pred_label
stringclasses
2 values
pred_label_prob
float64
0.5
1
wiki_prob
float64
0.25
1
text
stringlengths
112
978k
source
stringlengths
37
43
__label__wiki
0.820312
0.820312
Ben Horowitz '88 CC The “CEO Whisperer” and “Consigliere of Silicon Valley” Ben Horowitz is a cofounder and general partner of the leading venture capital firm Andreessen Horowitz and The New York Times bestselling author of The Hard Thing About Hard Things, which is now available in over 16 languages. Ben had made his way around Silicon Valley, making his mark at companies like Netscape and AOL. He started his own company Opsware, which was sold to Hewlett­Packard in 2007. While at HP, he worked as a senior vice president and general manager for Business Technology Optimization for Software. Ben has been called the “CEO Whisperer” and the “Consigliere of Silicon Valley.” Andreessen Horowitz has invested in and been major sources of support for companies like Facebook, Skype, Instagram, Oculus Rift, Airbnb, Groupon and many other major players in Silicon Valley. Ben is a leader in tech investment and the tech industry and has been featured in The Washington Post and on the cover of Fortune Magazine. Ben graduated from Columbia University in 1988 with a Bachelor’s in Computer Science. @bhorowitz RT @draparente: Last night I got to hear @DapperDanHarlem ‘s life story, from the black panthers, to credit card hustles, to creating the l… VIDEO: Ben Horowitz Brought His New Book to Columbia University I use this blog to share what I’ve learned, provide a sharp opinion or two, and generally contribute to the lively dialog around entrepreneurship, building and leading organizations, and venture capital.
cc/2019-30/en_head_0021.json.gz/line1731654
__label__wiki
0.737428
0.737428
Martin Varsavsky '83SIPA | '85BUS Argentine entrepreneur and philanthropist Martín Varsavsky, ’83SIPA, ’85BUS, was called “Young, Reach, and Restless” by Forbes Magazine for obvious reasons: in 1984, while still in school, Varsavsky founded one of the early developers of loft apartments in New York City, Urban Capital Corporation. But that’s not all – in 1986 he went on to found the Montreal-based Medicorp Sciences with Argentine scientist Claudio Cuello, and in 1991 Varsavsky founded telecommunications company Viatel in Colorado. After moving to Madrid in July of 1995, Varsavsky taught courses on entrepreneurship at IE Business School and founded a slew of companies: Jazztel, EINSTEINet, Ya.com, Eolia and FON. He has written articles for El Mundo, Newsweek, and The Huffington Post, and he holds awards from Columbia and The World Technology Network for his entrepreneurship. Martín received an MA in International Affairs (1983) and an MBA (1985) from Columbia University. @martinvars @aspiratas Compare this with the $50k per year at my alma mater Columbia University. Prelude Fertility, found by Martin Varsavsky '84SIPA, '85BUS, appoints Susan Hertzberg as CEO A serial entrepreneur's take on pretty much everything but the kitchen sink.
cc/2019-30/en_head_0021.json.gz/line1731655
__label__cc
0.512872
0.487128
Between a Rock and a Hard Place / Collegiality in challenging times featured topUCU strikecarouselone sidebarcomment University of Bristol's Vice-Chancellor Hugh Brady responds to the first two weeks of UCU strike action, giving his perspective on the situation. The past week has undoubtedly been one of the most difficult in my (almost) decade-and-a-half as a university vice-chancellor. Why? The unprecedented emotion, worry, anger and fractured collegiality in our University community. The reason? The national dispute between Universities UK (UUK, of which Bristol is a member) and the Universities and College Union (UCU, of which many of our staff are members) over the proposed reform of the USS pension scheme. I was honoured to accept the position of Vice-Chancellor at the University of Bristol in 2015 because of its reputation as one of the world’s leading centres of education, research and scholarship, and the wonderful spirit of collegiality and generosity that permeates every conversation, committee, corridor and coffee shop within our great institution. Indeed, as a relatively recent arrival to Bristol who has spent decades working in universities in Ireland, Canada and the USA, I can say with confidence that this level of collegiality throughout our community is rare. The issue of pensions is a very emotive one. We are all concerned about what will happen to us in older age. No one wants to be in a position where they fear they may struggle financially after decades of work. In academia, concerns over pensions are amplified. Most academics choose their careers because of their passion for teaching and research. In doing so, they very often decline better-paid options knowing this compromise is softened by the expectation of a good pension. Our professional staff also often choose to work in the sector because of their belief in the power of education. When it comes to pensions, universities must balance several factors. We fully understand the importance of a good pension to the recruitment, retention and morale of top-quality staff – both now and into the future. But we must reconcile our investment in pensions with many other needs such as investment in academic posts and the overall student experience. Our pension schemes need to be adequately