wallet - ¥28,000 ($220.47)
Organization XIII Keychain - ¥7,000 ($55.12)
Organization XIII Smartphone Shoulder Bag - ¥24,000 ($188.98)
Organization XIII King Mickey Backpack - ¥28,000 ($220.47)
Organization XIII Bag Charm - ¥5,200 ($40.94)
Keyblade Charm Collection Case ONLY - ¥14,500 ($114.17)
Keyblade Charm Collection - ¥5,500 ($43.31)
Sony Japan has finally revealed the previously announced Kingdom Hearts 20th Anniversary walkman and specially designed earbuds.
The Walkman NW-A105 KH 20th Anniversary Limited Edition costs ¥36,000 and comes with "Hikari" (via a coupon) sung by Utada Hikaru, in "high-resolution" quality. Additionally, the 20th Anniversary branded Wireless Noise Cancellation Stereo Earbuds cost ¥34,000. Both products also have a 3-year warranty.
You can view images of these products via our gallery below:
These products are now available to purchase via Sony Japan's website.
Sony Japan also tweeted about the items' availability, viewable below:
Japanese retailer Blooming Nakanishi has announced that Kingdom Hearts-themed handkerchiefs and microfiber cloths will be available for pre-order via their digital storefront. Each microfiber cloth costs ¥1,100, and the handkerchiefs cost ¥2,200.
Additionally, pre-orders for these products begin on May 27th, 2022, at 12:00 JST and conclude on June 10th, 2022, at 03:00 JST. Shipments are expected to occur in August 2022.
You can view images of each microfiber cloth and handkerchief via our galleries below alongside respective store page links.
Kingdom Hearts II Microfiber Cloth
Sora Station of Awakening Microfiber Cloth
Kingdom Hearts Re:coded Microfiber Cloth
Kingdom Hearts HD 2.5 ReMIX Handkerchief
Kingdom Hearts II Handkerchief
Kingdom Hearts Dream Drop Distance Handkerchief
Kingdom Hearts: Chain of Memories Handkerchief
Kingdom Hearts 358/2 Days Handkerchief
Kingdom Hearts HD 1.5 Handkerchief
If you're interested in purchasing any or all of these products, be sure to check back on these store pages later this week!
Japanese publication Game Watch has announced that Kingdom Hearts merchandise will appear at a dedicated Animate Fair event to celebrate the franchise's 20th anniversary.
A summation of the provided information has been provided via our team's translator, Ryuji:
Of the products currently showcased, there are new stickers depicting each of the games, viewable via our gallery below:
In the latest of Kingdom Hearts references appearing in different media, this one could be the most random. In a recent ad for Taco Bell's Mexican Pizza on their official Facebook page, the rap includes the line "Key to my heart like Sora." You can watch and listen to the ad below.
283001828_153084477282831_2598679471352835282_n.mp4
So far in 2022, in addition to the 20th anniversary celebration of the franchise, Kingdom Hearts has been referenced and have cameos in a couple of Disney+ shows from The Wonderful Spring of Mickey Mouse, The Proud Family: Prouder and Louder, and very recently in Chip 'N Dale: Rescue Rangers.
Fans have discovered an over 5-year old Twitter post of user TheDaguar sharing their discovery of the unused Alice Stained Glass platform within the files of Kingdom Hearts Final Mix.
While this platform artwork was viewable via the Kingdom Hearts Design Document, it being found in the game files themselves is a new, resurged development altogether. Further, it's also far clearer, and several facets of the Station of Awakening platform can be better viewed, including the Queen of Hearts, Cheshire Cat, Mad Hatter, and more. The borders of the platform also house unique icons like the other Station of Awakening platforms, with Alice's containing playing card symbols indicative of Wonderland's motifs.
You can view the original Alice Stained Glass platform via our gallery below:
Thanks to Twitter user @DaniZayaa for sharing this news.
A post from the aforementioned user shared an image of how the platform looks in-game, though it isn't in particularly high-quality yet:
Following the Kingdom Key cameo in the trailer for Chip 'n Dale: Rescue Rangers, another Kingdom Hearts-related cameo has appeared, though this one is quite odd.
Sora's hair is viewable in the recently released Disney+ film as a wig. It's certainly unexpected, but still cool, we guess?
You can view the Sora's hair wig below. Credit to GlaxonXIII for spotting it:
Livedoor News has announced that the upcoming BBC Proms orchestral concert occurring later this year will have video game music performed, including songs from the Kingdom Hearts series. In addition, Pokemon and The Legend of Zelda are also stated to be making musical appearances, with video game tracks being performed on August 1, 2022, by the Royal Philharmonic Orchestra in Royal Albert Hall.
No details on which songs will be performed were provided, but we'll be sure to keep you updated when that information arises.
The official Japanese Kingdom Hearts Twitter account has announced that the Nintendo Switch Cloud apps of Kingdom Hearts HD 1.5 + 2.5 ReMIX, Kingdom Hearts HD II.8 Final Chapter Prologue, and Kingdom Hearts III + Re Mind have been updated to display the server congestion present throughout each title.
The Square Enix Japan support website reiterates this collective announcement with no accompanying details on this matter. Additionally, Kingdom Hearts III + Re Mind will now provide the option to prioritize graphical presentation or performance quality.
Japanese retailer Sega Plaza has announced that their stores will start selling Kingdom Hearts-themed can badges, premium bath towels, and premium clearium on June 10th, 2022. For reference, Clearium is an epoxy resin substance used for decorations in Japan.
You can view images of the Kingdom Hearts-themed can badges and premium clearium via our gallery below. The premium bath towels currently lack images.
Speedrunning has been a constant practice in the Kingdom Hearts fandom, with there being an admirably dedicated community intently focused on maximizing their results with the hobby. However, the history of how these speedruns began and eventually grew has only been known by those who partook in or viewed them during the appropriate times.
Though recently, Kingdom Hearts speedrun community member Saiyanz constructed a remarkable video intricately detailing the growth of Kingdom Hearts Final Mix's speedrunning scene. Saiyanz provides insight and objectivity regarding the runners responsible for pushing the game's limits, the routes used to make these feats possible, and an excellent timeline.
Further, this video's commentary, also done by Egglamation, is beginner-friendly. It explains most concepts and terminology that those unfamiliar with the speedrun scene would not ordinarily be aware of.
Above all else, this video can be perceived as a collective celebration of the Kingdom Hearts speedrunning scene, so congratulations to Saiyans for taking the time to make such a stellar breakdown.
You can view Saiyanz' video chronicling the history of Kingdom Hearts Final Mix speedruns below:
The official Kingdom Hearts Twitter account has finally shared a high resolution, clean version of the series 20th Anniversary art drawn by Tetsuya Nomura!
Numerous characters are gorgeously depicted such as the Guardians of Light, select members of the True Organization XIII, the Master of Masters alongside the Foretellers, and more.
You can view this stellar artwork via our gallery below:
Chapter 24 for the Kingdom Hearts III manga is now available in English from Yen Press. Toy Box Part 5 can be bought as a digital download from Amazon, Barnes & Noble, Book Walker, Google Play, iBooks, and Kobo. The issue's price varies from $1.99 for the United States to $2.99 in Canada.
Chapter 24 was released in Japanese on Gangan Online back on April 21st.
UPDATE (June 1, 2022): Chapter 24.5 is now available from Yen Press! You can as a digital download from Amazon, Barnes & Noble, Book Walker, Google Play, iBooks, and Kobo.
You can also check out the articles for the previous chapters by clicking on the links below!
Chapter 0 Prologue Japanese English
Chapter 1 The New Departure Japanese English
Chapter 2 Olympus Coliseum Part 1 Japanese English
Chapter 3 Olympus Coliseum Part 2 Japanese English
Chapter 4 Olympus Coliseum Part 3 Japanese English
Chapter 5 Olympus Coliseum Part 4 Japanese English
Chapter 6 Olympus Coliseum Part 5 Japanese English
Chapter 7 Olympus Coliseum Part 6 Japanese English
Chapter 8 Olympus Coliseum Part 7 Japanese English
Chapter 9 The Dark World Japanese English
Chapter 10 Unbreakable Connection Japanese English
Chapter 11 The Self inside the Mirror Japanese English
Chapter 12 Reunion Japanese English
Chapter 13 Warmth Japanese English
Chapter 14 Destiny Island Japanese English
Chapter 15 Remaining Light Japanese English
Chapter 16 Tracking the Bond Japanese English
Chapter 17 Following the Heart's Guidance Japanese English
Chapter 18 Twilight Town [1] Japanese English
Chapter 19 Twilight Town [2] Japanese English
Chapter 20 Tox Box [1] Japanese English
Chapter 21 Toy Box [2] Japanese English
Chapter 22 Toy Box [3] Japanese English
Chapter 23 Toy Box [4] Japanese English
Chapter 24 Toy Box [5] Japanese
In addition, Volume 2 of the manga is now available for Japan. The English version is schedule to release on May 3rd.
Square Enix has revealed more celebratory Kingdom Hearts 20th Anniversary merchandise; a King Mickey plush revolving around his Kingdom Hearts II attire. The endearing collectible comes with a miniature suitcase, and it has the 20th-anniversary logo engraved upon his left shoe's sole.
Further, the plush is available for pre-order via Square Enix Japan's digital storefront (¥9,680), and it is planned to ship on November 12th, 2022.
Additional store links will be listed at this article's conclusion when they are provided.
You can view images of the Kingdom Hearts II King Mickey 20th Anniversary Plush via our gallery below:
UPDATE (4/29/2022)
The product is now available for pre-order via Square Enix North America for $99.99 ahead of a March 2023 release window.
AmiAmi & Aitai Kuji have also listed the product for pre-order:
AmiAmi - ¥7,740 - November 2022 shipment
Aitai Kuji - ¥7,750 November 2022 shipment
Square Enix has revealed more celebratory Kingdom Hearts 20th Anniversary merchandise; pin boxes boasting gorgeously arrayed key art from the franchise. The pin boxes are divided across 2 sets, with them both available for pre-order via Square Enix Japan's digital storefront for ¥13,750. They will also ship on September 17th, 2022.
The Square Enix Japan store links are listed below:
Kingdom Hearts 20th Anniversary Pin Box Vol. 1
Kingdom Hearts 20th Anniversary Pin Box Vol. 2
Additional store links will be listed at this article's conclusion when they are provided.
You can view images of the Kingdom Hearts 20th Anniversary Volume 1 & 2 Pin Boxes via our galleries below:
UPDATE (4/29/2022)
The products are available for pre-order via Square Enix North America and they both ship in January 2023 with $134.99 price tags.
Kingdom Hearts 20th Anniversary Pin Box Vol. 1
Kingdom Hearts 20th Anniversary Pin Box Vol. 2
Both Pin Boxes are also available for pre-order via AmiAmi with September 2022 shipments. Further, each package costs ¥13,060 (approximately $100). Thanks to Twitter user @NipahDUBS for pointing this out.
Kingdom Hearts 20th Anniversary Pin Box Vol. 1
Kingdom Hearts 20th Anniversary Pin Box Vol. 2
Aitai Kuji also has both Pin Boxes available for pre-order with September 2022 shipments. Both packages individually cost ¥13,000.
Kingdom Hearts 20th Anniversary Pin Box Vol. 1
Kingdom Hearts 20th Anniversary Pin Box Vol. 2
|
<urn:uuid:3d6e6156-ce80-444d-a0e6-d9e20dfbf4d5>
|
CC-MAIN-2024-51
|
https://www.kh13.com/news/page/11/
|
2024-12-12T17:46:21Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00469.warc.gz
|
by
|
3.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.990262
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
]
}
|
Jump to content
Kingdom Hearts 3D: Dream Drop Distance | HD
KH13 · for Kingdom Hearts
Existing user? Sign In
Sign In
Remember me
Not recommended on shared computers
Sign in anonymously
Sign In
Forgot your password?
Or sign in with one of these services
Sign in with Facebook
Sign in with Twitter
Sign in with Google
Sign in with Twitch
Sign in with Discord
Sign Up
News
Archives
Gallery
Videos
Interviews
Forums
More
More
Like us on Facebook
Follow us on Twitter
Follow us on Tumblr
Follow us on YouTube
Watch us on Twitch
Join the conversation on Discord
Search In
Everywhere
Videos
This Category
This Video
More options...
Find results that contain...
Any
of my search term words
All
of my search term words
Find results in...
Content titles and body
Content titles only
All Activity
Home
Videos
Cutscenes (Note: Currently broken)
Kingdom Hearts 3D: Dream Drop Distance | HD
#159 - Darkness' Call
Game version
Kingdom Hearts 3D: Dream Drop Distance (English)
Kingdom Hearts 3D: Dream Drop Distance (Japanese)
#159 - Darkness' Call
By DChiuch, 10/03/2018
0 comments
Previous Video
#158 - Riku Falls Into Darkness
Next Video
#160 - Darkest End
Recommended Comments
Comments
[[Template videos/front/view/comments is throwing an error. This theme may be out of date. Run the support tool in the AdminCP to restore the default theme.]]
IP.Board Videos by DevFuse
×
Existing user? Sign In
Sign Up
News
Archives
Back
Gallery
Videos
Interviews
Forums
×
Create New...
|
<urn:uuid:7c21889f-5eac-4dc5-a0c4-2e030ac84c23>
|
CC-MAIN-2024-51
|
https://www.kh13.com/videos/view-2561-159-darkness-call/
|
2024-12-12T17:57:39Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00469.warc.gz
|
by
|
3.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.948324
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
]
}
|
Packages There are no open security bugs.
You think something is missing here?
Start with filling a new security bug.Please file new vulnerability reports on Gentoo Bugzilla and assign them to the Gentoo Security product and Vulnerabilities component.
|
<urn:uuid:1d166557-68c1-420f-af44-a9b8b43a406e>
|
CC-MAIN-2024-51
|
https://packages.gentoo.org/packages/dev-util/cram/security
|
2024-12-13T21:17:18Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00369.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.998393
|
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Medium Privacy Policy
You can see our previous Privacy Policy here.
This Privacy Policy explains how A Medium Corporation (“Medium,” “we,” or “us”) collects, uses, and discloses information about you. This Privacy Policy applies when you use our websites, mobile applications, and other online products and services that link to this Privacy Policy (collectively, our “Services”), contact our customer service team, engage with us on social media, or otherwise interact with us.
We may change this Privacy Policy from time to time. If we make changes, we will notify you by revising the date at the top of this policy and, in some cases, we may provide you with additional notice (such as adding a statement to our website or providing you with a notification). We encourage you to review this Privacy Policy regularly to stay informed about our information practices and the choices available to you.
CONTENTS
- Collection of Information
- Use of Information
- Sharing of Information
- Third-Party Embeds
- Transfer of Information to the United States and Other Countries
- Your Choices
- Your California Privacy Rights
- Additional Disclosures for Individuals in Europe
- Contact Us
COLLECTION OF INFORMATION
Information You Provide to Us
We collect information you provide directly to us. For example, you share information directly with us when you create an account, fill out a form, submit or post content through our Services, purchase a membership, communicate with us via third-party platforms, request customer support, or otherwise communicate with us. The types of personal information we may collect include your name, display name, username, bio, email address, business information, your content, including your avatar image, photos, posts, responses, and series published by you, and any other information you choose to provide.
In some cases, we may also collect information you provide about others, such as when you purchase a Medium membership as a gift for someone. We will use this information to fulfill your request and will not send communications to your contacts unrelated to your request, unless they separately consent to receive communications from us or otherwise engage with us.
We do not collect payment information through our Services. We rely on third parties to process payments in connection with our Services. Any information you provide to facilitate such a payment is subject to the third-party payment processor’s privacy policy, and we encourage you to review this policy before you provide any information to the payment processor.
Information We Collect Automatically When You Interact with Us
In some instances, we automatically collect certain information, including:
- Activity Information: We collect information about your activity on our Services, such as your reading history and when you share links, follow users, highlight posts, and clap for posts.
- Transactional Information: When you purchase a membership, we collect information about the transaction, such as subscription details, purchase price, and the date of the transaction.