funded so we can meet our obligations to both current and future staff. So, what has changed to persuade UK universities to take the difficult decision to support the reform of the USS scheme? This is well-trodden ground, but in brief: the most recent appraisal of the scheme’s health indicated a growing deficit that required a further increase in employer and employee contributions. This is, sadly, a familiar picture for many defined-benefit pension schemes nowadays and there’s a lot at stake here for the sector: if we ignore the warning signs, we may jeopardise the benefits that future generations receive. Last autumn the government’s Pensions Regulator expressed concern about how the USS scheme was being assessed. As a result, the USS Trustee took a more prudent approach, and the outcome of that updated valuation influenced the proposals for changing the scheme. Our other defined benefit pension scheme (UBPAS) has already gone through similar reforms. The valuation is where the basic disagreements lie: UCU questions the methodology used by USS to value the pension plan and assess the risk to the universities. They have presented expert opinion and analysis to support their contention, most recently at our meeting of the University Senate last Monday. They contend that the plan is healthy and that the changes are unnecessary or, at the very least, too severe. They argue that the reforms proposed by UUK would result in each member of staff losing hundreds of thousands of pounds over the lifetime of their pension. Against this background, I can fully understand why our colleagues are worried and angry, and why many students feel compelled to support them. I’m a clinician-scientist by training – a nephrologist with expertise in the causes and treatment of kidney disease, dialysis and transplantation. I’m familiar with complexity. So, when I say that pensions are a notoriously complex field, I don’t use the word lightly. But I struggle to understand how two sides, both equally passionate about higher education, can be so far apart in their valuations and interpretations. I know I’m not alone in this, nor in hoping that these differences can be reconciled as soon as possible. With other colleagues across the sector, I have publicly expressed my support for further negotiation and discussion to resolve these differences and I am pleased and relieved that both sides have agreed to go to arbitration in an effort to resolve the dispute. It will only be resolved if both sides enter the process in good faith and with full transparency regarding the modelling and valuation. Only then can all parties understand the risk and agree a long-term solution. I want to thank our students for their patience and understanding during this national dispute and to thank all staff for their continued professionalism and for all the hard work and dedication they give to our University community. During this challenging period, I encourage all our community to not lose sight of the collegiality that sets Bristol apart, and to continue to nurture it for future generations. Professor Hugh Brady Vice-Chancellor and President Featured image: University of Bristol Press Office Keep up to date with Epigram ... Facebook // Epigram // Twitter featuresone sidebarfeatured topcarouselEpigreen Week Bristol Green Society’s Brussels adventure one sidebarfeatured topcarouselEpigreen Weekletters Dear students who want to be greener
cc/2019-30/en_head_0021.json.gz/line1731657
__label__cc
0.710982
0.289018
Are we focusing too much on health? Consumers in Germany can feel that they are subject to information overload on the topic of health The topic of health remains at the forefront of discussion amongst stakeholders in Germany, such as the government, media, and brands. This is hardly surprising given that the diagnosis rates of health problems continue to rise in the country. The biggest challenge posed to the country is the ongoing obesity epidemic. FMCG Gurus research conducted in 2019 shows that currently, 32% of consumers in Germany are on a diet to lose weight. Despite this, obesity rates continue to rise. Interestingly, the proportion of consumers who say they are on a diet is marginally lower compared to 2017 (36%). This highlights the scale of the obesity problem in the country. When it comes to dieting and leading a healthier lifestyle, many challenges exist for consumers. For instance, consumers can feel that healthy food and drink is bland or boring, or they may feel that their lifestyles make it difficult to monitor nutritional intake. However, research shows that another challenge the country faces is that consumers can feel that they are subject to information overload when it comes to the topic of health. For instance, a total of 34% of consumers say that they feel they are “fed up” being told what they can and cannot eat by nutritional experts. Meanwhile, 30% of consumers say that they feel public health warnings around obesity are exaggerated. If consumers feel that they are being subject to information overload when it comes to the topic of health, then those that messages may have the opposite effect to that intended. That is, consumers may switch off from such information altogether. As such, it is crucial that any information around healthy living in Germany is communicated in a simple, subtle and transparent manner.