- Device and Usage Information: We collect information about how you access our Services, including data about the device and network you use, such as your hardware model, operating system version, mobile network, IP address, unique device identifiers, browser type, and app version. We also collect information about your activity on our Services, such as access times, pages viewed, links clicked, and the page you visited before navigating to our Services.
- Information Collected by Cookies and Similar Tracking Technologies: We use tracking technologies, such as cookies and web beacons, to collect information about you. Cookies are small data files stored on your hard drive or in device memory that help us improve our Services and your experience, see which areas and features of our Services are popular, and count visits. Web beacons (also known as “pixel tags” or “clear GIFs”) are electronic images that we use on our Services and in our emails to help deliver cookies, count visits, and understand usage. We also work with third party analytics providers who use cookies, web beacons, device identifiers, and other technologies to collect information about your use of our Services and other websites and applications, including your IP address, web browser, mobile network information, pages viewed, time spent on pages or in mobile apps, and links clicked. This information may be used by Medium and others to, among other things, analyze and track data, determine the popularity of certain content, deliver content targeted to your interests on our Services, and better understand your online activity. For more information about cookies and how to disable them, see Your Choices below.
Information We Collect from Other Sources
We obtain information from third-party sources. For example, we may collect information about you from social networks, accounting services providers and data analytics providers. Additionally, if you create or log into your Medium account through a third-party platform (such as Apple, Facebook, Google, or Twitter), we will have access to certain information from that platform, such as your name, lists of friends or followers, birthday, and profile picture, in accordance with the authorization procedures determined by such platform.
Information We Derive
We may derive information or draw inferences about you based on the information we collect. For example, we may make inferences about your location based on your IP address or infer reading preferences based on your reading history.
USE OF INFORMATION
We use the information we collect to provide, maintain, and improve our Services, which includes publishing and distributing user-generated content, personalizing the posts you see and operating our metered paywall. We also use the information we collect to:
- Create and maintain your Medium account;
- Process transactions and send related information, such as confirmations, receipts, and user experience surveys;
- Send you technical notices, security alerts, and support and administrative messages;
- Respond to your comments and questions and provide customer service;
- Communicate with you about new content, products, services, and features offered by Medium and provide other news and information we think will interest you (see Your Choices below for information about how to opt out of these communications at any time);
- Monitor and analyze trends, usage, and activities in connection with our Services;
- Detect, investigate, and prevent security incidents and other malicious, deceptive, fraudulent, or illegal activity and protect the rights and property of Medium and others;
- Debug to identify and repair errors in our Services;
- Comply with our legal and financial obligations; and
- Carry out any other purpose described to you at the time the information was collected.
SHARING OF INFORMATION
We share personal information in the following circumstances or as otherwise described in this policy:
- We share personal information with other users of the Services. For example, if you use our Services to publish content, post comments or send private notes, certain information about you will be visible to others, such as your name, photo, bio, other account information you may provide, and information about your activities on our Services (e.g., your followers and who you follow, recent posts, claps, highlights, and responses).
- We share personal information with vendors, service providers, and consultants that need access to personal information in order to perform services for us, such as companies that assist us with web hosting, storage, and other infrastructure, analytics, payment processing, fraud prevention and security, customer service, communications, and marketing.
- We may disclose personal information if we believe that disclosure is in accordance with, or required by, any applicable law or legal process, including lawful requests by public authorities to meet national security or law enforcement requirements. If we are going to disclose your personal information in response to legal process, we will give you notice so you can challenge it (for example by seeking court intervention), unless we are prohibited by law or believe doing so may endanger others or cause illegal conduct. We will object to legal requests for information about users of our Services that we believe are improper.
- We may share personal information if we believe that your actions are inconsistent with our user agreements or policies, if we believe that you have violated the law, or if we believe it is necessary to protect the rights, property, and safety of Medium, our users, the public, or others.
- We share personal information with our lawyers and other professional advisors where necessary to obtain advice or otherwise protect and manage our business interests.
- We may share personal information in connection with, or during negotiations concerning, any merger, sale of company assets, financing, or acquisition of all or a portion of our business by another company.
- Personal information is shared between and among Medium and our current and future parents, affiliates, and subsidiaries and other companies under common control and ownership.
- We share personal information with your consent or at your direction.
- We also share aggregated or de-identified information that cannot reasonably be used to identify you.
THIRD-PARTY EMBEDS
Medium does not host some of the content displayed on our Services. Users have the ability to post content that is actually hosted by a third party, but is embedded in our pages (an “Embed”). When you interact with an Embed, it can send information about your interaction to the hosting third party just as if you were visiting the third party’s site directly. For example, when you load a Medium post page with a YouTube video Embed and watch the video, YouTube receives information about your activity, such as your IP address and how much of the video you watch. Medium does not control what information third parties collect through Embeds or what they do with the information. This Privacy Policy does not apply to information collected through Embeds. The privacy policy belonging to the third party hosting the Embed applies to any information the Embed collects, and we recommend you review that policy before interacting with the Embed.
TRANSFER OF INFORMATION TO THE UNITED STATES AND OTHER COUNTRIES
Medium is headquartered in the United States, and we have operations and service providers in the United States and other countries. Therefore, we and our service providers may transfer your personal information to, or store or access it in, jurisdictions that may not provide levels of data protection that are equivalent to those of your home jurisdiction. For example, we transfer personal data to Amazon Web Services, one of our service providers that processes personal information for us in various data center locations across the globe, including those listed here. We will take steps to ensure that your personal information receives an adequate level of protection in the jurisdictions in which we process it.
YOUR CHOICES
Account Information
You may access, correct, delete and export your account information at any time by logging into the Services and navigating to the Settings page. Please note that if you choose to delete your account, we may continue to retain certain information about you as required by law or for our legitimate business purposes.
Cookies
Most web browsers are set to accept cookies by default. If you prefer, you can usually adjust your browser settings to remove or reject browser cookies. Please note that removing or rejecting cookies could affect the availability and functionality of our Services.
Communications Preferences
You may opt out of receiving certain communications from us, such as digests, newsletters, and activity notifications, by following the instructions in those communications or through your account’s Settings page. If you opt out, we may still send you administrative emails, such as those about your account or our ongoing business relations.
Mobile Push Notifications
With your consent, we may send push notifications to your mobile device. You can deactivate these messages at any time by changing the notification settings on your mobile device.
YOUR CALIFORNIA PRIVACY RIGHTS
The California Consumer Privacy Act or “CCPA” (Cal. Civ. Code § 1798.100 et seq.) affords consumers residing in California certain rights with respect to their personal information. If you are a California resident, this section applies to you.
In the preceding 12 months, we have collected the following categories of personal information: identifiers, commercial information, internet or other electronic network activity information, and inferences. For details about the precise data points we collect and the categories of sources of such collection, please see the Collection of Information section above. We collect personal information for the business and commercial purposes described in the Use of Information section above. In the preceding 12 months, we have disclosed the following categories of personal information for business purposes to the following categories of recipients:
Medium does not sell your personal information.
Subject to certain limitations, you have the right to (1) request to know more about the categories and specific pieces of personal information we collect, use, and disclose about you, (2) request deletion of your personal information, (3) opt out of any sales of your personal information, if we engage in that activity in the future, and (4) not be discriminated against for exercising these rights. You may make these requests by emailing us at email@example.com or by completing this webform. We will verify a webform request by asking you to provide identifying information. We will not discriminate against you if you exercise your rights under the CCPA.
If we receive your request from an authorized agent, we may ask for evidence that you have provided such agent with a power of attorney or that the agent otherwise has valid written authority to submit requests to exercise rights on your behalf. This may include requiring you to verify your identity. If you are an authorized agent seeking to make a request, please contact us.
ADDITIONAL DISCLOSURES FOR INDIVIDUALS IN EUROPE
If you are located in the European Economic Area (“EEA”), the United Kingdom, or Switzerland, you have certain rights and protections under applicable law regarding the processing of your personal data, and this section applies to you.
Legal Basis for Processing
When we process your personal data, we will do so in reliance on the following lawful bases:
- To perform our responsibilities under our contract with you (e.g., providing the products and services you requested).
- When we have a legitimate interest in processing your personal data to operate our business or protect our interests (e.g., to provide, maintain, and improve our products and services, conduct data analytics, and communicate with you).
- To comply with our legal obligations (e.g., to maintain a record of your consents and track those who have opted out of non-administrative communications).
- When we have your consent to do so (e.g., when you opt in to receive non-administrative communications from us). When consent is the legal basis for our processing your personal data, you may withdraw such consent at any time.
Data Retention
We store personal data associated with your account for as long as your account remains active. If you close your account, we will delete your account data within 14 days. We store other personal data for as long as necessary to carry out the purposes for which we originally collected it and for other legitimate business purposes, including to meet our legal, regulatory, or other compliance obligations.
Data Subject Requests
Subject to certain limitations, you have the right to request access to the personal data we hold about you and to receive your data in a portable format, the right to ask that your personal data be corrected or erased, and the right to object to, or request that we restrict, certain processing. To exercise your rights:
- If you sign up for a Medium account, you may at any time request an export of your personal information from the Settings page, or by going to Settings and then selecting Account within our app.
- You may correct information associated with your account from the Settings page, or by going to Settings and then selecting Account within our app, and the Customize Your Interests page to update your interests.
- You may withdraw consent by deleting your account at any time through the Settings page, or by going to Settings and then selecting Account within our app (except to the extent Medium is prevented by law from deleting your information).
- You may object at any time to the use of your personal data by contacting firstname.lastname@example.org.
Questions or Complaints
If you have a concern about our processing of personal data that we are not able to resolve, you have the right to lodge a complaint with the Data Protection Authority where you reside. Contact details for your Data Protection Authority can be found using the links below:
- For individuals in the EEA:
https://edpb.europa.eu/about-edpb/board/members_en - For individuals in the UK:
https://ico.org.uk/global/contact-us/ - For individuals in Switzerland: https://www.edoeb.admin.ch/edoeb/en/home/the-fdpic/contact.html
CONTACT US
If you have any questions about this Privacy Policy, please contact us at email@example.com.
If you are from the EEA or the United Kingdom and have questions about this Privacy Policy, please contact us at firstname.lastname@example.org or our privacy representatives as follows:
Privacy representative for EEA
Unit 3D North Point House
North Point Business Park
New Mallow Road
Cork T23AT2P
Ireland
Or here.
Privacy representative for the United Kingdom
37 Albert Embankment
London SE1 7TL
United Kingdom
Or here.
|
<urn:uuid:ebc50893-5573-4403-8ce3-8d7559a688b6>
|
CC-MAIN-2024-51
|
https://policy.medium.com/medium-privacy-policy-f03bf92035c9?source=post_page-----4b87e85536ab--------------------------------
|
2024-12-13T21:47:59Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00369.warc.gz
|
by
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.993109
|
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
- Browse by Topic
Selected Topic:
This Insight explores the importance of a deliberate, phased approach to implementing educational initiatives, emphasizing that intentionality, rather than speed, is crucial for long-term success. By piloting new practices, building teacher...
Supporting Student Nutrition in Virtual and Hybrid Settings: Lessons from Addressing the Digital Divide
Virtual learners often can't access the same level of nutritional support as their in-person peers. This insight helps virtual and hybrid school and system leaders tackle this challenge.
For students to succeed in a virtual/hybrid learning environment, it is essential for schools and teachers to implement learner-centered design practices. This Insight explores the research behind this critical lever and real-world case studies of...
For students to succeed in a virtual/hybrid learning environment, it is essential for schools and teachers to foster learner-centered design practices. This Insight explores the research behind this critical lever and real-world case studies of...
For students to succeed in a virtual/hybrid learning environment, it is essential for schools to establish clear norms and expectations to ease students’ and families’ transitions into virtual and hybrid learning and set them up for success. This...
For students to succeed in a virtual/hybrid learning environment, it is vital that schools put support structures in place that inform, encourage, and support families as an integral part of their child’s learning experience. This Insight explores...
For students to succeed in a virtual/hybrid learning environment, it is crucial to not only attend to students’ emotions on the other side of the screen – but also prioritize building relationships and creating a sense of social presence similar to...
For students to succeed in a virtual/hybrid learning environment, it is essential for schools to improve both teacher and student capacity with technology. This Insight explores the research behind this critical lever and real-world case studies of...
How Do Edtech Products “Stack” Up?: Improving Quality in Virtual and Hybrid Learning Through Technology
This resource distills learnings about what must be true for edtech to promote virtual and hybrid learning program quality and offers leaders a series of questions to ask themselves when considering their own edtech products’ ability to do so.
As technology continues to advance, online resource repositories – the websites, hubs, libraries, or other platforms used to find and implement resources and practices – have become an increasingly popular tool for educators looking to innovate....
This actionable insight covers how education leaders can use The Learning Accelerator's Hop, Skip, Leapfrog Guide to lead their educators through change management and reinvention of school models.
This guidance highlights a number of the considerations that states are making about their course access programs, demonstrates models states have developed based on these considerations, and provides resources to help states address critical...
Measuring Unfinished Learning: A Guide for Schools and Systems to Understand and Measure Student Progress
This insight investigates how education leaders can take an asset-based approach to measuring student learning, offering concrete processes and methodology to examine learner growth during times of disruption to student learning.
Explore ways to design an effective synchronous video learning experiences, starting with what you already know and exploring the effective in-person strategies you used prior to remote learning.
In this Insight, Elizabeth LeBlanc shares some of the hops, skips, and leaps Taos Academy Charter has made during the COVID-19 pandemic to facilitate effective teaching and learning – and examines what they'll take forward with them.
This case study provides an overview of Monterey Peninsula Unified School District's experience progressing through Real-Time Redesign.
This case study provides an overview of Cedar Rapids Community School District's experience progressing through Real-Time Redesign.
This case study provides an overview of Mastery Charter Schools' experience progressing through Real-Time Redesign.
Today's One Thing for Teachers and Leaders: Starting Conversations About Racial Injustice in Schools
This special installment of Today's One Thing shares insights around having conversations in the classroom about racial injustice for both teachers and leaders.
This week’s edition of Today’s One Thing addresses how to keep students engaged with learning during the summer months.
This installment of Today's One Thing for Leaders explores how education leaders can think about planning for the months ahead and the relaunch of learning in the fall.
This installment of Today’s One Thing addresses how to remotely engage families to support student development and outcomes.
This installment of Today's One Thing for Leaders explores how leaders can support and engage families and teachers over the summer.
This installment of Today’s One Thing discusses how to implement social-emotional learning activities in a remote classroom setting.
This installment of Today's One Thing for Leaders explores the process of onboarding new teachers in a remote environment.
In this week’s installment of Today’s One Thing, we address how to differentiate instruction in a remote setting.
Today’s One Thing for Leaders: Hiring Teachers in a Remote Setting, Part 1 – Active Recruitment and Selection
This installment of Today's One Thing for Leaders explores the process of hiring teachers in a remote setting through active recruitment.
This edition of Today’s One Thing for Teachers discusses different ways you can remotely assess learning to improve instruction.
This installment of Today's One Thing for Leaders explores ways to celebrate Teacher Appreciation Week in a remote learning environment.
In this installment of TLA’s Today’s One Thing, we look at how teachers can flip their already existing content and leverage Open Educational Resources (OER) to teach in their virtual classrooms.
This Insight shares useful professional development strategies that help PD providers support educators during the shift to remote learning spaces.
In this first installment of Today's One Thing for Leaders, we discuss how to meet the social needs of school teams and students in a remote environment.
This installment of TLA’s Today’s One Thing addresses how to set up structures for student accountability by using student-driven trackers.
This installment of TLA’s Today’s One Thing touches on how to help build structures to guide students to work effectively and independently from home.
Today's One Thing is TLA's new series aimed at sharing concrete resources, ideas, tools, and best practices around one specific topic targeted towards helping educators and leaders solve their challenges around the recent shift to remote and online...
This Insight, based off of research conducted by the Institute for Teaching and Leading, explores the actions of school and district leadership in terms of their impact on empowerment, self-efficacy, mindset, and motivation of the learning...
This Insight, based off of research conducted by the Institute for Teaching and Leading, explores the most impactful actions site-level leadership can use to effectively lead schools through engagement, collaboration, and teambuilding.