cc/2019-30/en_head_0021.json.gz/line1731659
__label__cc
0.511404
0.488596
Oct 13, 2016 2:07PM PT A Look at the Old Shoes That Went for More Than $4,200 in an Auction Vintage shoes auctioned at Hansons Auctioneers and Valuers Ltd. CREDIT: Courtesy of Hansons Auctioneers and Valuers. It’s no secret we all love shoes — but a recent auction shows just how much people love vintage shoes. A collection of more than 330 pairs of vintage shoes was recently auctioned at England’s Hansons Auctioneers and Valuers in Etwall, Derbyshire, fetching more than $4,290 in total. The archival men’s and women’s shoes were donated by a mystery seller in Mansfield. The collection included styles made exclusively for American stores, including lizard peep-toe shoes from the 1950s (others dated back to the 1930s). They were auctioned off in pairs of eight, and attracted interest from both private buyers and dealers. “I had never before seen such an extensive, eclectic collection,” said Notty Hornblower, the auction showroom’s fashion and textiles ambassador, to the Nottingham Post. “Some of the styles are now being reproduced, so it was a great opportunity to acquire real, original examples.” This isn’t the first time shoes have amassed pricey auction sales (sneakers, specifically, tend to perform well). Last April, a pair of Michael Jordan’s game-worn Nike Air Ship sneakers were auctioned for a cool $71,554. Prince’s Lovesexy Tour Boots Up For Auction In June Joan Rivers Costumes Set For Christie’s Auction Sneakers That Fetched Over $10K at Auction Michael Jordan Game-Worn Sneakers Up For Auction ‘Mad Men’ Shoes Up For Auction Online
cc/2019-30/en_head_0021.json.gz/line1731661
__label__wiki
0.777616
0.777616
All Movies TV Shows NETFLIX 21 Actor & Actress DVD / BLURAY Result of Three Peaks Hd Download Survival Island A millionaire and his wife are shipwrecked after a yachting accident with their former servant, Manuel. A group of American soldiers stationed in Iraq at the end of the Gulf War find a map they believe will take them to a huge cache of stolen Kuwaiti gold hidden near their base, and they embark on a secret mission that's destined to change everything. ¡Three Amigos! Three unemployed actors accept an invitation to a Mexican village to replay their bandit fighter roles, unaware that it is the real thing. Three Fugitives On his first day after being released from jail for 14 armed bank robberies, Lucas finds himself caught up in someone else's robbery. Perry has decided to hold up the local bank to raise money so that he can keep his daughter, Meg, and get her the treatment she needs. Dugan, a detective, assumes Lucas helped plan the robbery, and hence Lucas, Perry and Meg become three fugitives. In this episodic WW II drama, a Yugoslavian youth attempts to escape from German soldiers. In the first scene, he stands amongst a group of refugees waiting for a train. One man, with no identification papers is accused of a petty crime and the crowd insists that three soldiers arrest him. The youth tries to stop them all, but he fails and the man is executed. Soon afterward, his wife shows up and proves that he was indeed innocent. In the second episode, the youth participates in a resistance raid and ends up pursued into a swamp where he meets another fugitive. This man ends up sacrificing his life so that the youth can escape. The final story begins as the war ends. The youth has become an officer in the Yugoslav army and is being forced to deliver an order to execute all citizens who collaborated with the Germans. One of the traitors is a woman he cares for, but this doesn't stop him from obeying his commands. The hot-headed young D'Artagnan along with three former legendary but now down on their luck Musketeers must unite and defeat a beautiful double agent and her villainous employer from seizing the French throne and engulfing Europe in war. Three Ages The rituals of courtship, romantic rivalry and love play out three times as a man vies with a villain for the girl. In the Stone Age, the rivalry is set off by dinosaurs, a turtle used as a ouija board, and a round of golf with stones. In ancient Rome, the men display their brawn through a chariot race, using dogs instead of horses. In contemporary times, the man finds himself overcome by modernity, including a very fragile car. After seven months have passed without a culprit in her daughter's murder case, Mildred Hayes makes a bold move, painting three signs leading into her town with a controversial message directed at Bill Willoughby, the town's revered chief of police. When his second-in-command Officer Jason Dixon, an immature mother's boy with a penchant for violence, gets involved, the battle between Mildred and Ebbing's law enforcement is only exacerbated. The Three Caballeros For Donald's birthday he receives a box with three gifts inside. The gifts, a movie projector, a pop-up book, and a pinata, each take Donald on wild adventures through Mexico and South America. The young D'Artagnan