To help understand how district and building-level administrators can successfully manage the change process when leading personalized learning initiatives, the Institute for Teaching and Leading (i4tl) conducted research looking at which actions by...
In this installment of IgnitED Research, a series that aims to build stronger connections between learning science and instructional practice, we look at prior knowledge and its uses in maximizing learning.
In this installment of IgnitED Research, a series that aims to build stronger connections between learning science and instructional practice, we look at classroom management and how to empower students to co-create and drive management processes.
This installment of our series connecting learning science and instructional practice focuses on how retrieving information helps students learn.
This installment of our series connecting learning science and instructional practice focuses on the benefits of mixed-ability student groups.
This installment of our series connecting learning science and instructional practice focuses on the evidence base about feedback, and how this evidence can be applied in your classroom.
This first installment of our series connecting learning science and instructional practice focuses on the evidence base which shows learning styles do not exist, and how this evidence can be applied in your classroom.
This Insight investigates the use of NWEA report data alongside a virtual comparison group to produce actionable insights when implementing blended learning.
Most schools and districts have a specific communications strategy built-in to their yearly calendar; however, many of these schools and districts need to work on the storytelling they use in order to leverage communication strategies more...
We engaged in two researcher-practitioner partnerships (RPPs) with Distinctive Schools, and Leadership Public Schools over one school year to help them determine how best to scale their personalized learning initiatives. Here are the lessons we...
Teachers Guild and The Learning Accelerator are joining forces for a personalized learning collaboration. As a kickoff, we asked educators to submit their favorite lessons or activities that they already use to personalize learning in their...
As more and more educators across the country are moving towards blended learning, they are struggling with a very challenging question: how exactly do I make mastery-based progression happen in my classroom?
Using how your students learn to drive your practices and personalize for students through self-reflection, empowering your learners, and allowing for multiple paths to mastery.
Creating a classroom culture that personalizes learning for students is facilitated by teaching key skills and mindsets that students need to navigate their education.
Springpoint's paper, Inside Mastery Based High Schools: Profiles and Conversations, includes several innovative approaches to the challenge of mastery-based grading.
Discover strategies for implementing blended and personalized learning in classrooms
Snapshots from six schools using blended learning to put students in control. (Originally published in eSchoolNews on November 14, 2016)
Find out how Relay GSE has approached management and classroom culture when implementing blended learning.
Watch these brief videos to discover the multiple features of the Blended & Personalized Learning Practices at Work site.
Blended and personalized learning models attempt to put students into greater control of their learning. Teachers need to build in explicit supports and structures to support students as they exercise greater choice and control. One structure we...
Successful blended and personalized implementations have clear statements for why they are pursuing change through blended and personalized learning. They ground all of their work in this “why,” referring back to it again and again.
|
<urn:uuid:d3692c3f-ca68-45a7-b57a-c28124d1f6b0>
|
CC-MAIN-2024-51
|
https://practices.learningaccelerator.org/insights?query=formative%20assessments?query=quizzes?query=storytelling?query=evidence-based?query=classroom%20management?query=Student%20grouping?query=mixed-ability%20groups?query=learning%20science?query=quizzes?query=measuring%20implementation?query=learner%20agency?query=connectivity?query=learning%20styles?query=mixed%20ability?query=mastery-based?query=classroom%20culture?query=learning%20science?query=classroom%20management?query=student%20groups?query=student%20agency?query=prior%20knowledge?query=feedback?query=mixed-ability%20groups?query=course%20access?query=vision%20planning?query=course%20access?query=policy?query=student%20engagement?query=remote%20learning?query=parent%20engagement?query=classroom%20culture?query=classroom%20management?query=leadership?query=student%20agency?query=quality
|
2024-12-13T20:46:55Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00369.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.99694
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
- Browse by Topic
Selected Topic:
This Insight explores the importance of a deliberate, phased approach to implementing educational initiatives, emphasizing that intentionality, rather than speed, is crucial for long-term success. By piloting new practices, building teacher...
Supporting Student Nutrition in Virtual and Hybrid Settings: Lessons from Addressing the Digital Divide
Virtual learners often can't access the same level of nutritional support as their in-person peers. This insight helps virtual and hybrid school and system leaders tackle this challenge.
For students to succeed in a virtual/hybrid learning environment, it is essential for schools and teachers to implement learner-centered design practices. This Insight explores the research behind this critical lever and real-world case studies of...
For students to succeed in a virtual/hybrid learning environment, it is essential for schools and teachers to foster learner-centered design practices. This Insight explores the research behind this critical lever and real-world case studies of...
For students to succeed in a virtual/hybrid learning environment, it is essential for schools to establish clear norms and expectations to ease students’ and families’ transitions into virtual and hybrid learning and set them up for success. This...
For students to succeed in a virtual/hybrid learning environment, it is vital that schools put support structures in place that inform, encourage, and support families as an integral part of their child’s learning experience. This Insight explores...
For students to succeed in a virtual/hybrid learning environment, it is crucial to not only attend to students’ emotions on the other side of the screen – but also prioritize building relationships and creating a sense of social presence similar to...
For students to succeed in a virtual/hybrid learning environment, it is essential for schools to improve both teacher and student capacity with technology. This Insight explores the research behind this critical lever and real-world case studies of...
How Do Edtech Products “Stack” Up?: Improving Quality in Virtual and Hybrid Learning Through Technology
This resource distills learnings about what must be true for edtech to promote virtual and hybrid learning program quality and offers leaders a series of questions to ask themselves when considering their own edtech products’ ability to do so.
As technology continues to advance, online resource repositories – the websites, hubs, libraries, or other platforms used to find and implement resources and practices – have become an increasingly popular tool for educators looking to innovate....
This actionable insight covers how education leaders can use The Learning Accelerator's Hop, Skip, Leapfrog Guide to lead their educators through change management and reinvention of school models.
This guidance highlights a number of the considerations that states are making about their course access programs, demonstrates models states have developed based on these considerations, and provides resources to help states address critical...
Measuring Unfinished Learning: A Guide for Schools and Systems to Understand and Measure Student Progress
This insight investigates how education leaders can take an asset-based approach to measuring student learning, offering concrete processes and methodology to examine learner growth during times of disruption to student learning.
Explore ways to design an effective synchronous video learning experiences, starting with what you already know and exploring the effective in-person strategies you used prior to remote learning.
In this Insight, Elizabeth LeBlanc shares some of the hops, skips, and leaps Taos Academy Charter has made during the COVID-19 pandemic to facilitate effective teaching and learning – and examines what they'll take forward with them.
This case study provides an overview of Monterey Peninsula Unified School District's experience progressing through Real-Time Redesign.
This case study provides an overview of Cedar Rapids Community School District's experience progressing through Real-Time Redesign.
This case study provides an overview of Mastery Charter Schools' experience progressing through Real-Time Redesign.
Today's One Thing for Teachers and Leaders: Starting Conversations About Racial Injustice in Schools
This special installment of Today's One Thing shares insights around having conversations in the classroom about racial injustice for both teachers and leaders.
This week’s edition of Today’s One Thing addresses how to keep students engaged with learning during the summer months.
This installment of Today's One Thing for Leaders explores how education leaders can think about planning for the months ahead and the relaunch of learning in the fall.
This installment of Today’s One Thing addresses how to remotely engage families to support student development and outcomes.
This installment of Today's One Thing for Leaders explores how leaders can support and engage families and teachers over the summer.
This installment of Today’s One Thing discusses how to implement social-emotional learning activities in a remote classroom setting.
This installment of Today's One Thing for Leaders explores the process of onboarding new teachers in a remote environment.
In this week’s installment of Today’s One Thing, we address how to differentiate instruction in a remote setting.
Today’s One Thing for Leaders: Hiring Teachers in a Remote Setting, Part 1 – Active Recruitment and Selection
This installment of Today's One Thing for Leaders explores the process of hiring teachers in a remote setting through active recruitment.
This edition of Today’s One Thing for Teachers discusses different ways you can remotely assess learning to improve instruction.
This installment of Today's One Thing for Leaders explores ways to celebrate Teacher Appreciation Week in a remote learning environment.
In this installment of TLA’s Today’s One Thing, we look at how teachers can flip their already existing content and leverage Open Educational Resources (OER) to teach in their virtual classrooms.
This Insight shares useful professional development strategies that help PD providers support educators during the shift to remote learning spaces.
In this first installment of Today's One Thing for Leaders, we discuss how to meet the social needs of school teams and students in a remote environment.
This installment of TLA’s Today’s One Thing addresses how to set up structures for student accountability by using student-driven trackers.
This installment of TLA’s Today’s One Thing touches on how to help build structures to guide students to work effectively and independently from home.
Today's One Thing is TLA's new series aimed at sharing concrete resources, ideas, tools, and best practices around one specific topic targeted towards helping educators and leaders solve their challenges around the recent shift to remote and online...
This Insight, based off of research conducted by the Institute for Teaching and Leading, explores the actions of school and district leadership in terms of their impact on empowerment, self-efficacy, mindset, and motivation of the learning...
This Insight, based off of research conducted by the Institute for Teaching and Leading, explores the most impactful actions site-level leadership can use to effectively lead schools through engagement, collaboration, and teambuilding.
To help understand how district and building-level administrators can successfully manage the change process when leading personalized learning initiatives, the Institute for Teaching and Leading (i4tl) conducted research looking at which actions by...
In this installment of IgnitED Research, a series that aims to build stronger connections between learning science and instructional practice, we look at prior knowledge and its uses in maximizing learning.
In this installment of IgnitED Research, a series that aims to build stronger connections between learning science and instructional practice, we look at classroom management and how to empower students to co-create and drive management processes.
This installment of our series connecting learning science and instructional practice focuses on how retrieving information helps students learn.
This installment of our series connecting learning science and instructional practice focuses on the benefits of mixed-ability student groups.
This installment of our series connecting learning science and instructional practice focuses on the evidence base about feedback, and how this evidence can be applied in your classroom.
This first installment of our series connecting learning science and instructional practice focuses on the evidence base which shows learning styles do not exist, and how this evidence can be applied in your classroom.
This Insight investigates the use of NWEA report data alongside a virtual comparison group to produce actionable insights when implementing blended learning.
Most schools and districts have a specific communications strategy built-in to their yearly calendar; however, many of these schools and districts need to work on the storytelling they use in order to leverage communication strategies more...
We engaged in two researcher-practitioner partnerships (RPPs) with Distinctive Schools, and Leadership Public Schools over one school year to help them determine how best to scale their personalized learning initiatives. Here are the lessons we...
Teachers Guild and The Learning Accelerator are joining forces for a personalized learning collaboration. As a kickoff, we asked educators to submit their favorite lessons or activities that they already use to personalize learning in their...
As more and more educators across the country are moving towards blended learning, they are struggling with a very challenging question: how exactly do I make mastery-based progression happen in my classroom?
Using how your students learn to drive your practices and personalize for students through self-reflection, empowering your learners, and allowing for multiple paths to mastery.
Creating a classroom culture that personalizes learning for students is facilitated by teaching key skills and mindsets that students need to navigate their education.
Springpoint's paper, Inside Mastery Based High Schools: Profiles and Conversations, includes several innovative approaches to the challenge of mastery-based grading.
Discover strategies for implementing blended and personalized learning in classrooms
Snapshots from six schools using blended learning to put students in control. (Originally published in eSchoolNews on November 14, 2016)
Find out how Relay GSE has approached management and classroom culture when implementing blended learning.
Watch these brief videos to discover the multiple features of the Blended & Personalized Learning Practices at Work site.
Blended and personalized learning models attempt to put students into greater control of their learning. Teachers need to build in explicit supports and structures to support students as they exercise greater choice and control. One structure we...
Successful blended and personalized implementations have clear statements for why they are pursuing change through blended and personalized learning. They ground all of their work in this “why,” referring back to it again and again.
|
<urn:uuid:d646d8d4-9dba-4350-9441-36ef633267f8>
|
CC-MAIN-2024-51
|
https://practices.learningaccelerator.org/insights?query=mixed-ability%20groups?query=mixed%20ability?query=data?query=mastery-based?query=communications?query=storytelling?query=measuring%20implementation?query=prior%20knowledge?query=student%20agency?query=mastery-based%20progression?query=connectivity?query=retrieval%20practice?query=measurement?query=research%20questions?query=storytelling?query=quizzes?query=communications?query=mixed-ability%20groups?query=evidence-based?query=unfinished%20learning?query=prior%20knowledge?query=student-centered?query=family%20engagement?query=teaching%20resources?query=grouping?query=unfinished%20learning?query=OER?query=learning%20styles?query=mastery-based?query=capacity?query=vision%20planning?query=leadership
|
2024-12-13T21:47:49Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00369.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.99694
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
The Decemberists are an American indie rock band from Portland, Oregon, formed in 2000. The band consists of Colin Meloy (lead vocals, guitar), Chris Funk (guitar, multi-instrumentalist), Jenny Conlee (piano, keyboards, accordion, backing vocals), Nate Query (bass), and John Moen (drums).
As of 2024, the band has released nine studio albums with their lyrics often focusing on historical incidents…
|
<urn:uuid:0670e258-f956-4eae-8e77-f7e438afa341>
|
CC-MAIN-2024-51
|
https://record.club/artists/the-decemberists
|
2024-12-13T22:10:54Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00369.warc.gz
|
by-sa
|
3.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.978373
|
{
"abbr": [
"by-sa"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
]
}
|
skip to main content
OSU Libraries
Log In
Contact Us
View Shelf (
0
)
Special Collections and Archives
Research Center
Collections
Collections by Title
Collections by Type
People, Places, and Topics
Creators
Digital Resources
University History
History of Science
Linus Pauling Online
Oregon Multicultural Archives
Natural Resources
Online Audio/Video
Social Media
About Us
Mission Statement
Department History
Staff
Using Our Collections
Facilities
Frequently Asked Questions
Services
Frequently Asked Questions
Donating Materials
Facilities
Instruction and Outreach
Records Management
Reference
Reproduction & Use
Ask An Archivist
Search Term
Search Scope
Collections Only
Entire Site
Search
My Research Shelf
Your research shelf is currently empty.
To learn more about our by-appointment hours, and the logistics of in-person research, please visit the
Conducting In-person Research
page of our
Guide to SCARC
.
|
<urn:uuid:49ed2628-8477-4ba3-af8a-5ec78b0ad0dd>
|
CC-MAIN-2024-51
|
https://scarc.library.oregonstate.edu/findingaids/?p=collections/research&f=cart&referer=scarc.library.oregonstate.edu%2Ffindingaids%2F%3Fp%3Dcollections%2Fresearch%26f%3Demail%26referer%3Dscarc.library.oregonstate.edu%252Ffindingaids%252F%253Fp%253Dcore%252Flogin%2526go%253Dp%25253Dcore%25252Fsearch%252526subjectid%25253D6066
|
2024-12-13T22:08:20Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00369.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.769503
|
{
"abbr": [
"by",
"by"
],
"in_footer": [
true,
true
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
]
}
|
Results: 3
#1
au:"KOSE, Timur"
Filters
Order by
Page
of 1
Next
2.
Bacteriological profile in conjunctival, lacrimal sac, and nasal specimens and conjunctival normalization time following external, endoscopic, and transcanalicular multidiode laser dacryocystorhinostomy
Volume
N.
Pages
3.
In vivo performance of different scaffolds for dental pulp stem cells induced for odontogenic differentiation
Volume
N.
elocation
Showing
itens per page
Page
of 1
Next
|
<urn:uuid:4cc26537-f805-4f6f-a179-62628f39b824>
|
CC-MAIN-2024-51
|
https://search.scielo.org/?lang=en&q=au:%22KOSE,%20Timur%22
|
2024-12-13T20:45:38Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00369.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.71943
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
In Boston we recently got a new way to pay for the metro (called the T around here). Previously you would either use cash or buy a token. The previous system was really simple. Buy a token for a set fare, if you don't have a token you can pay in cash at above ground stations.