arrives in Paris with dreams of becoming a king's musketeer. He meets and quarrels with three men, Athos, Porthos, and Aramis, each of whom challenges him to a duel. D'Artagnan finds out they are musketeers and is invited to join them in their efforts to oppose Cardinal Richelieu, who wishes to increase his already considerable power over the king. D'Artagnan must also juggle affairs with the charming Constance Bonancieux and the passionate Lady De Winter, a secret agent for the cardinal. D'Artagnan travels to Paris hoping to become a musketeer, one of the French king's elite bodyguards, only to discover that the corps has been disbanded by conniving Cardinal Richelieu, who secretly hopes to usurp the throne. Fortunately, Athos, Porthos and Aramis have refused to lay down their weapons and continue to protect their king. D'Artagnan joins with the rogues to expose Richelieu's plot against the crown. A married couple's life is turned upside down when the wife is accused of a murder. Lara Brennan is arrested for murdering her boss with whom she had an argument. It seems she was seen leaving the scene of the crime and her fingerprints were on the murder weapon. Her husband, John would spend the next few years trying to get her released, but there's no evidence that negates the evidence against her. And when the strain of being separated from her family, especially her son, gets to her, John decides to break her out. So he does a lot of research to find a way. Two college friends, traveling in Europe, find themselves rivals for the attentions of a mysterious woman. New York, 1980. Three complete strangers accidentally discover that they're identical triplets, separated at birth. The 19-year-olds' joyous reunion catapults them to international fame, but also unlocks an extraordinary and disturbing secret that goes beyond their own lives – and could transform our understanding of human nature forever. Three O'Clock High A high school nerd, Jerry Mitchell is assigned to write a piece for the school paper about new boy Buddy Revell, who is rumored to be a psychopathic nutcase. When Jerry accidentally touches Buddy, he says that they must fight in the parking lot at 3pm. Jerry will just about do anything to avoid the confrontation The two pigs building houses of hay and sticks scoff at their brother, building the brick house. But when the wolf comes around and blows their houses down (after trickery like dressing as a foundling sheep fails), they run to their brother's house. And throughout, they sing the classic song, "Who's Afraid of the Big Bad Wolf?". While trying to save their childhood orphanage, Moe, Larry and Curly inadvertently stumble into a murder plot and wind up starring in a reality TV show. Kill Me Three Times While on a seemingly routine job, a jaded hit man discovers that he's not the only one with his target in the crosshairs. C.R. MacNamara will do anything to get a promotion within the Coca-Cola company, including looking after boss W.P. Hazeltine's rebellious teenage daughter, Scarlett. When Scarlett visits Berlin, where C.R. is stationed, she reveals that she is married to a communist named Otto Piffl -- and C.R. recognizes that Otto's anti-establishment stance will clash with his boss's own political views, possibly jeopardizing his promotion. Barbie and the Three Musketeers Join Barbie™ as Corinne™, a young country girl headed to Paris to pursue her big dream – to become a female musketeer! Never could she imagine she would meet three other girls who secretly share the same dream! Using their special talents, the girls work together as a team to foil a plot and save the prince. It's all for one and one for all! queen at wembley 1986 movie المشخصاتي تو brain powerd hime free stream of family reunion netflix crash movie online stream my daugther boyfriend 9 scene chad alva index of my best friends wife 2015 angels on tap download native america dvd little big master free movie online 3 blow tale of arcadia free download thirisoolam songs download masstamilan © 2019 NETFLIX 21 - Free Movies & TV Shows Download, Reviews and Update News
cc/2019-30/en_head_0021.json.gz/line1731662
__label__wiki
0.89173
0.89173
From weddings to beer, the surprising impacts of the government shutdown Posted 3:10 PM, January 4, 2019, by CNN Wire WASHINGTON, DC - JANUARY 04: U.S. President Donald Trump speaks as he is joined by Vice President Mike Pence in the Rose Garden of the White House on January 4, 2019 in Washington, DC. Trump hosted both Democratic and Republican lawmakers at the White House for the second meeting in three days as the government shutdown heads into its third week. (Photo by Alex Wong/Getty Images)(Getty) The government shutdown is approaching the two-week mark with no end in sight. And now that the holidays are over, its effects are becoming more apparent — not just on federal workers’ salaries, but on everything from science to beer. Here are some surprising impacts of the government shutdown: Low-income moms and their kids may not get nutritional assistance Certain food programs run by the Department of Agriculture could be affected by the shutdown if it continues. Among those threatened is the Special Supplemental Nutrition Program for Women, Infants and Children (WIC), which provides nutritional assistance to more than 7 million low-income women and their children. The WIC is currently operating normally, said Rev. Douglas Greenaway, president and CEO of the National WIC Association (NWA), a non-profit education arm and advocacy voice for the program. But that could change if the shutdown keeps up. A prolonged shutdown could “lead to significant health consequences if babies and young children lose access to nutritious foods and vital breastfeeding support,” Greenaway’s statement said. “If the shutdown lasts for several weeks, families will be forced to make hard choices about how to feed their newborn babies.” Science experiments could be spoiled Many scientists have had to cease their work for federal research agencies, and now the results of delicate experiments hang in the balance. “Any shutdown of the federal government can disrupt or delay research projects, lead to uncertainty over new research, and reduce researcher access to agency data and infrastructure,” Rush Holt, the CEO of the American Association for the Advancement of Science, said in a statement. Holt pushed for lawmakers and the White House to come to an agreement and fund agencies like NASA, the National Science Foundation, the EPA, the National Oceanic and Atmospheric Association and the Department of Agriculture. Native tribes can’t get funding Native American tribes that rely on federal funding for different services, such as health clinics and food pantries, are out of luck, according to a report from The New York Times. About 1.9 million Native Americans and Alaska Natives receive funding from the Bureau of Indian Affairs, which is operated by the Department of the Interior, one of the agencies hit by the shutdown. For one tribe of Chippewa Indians in Michigan, the cost amounts to $100,000 each day the government is shut down, the Times reported. The tribe is spending its own money in the meantime. A spokesperson told CNN the shutdown prevents anyone from the bureau speaking on the matter. Cherokee Nation Principal Chief Bill John Baker told CNN in a statement Friday the Cherokee Nation was currently using federal funds it received just prior to the government shutdown began and had a plan to use tribal dollars if the shutdown continued. Certain federal programs were still working, he said. “We do have growing concerns, however, for these federally funded programs if Congress and the President do not reach an agreement soon,” Baker said, adding the government has a responsibility and obligation to the tribes. The backlog of immigration cases is getting bigger You might remember this shutdown started because President Donald Trump and lawmakers were unable to compromise on Trump’s push for a border wall. Now the shutdown is directly hampering his own immigration policies. More than 300 immigration judges have been furloughed, meaning many immigration courts have closed and the massive backlog of cases will continue. According to the Justice Department’s Executive Office for Immigration Review, cases involving already detained immigrants will proceed. But those of immigrants who aren’t detained will be “reset for a later date” after the shutdown ends. It could take weeks, or even years, before the rescheduled cases are heard in court, according to the head of the immigration judge’s union. Folks in Washington can’t get a marriage license The office responsible for issuing marriage licenses in Washington, DC, isclosed, complicating the plans of couples — such as Dan Pollock and Danielle Geanacopoulos — who are eager to tie the knot. Last Thursday, Pollock shared a picture of himself and his soon-to-be-wife grinning outside a Washington courthouse where they’d hoped to obtain a marriage license. “We didn’t even consider that the DC court was federally funded, so we only learned about it when we showed up at the courthouse,” Pollock told CNN. The couple — both of whom are former federal employees and understand the struggle — ended up going ahead with their ceremony. They’ll worry about the license later, Pollock said. “It’s just paperwork, after all,” Pollock added. “It can be signed later.” CNN affiliate WJLA reported Thursday that DC Mayor Muriel Bower plans to introduce emergency legislation to allow the issuing of marriage licenses during the shutdown. There won’t be any new beers Consider this your heads-up, beer enthusiasts. Among the federal agencies hit by the shutdown is the Alcohol and Tobacco Tax and Trade Bureau (TTB), which regulates the alcohol beverage industry. Breweries have to apply for a permit and receive approval from the TTB before they can begin operations. Those processes have been put on hold, explained Paul Gatza, Director of the Brewers