There were three visible problems with the old system:
- The train cars didn't accept bills easily
- The token machines didn't accept credit cards
- Many above ground stations didn't accept tokens forcing people to use quarters and slowing down the whole process.
The Charlie Card hoped to address some of these problems without creating new ones. Unfortunatly things didn't work out that way.
The new system has created many new problems both in the physical design as well as the touchscreen interface.
- Previously if you had a token you would put the token in and move on. The token is round and it doesn't matter what way you drop it in. This has been replaced with a ticket. If you insert the ticket you have a 3 in 4 chance of inserting it the wrong way. Yes, it has an arrow but people still make this mistake.
- If you're a frequent T rider you can get an RFID pass that helps solve the above issue. Only problem is you can't buy these cards at the T stops and you can't refill them at many stops either. This means that you still have to use cash...
- The new metro cars now accept dollar bills. Using an automated bill rejector. In the original design there was a 2-inch hole, you would crumple up your bill and shove it in the hole. The metro driver would visually verify your fair. It wasn't pretty but it did work. The new system allows you to hold up the whole line as you try to straighten your bill to feed it into the machine.
- You can still use coins but they managed to screw this up as well. Previously the coin tray was a small concave bowl, this allowed you to drop your coins and they would funnel down. The new design is a convex dome so you have to put each quarter in one at a time.
- The design of the touch screen system that actually dispenses tickets has enough design flaws to fill a book (or a nice newspaper column) The placment of buttons, the order and flow of pages the use of color and text violates many established principals of design. Many of the stations now have a dedicated person to help people work through the poor UI. Compare this to the elegant design of the New York metro touch screen and it's night and day.
There are a lot of people in the Boston community who are skilled in Usability and Human Factors. I had even sent an email to the MBTA volunteering to help them re-design the system and my offer fell on deaf ears. If anyone from the MBTA is listening my offer still stands.
|
<urn:uuid:f2a9bd9f-4b72-4332-8e0e-3ab00ca2f92e>
|
CC-MAIN-2024-51
|
https://gregraiz.com/graiz/2007/08/28/charlie-cant-get-on-the-t/
|
2024-12-02T06:44:58Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00269.warc.gz
|
by
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.999569
|
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Chinese intelligence agents acquired National Security Agency hacking tools and repurposed them in 2016 to attack American allies and private companies in Europe and Asia, a leading cybersecurity firm has discovered. The episode is the latest evidence that the United States has lost control of key parts of its cybersecurity arsenal.
|
<urn:uuid:8b3698d7-4edf-442a-b217-17072f0ac889>
|
CC-MAIN-2024-51
|
https://hpshelton.com/post/185943383707/how-chinese-spies-got-the-nsas-hacking-tools
|
2024-12-02T06:53:12Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00269.warc.gz
|
by-sa
|
3.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.99945
|
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
]
}
|
Original Research: Cross-cultural Religious Studies
Marxist view on the religious ecological culture: A review of the western studies in religion and environment and their discourses
Submitted: 13 July 2023 | Published: 22 December 2023
About the author(s)
Chuanhui Zeng, Institute for Marxist Studies of Religion in New Era, Hangzhou City University, Hangzhou, China; and World Religions Institute, Chinese Academy of Social Sciences, Beijing, ChinaAbstract
The ecological crisis is related to religion that shapes the values, but its decisive factor is the inherent contradiction between the selfish logic of capital proliferation and the social public nature of the environment. The fundamental way to solve the ecological crisis is the domestic social reform, the coordination of international relations and the continuous development of science and technology. Guided by the social public agencies and scientific methods, religion can play a secondary constructive role in building the pro-ecological humanistic environment.
Contribution: It is as I have known perhaps the initial attempt to deal with the question between religion and conservation from the perspective of Marxism, as a response to the colleagues from the West.
Keywords
Sustainable Development Goal
Metrics
Total abstract views: 876Total article views: 969
Crossref Citations
1. Cross-cultural religious studies
Chen Yuehua, Ishraq Ali
HTS Teologiese Studies / Theological Studies vol: 80 issue: 3 year: 2024
doi: 10.4102/hts.v80i3.9772
|
<urn:uuid:2764794a-bcfe-4798-a5d2-f405ba36799a>
|
CC-MAIN-2024-51
|
https://hts.org.za/index.php/hts/article/view/9244/0
|
2024-12-02T06:41:07Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00269.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.978841
|
{
"abbr": [
"by",
"by"
],
"in_footer": [
true,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
]
}
|
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
International Journal of Electrical and Computer Engineering (IJECE)
p-ISSN 2088-8708, e-ISSN 2722-2578
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).
|
<urn:uuid:f2fca1bf-1d42-43a4-b1ed-a80e289a0674>
|
CC-MAIN-2024-51
|
https://ijece.iaescore.com/index.php/IJECE/article/view/8720/7381
|
2024-12-02T07:24:50Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00269.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.845616
|
{
"abbr": [
"by-sa",
"by-sa"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
]
}
|
Continuing the rumination over network-centricity, Micah Sifry has a piece in The Nation about how the grassroots-driven organization of Howard Dean’s campaign is rippling out into American political organizing.
This suggests that worrying about the lack of a strong center may not matter, as emergent self-activating and self-organizing people may find equally valid ways to knit themselves together. And the bottom-up Dean experience may have taught a whole cohort of activists that politics is more satisfying when you’re in the driver’s seat.
I wish “The Deaning of America” (as Sifry calls it) was as easy and as evident as he makes it sound. But still it’s progress. I think, just maybe, we’re going in the right direction. And I don’t often feel like that.
|
<urn:uuid:8eb64104-cd9e-4f71-a056-c713d8a3ec7c>
|
CC-MAIN-2024-51
|
https://lotusmedia.org/say-goodbye-control-freak-politics
|
2024-12-02T07:46:07Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00269.warc.gz
|
by-nd
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.998497
|
{
"abbr": [
"by-nd",
"by-nd"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
]
}
|
Reader Post: Spicy Food
This post was submitted by reader Josh Vogel.
Commentary #
Many of us enjoy spicy food. At the same time, many of us really don't like spicy food. According to an article in The New York Times, there may be more of a personality trait to this than one might have originally thought. Additionally, the fact that any human being likes spicy food might say a lot about the evolution of our species.
Researchers at the University of Pennsylvania say that our enjoyment (or non-enjoyment) of spicy food might have to with the unique human capability of getting pleasure out of painful experiences: "Humans and only humans get to enjoy events that are innately negative, that produce emotions or feelings that we are programmed to avoid when we come to realize that they are actually not threats," said Dr. Paul Rozin of University of Pennsylvania, who calls this trait "benign masochism". After all, we are the only animal that likes spicy food, as evidenced by the inclusion of Capsaicin (the chemical compound that makes chilies spicy) in many animal repellents.
What this might say about people who do and do not like spicy food is not covered by the article, but it doesn't take too much thinking to see if people who like spicy foods are also ones who have a high tolerance for pain.
Josh Vogel is a Candidate for the Master of Public Health at Boston University School of Public Health.
See Also #
-
A Perk of Our Evolution: Pleasure in Pain of Chilies at The New York Times for the article.
-
Food for Thought: Paul Rozin's Research and Teaching at Penn for a lengthy interview with Paul Rozin from 1997 where he discusses many of the aspects of his research.
Commentary text licensed under
Creative Commons Attribution 3.0 Unported License.
Additional editing by The Metaist.
|
<urn:uuid:dc12e600-53de-4227-a73f-2ef1c6c72046>
|
CC-MAIN-2024-51
|
https://metaist.com/blog/2010/10/reader-post-spicy-food.html
|
2024-12-02T08:25:43Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00269.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.998034
|
{
"abbr": [
"by",
"by"
],
"in_footer": [
true,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"3.0"
]
}
|
Racial Reconciliation in the Workplace: June 22 Newsletter
Newsletter / Produced by The High CallingRacial reconciliation takes work, and it’s work that needs doing. Amidst tragedies and protests in places like Ferguson, Boston, Charleston, and New York, Christians need to be salt and light, bearing the good news of 2 Corinthians 5:19: "In Christ God was reconciling the world to himself, not counting their trespasses against them, and entrusting the message of reconciliation to us. ”
And we can start where we spend most of our time: at our jobs.
In this newsletter we’ll hear how one man came to the conclusion that he needed to stick up for reconciliation. We'll be encouraged to seek the bridge-building love of God in all conflicts, even the most difficult ones. And we’ll be reminded that God sustains us at work when we suffer for his sake and for justice.
Let’s bring reconciliation to our troubled world. Read on.
From the Theology of Work Project
One of our editors failed to challenge injustice when he worked at a racist gas station. Ultimately, it influenced his desire that we'd all have a more Biblical view of God's hand on our workplaces. Read more
The Bridge-Building Love of God
From The High Calling
The reconciliation offered on the cross breaks barriers and creeps past borders.
From the Theology of Work Project
Work forces us to face difficult challenges alongside people who are different from us. Over time this gives us confidence in God’s redeeming presence. Read more
|
<urn:uuid:d5f25283-7125-4f8e-a50a-46b99a0eabf4>
|
CC-MAIN-2024-51
|
https://new.theologyofwork.org/the-high-calling/newsletter/racial-reconciliation-in-the-workplace-june-22-newsletter
|
2024-12-02T07:44:55Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00269.warc.gz
|
by
|
2.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.997261
|
{
"abbr": [
"by",
"by"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"2.0",
"4.0"
]
}
|
The RSC’s “As You Like It” at the Roundhouse gets better when the action hits Arden, but while the production gets better, the play rather fizzles out.
The opening of the production could not be in greater contrast to their Romeo and Juliet, in which the gloomy atmospheric delivery of the prologue was followed by highly energetic and slightly terrifying skirmishes choreographed to violent pyromanic perfection. Here the actors wander onto a brightly lit set which looks a little like a bookend. The apron is backed by what looks like a set of rather shabby cupboards. Rather than feeling like the RSC’s London home for the next years, it’s reminiscent of seeing a touring production in a community centre. The wrestling scene, also rather unforgivingly lit, is unconvincing too (despite some blood spatter from the collision of cranium and cupboard). The performances are good but there’s not a lot of atmosphere.
As soon as the action shifts to Arden we get to see what the designers are capable of, however. The lighting dips, the snow starts falling, trapdoors open in the stage and the naff cupboards swing open and to reveal a joists, ladders and straw bales like the inside of a barn. It’s a very effective set and there’s some nimble clambering by cast members as they take advantage of the scope it offers.
It’s years since I’ve seen As You Like It, and it’s not a play I know well, though I remember being very fond of it. Unfortunately, on getting reacquainted, I’d have to accept it’s not in the first division of Shakespeare comedies (in the pub, afterwards, we agree that after discounting the “problem plays” like The Winter’s Tale and The Tempest, that the first division comprised A Midsummer Night’s Dream, Much Ado About Nothing and Twelfth Night). The central premise (spoiler ahead, look away now) of girl dressing as boy (paper thin excuse already forgotten) then pretending to be herself while boy she fancies woos her is, in my humble opinion, terrific; unfortunately there’s not a lot more to the play than that. Rosalind is a great character. Her scheming, deception and machinations are wonderful. But although these are resolved, the absurd way in which other plot elements are effectively discarded give the end of the play an anticlimactic feel.
The premise by which she and her cousin Celia get exiled is dramatic and well handled, and despite the flaws of the court scenes, this gives the flight to Arden the urgency and jeopardy it needs. Once in Arden, the play becomes more fun, and the production picks ups. But while the danger is set aside, it’s unfinished business, and the plot feels like it needs a return to the court to see the new Duke overthrown, Oliver repent and the exiled Duke his rightful place. The adventure in the woods almost needs to be bookended, as in A Midsummer Night’s Dream. Instead, Shakespeare seems to have had another “exit pursued by a bear” moment, and written an fight between Orlando and a lion (hello? a lion?) to precipitate a change in Oliver, and deposes the new duke with a line about a religious conversion.
Jonjo O’Neill, who was an suitably mercurial Mercution in Romeo and Juliet is engaging and idealistic as Orlando. Katy Stephens is strong as Rosalind too. Mariah Gale, who was so impressive as Juliet (the best, according to Michael Billington, since Judy Dench) is Celia; she doesn’t have much to do but she makes the most of the part, commanding even when she’s just sitting and watching Orlando and Rosalind. But it’s in the comics that this production finds is strengths: Richard Katz is a superb touchstone, Forbes Masson a musical as well as melancholy Jacques, and the shepherds and shepherdesses entertainingly grotesque.
Finally, the music deserves a mention. Unlike Romeo and Juliet, the ditties here are part of the action which adds to the charm considerably. The compositions are rather beautiful, even when rendered for comedy value, and round out a very entertaining show.
|
<urn:uuid:1e64cf03-447c-45c6-b1a0-be09e9ddb8f3>
|
CC-MAIN-2024-51
|
http://littlestorping.co.uk/2011/01/21/as-you-like-it-review/
|
2024-12-03T10:51:00Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00169.warc.gz
|
by
|
2.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.998557
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"2.0"
]
}
|
Create an Account
First time here? The AEM Pilot is designed for use by state or district teams. If you are an assigned AEM Pilot Administrator for a state or district, creating an account will enable you to invite others from your state or district to join. If you are not an AEM Pilot Administrator but your state or district has set up an account, request an invitation from your assigned AEM Pilot Administrator. If you’d like an individual account to simply explore the AEM Pilot, we recommend using an email address that’s not connected to your state, school, or district. That way, your state, school, or district email address will be available should your state or district create an AEM Pilot account.
After creating your account with the AEM Pilot, a verification notice will be sent to the email address you provide.
|
<urn:uuid:b1c074c9-562b-4afa-b3e1-73d70008e5a7>
|
CC-MAIN-2024-51
|
https://aem-pilot.cast.org/register;jsessionid=5BA063FE690971CF7EC0330C5853DF99?0
|
2024-12-03T11:29:46Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00169.warc.gz
|
by-sa
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.996427
|
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
- Article InfoArticle Info
- CiteCite
- MetricsMetrics
- CommentComment
- RelatedRelated
ARPHA Proceedings 5: 863-877
doi:
10.3897/ap.5.e0863
Published:
10 Feb 2022
This article is part of:
Authors
Conflict of interest
The authors have declared that no competing interests exist.
This is an open access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Subscribe to email alerts for current Article's categories
|
<urn:uuid:1b48484e-2cdf-4669-9a51-943d581ac211>
|
CC-MAIN-2024-51
|
https://ap.pensoft.net/article/24334
|
2024-12-03T11:18:15Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00169.warc.gz
|
by
|
4.0
|
a_tag
| false
| false
| false
| false
|
Latn
|
eng
| 0.939395
|
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
menu
Dart
dart:js
JsArray
<
E
>
operator []= method
operator []=
brightness_4
description
operator []=
method
Null safety
void
operator []=
(
Object
index
,
E
value
)
override
Implementation
external void operator []=(Object index, E value);
Dart
dart:js
JsArray
<
E
>
operator []= method
JsArray class
Constructors
JsArray
from
Properties
first
hashCode
isEmpty
isNotEmpty
iterator
last
length
reversed
runtimeType
single
Methods
add
addAll
any
asMap
callMethod
cast
clear
contains
deleteProperty
elementAt
every
expand
fillRange
firstWhere
fold
followedBy
forEach
getRange
hasProperty
indexOf
indexWhere
insert
insertAll
instanceof
join
lastIndexOf
lastIndexWhere
lastWhere
map
noSuchMethod
reduce
remove
removeAt
removeLast
removeRange
removeWhere
replaceRange
retainWhere
setAll
setRange
shuffle
singleWhere
skip
skipWhile
sort
sublist
take
takeWhile
toList
toSet
toString
where
whereType
Operators
operator +
operator ==
operator []
operator []=
Cookies management controls
|
<urn:uuid:2ca2226c-1c89-4323-95bc-aecd6b42bd53>
|
CC-MAIN-2024-51
|
https://api.dart.dev/stable/2.19.5/dart-js/JsArray/operator_put.html
|
2024-12-03T12:39:53Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00169.warc.gz
|
by
|
4.0
|
a_tag
| false
| true
| false
| false
|
Latn
|
eng
| 0.876323
|
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
]
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.