Association, a non-profit trade association. “So it could delay some brewery openings once the shutdown is lifted.” Consumers could also feel the effects, Gatza said. Breweries must get new beers approved through the TTB before they can make them available to the public. “If the shutdown goes on for an extended time,” Gatza said, “beer drinkers won’t see much in the way of innovative new brands on the shelves where they buy beer.” Trash and human waste are piling up in national parks At least 70 national parks have closed across the country as a result of the shutdown. Some remain open, but they’re seriously understaffed, and now they’re dealing with heaps of trash and overflowing toilets. Joshua Tree National Park closed Wednesday over health and safety concerns stemming from the toilets. Yosemite National Park remains open, but also announced there would be limited acess to the park “due to continuing issues with human waste and resource damage.” Sequoia National Park and Kings Canyon National Park both followed suit later Wednesday. The panda cam is down That’s right. The Smithsonian National Zoo in Washington has shut down its panda cam, which lets folk keep an eye on the zoo’s three giant pandas — Tian Tian, Mei Xiang and Bei Bei — while they do … well, panda stuff. Researchers also use the cameras to collect behavioral data on the trio. The camera normally live-streams footage of the pandas around the clock, but it’s deemed nonessential in a government shutdown, so it’s been turned off, the zoo’s website says. And it’s not just the pandas. The zoo’s elephant and lion cameras are down. Topics: Donald Trump ‘Massive failure’ leaves Argentina, Paraguay and Uruguay with no power, utility says Farmers’ Market returns to East Hartford for 29th year Trained civilians could respond to low-level 911 calls in Denver with new pilot program Report: America just had its lowest number of births in 32 years Bernie Sanders to unveil plan to cancel all $1.6 trillion of student loan debt Justice Department to tell court it is looking at options to add citizenship question to census Trump Fed pick Stephen Moore called it a ‘travesty’ that women ‘feel free’ to play sports with men Pelosi: Trump’s comments prove he doesn’t ‘know right from wrong’ Judge reopens case of 11-year-old Houston girl facing deportation to El Salvador Pence: ‘Of course’ migrant children should have toothbrushes, blankets and medicine Why social media is going blue for Sudan Many breakfast cereals still contaminated by weed killer, environmental group says Social Security won’t be able to pay full benefits by 2035
cc/2019-30/en_head_0021.json.gz/line1731664
__label__wiki
0.76319
0.76319
Attorney General: Lord and Taylor Resolves Racial Profiling Allegations November 13, 2018 November 14, 2018 Framingham Source Editor Susan Petroni 417 Views 0 Comments Lord and Taylor, Massachusetts Attorney General Maura Healey, Natick Mall The following is a press release from the Massachusetts Attorney General’s Office: NATICK – Lord & Taylor will hire an expert consultant to review and improve its shoplifting prevention policies and procedures, train its staff, and pay $100,000 to resolve an investigation into racial discrimination, Attorney General Maura Healey announced today, November 13. The settlement agreement between Lord & Taylor LLC and the AG’s Office concludes an investigation into the company’s loss prevention practices and policies. Covering all four of Lord& Taylor’s Massachusetts stores – in Boston, Braintree, Burlington and Natick – the AG’s investigation arose out of concerns that the company’s efforts to prevent shoplifting perpetuated a climate of racial and ethnic bias resulting in, among other things, the disproportionate targeting of black and Hispanic customers for surveillance and apprehension. Lord & Taylor fully cooperated with the AG’s Civil Rights Division during its investigation and in agreeing to proactively address these issues. “Following our investigation, Lord & Taylor has agreed to take meaningful steps to improve its policies and procedures to prevent racial profiling of customers—we hope others will do the same,” said AG Healey. “Far too often, shoppers are unfairly viewed as suspicious or not belonging, simply because of their race or ethnicity. This takes a toll on individuals and broader communities, even when it is the result of unconscious bias, and it is our collective responsibility to address it.” “As a member of the AG’s racial justice advisory council, the NAACP Boston Branch is pleased with the work of the Civil Rights Division in developing and pursuing this investigation,” said Tanisha M. Sullivan, President NAACP Boston Branch. “We can never become numb to the reality and impact of racism. This investigation reminds us that racial discrimination is still a serious problem in our society and we need to remain vigilant in rooting it out.” “We applaud the leadership of Attorney General Maura Healey in tackling racial profiling in the retail industry,” said Ivan Espinoza-Madrigal, Executive Director of Lawyers for Civil Rights. “This settlement represents an important step in the right direction and demonstrates that retailers can meaningfully address racial discrimination and challenges in our society. Retailers must comply with the law and follow best practices to overcome unconscious biases that disproportionately harm people of color.” Under the terms of the settlement, Lord & Taylor will hire an outside consultant, who specializes in addressing unconscious or implicit bias in the retail industry, to conduct a thorough review of its existing shoplifting prevention policies and work with the company to make improvements, including a specific policy to prevent racial bias in the stores’ shoplifting prevention activities. Lord & Taylor also has agreed to provide annual unconscious or implicit bias training to all of its customer-facing employees in its Massachusetts stores and to enhance the training it provides to its Asset Protection employees. As a result of the settlement, Lord & Taylor also will work with the AG’s Office to develop and implement a Customer Bill of Rights that will provide resources and information for customers, including a phone number and email address for filing complaints. The Customer Bill of Rights will be posted in all of the company’s Massachusetts stores and on its website. In addition, the company will pay $100,000 to the Commonwealth to fund programs, activities, or other resources intended to combat racial discrimination and to promote racial equity and inclusion. The settlement resolves alleged violations of the Massachusetts Public Accommodations Law and Consumer Protection Act. The Public Accommodations Law makes it unlawful for any business that solicits or accepts the patronage of the general public to distinguish among customers on the basis of their race, color, national origin, ancestry, religion, sex, gender identity, sexual orientation, or disability. The law prohibits discrimination with respect to both admission into and treatment within places of public accommodation. The Consumer Protection Act prohibits unfair or deceptive conduct in trade or commerce. The settlement is part of an ongoing effort by the AG’s Office to address the problem of racial discrimination in places of public accommodation, including retail stores. The Civil Rights Division encourages consumers to report instances of discrimination by calling (617) 963-2917 or filing a Civil Rights E-Complaint at www.mass.gov/ago/civilrightscomplaint. This matter was handled by State Enforcement Counsel Genevieve Nadeau and Assistant Attorney General Sara Colb of AG Healey’s Civil Rights Division, with assistance from Ciara Tran and Marlee Greer, of the AG’s Civil Investigations Division. ← Comcast To Issue $700,000 in Refunds and Cancel Debts For 20,000+ Customers To Resolve Allegations of Deceptive Advertising PHOTO OF THE DAY: Housing Authority Names Conference Room For Phyllis May →
cc/2019-30/en_head_0021.json.gz/line1731666
__label__wiki
0.650987
0.650987
Our Counter Strike Source servers are the cheapest prices on the market, meaning that you can now play your favorite game for less. With server hosting you are able to jump in and out of your game with out the fear of your world not being online because your friend who is hosting it on their machine is not on. With 24/7 access and great customer support we will have playing in no time. Gamehosting.co Counter Strike: source servers gives gamers a choice! Need help to configure your Counter Strike: source server? Counter-Strike: Source is a multiplayer first-person shooter developed by Valve Corporation as a complete remake of the original Counter-Strike, replacing the aging GoldSrc engine with their more advanced Source Engine. As in the original, Counter-Strike: Source matches a team of Counter-Terrorist agents against a team of Terrorists in a series of rounds. Winning a round is accomplished either by eliminating the members of the opposing team or by completing a mission objective (such as detonating a bomb or rescuing hostages). Counter-Strike: Source retains the original title’s focus on team-based cooperative game play. Each map is played with the goal of completing the map’s specific objective such as defusing a bomb, rescuing hostages, or killing the entire opposing team. Ultimately, the aim is to win more rounds then your opposition. In most cases, players that have been killed do not respawn in the current round but must wait for the next depending on the difficulty of the server selected for play – a feature not typically found in other first-person-shooters. Additional realistic touches to the gameplay included decreased accuracy while shooting and moving at the same time, severe recoil while shooting continuously, and weapon damage severity based on the specific target locations hit with head shots being lethal and other body shots causing various levels of health damage. Counter-Strike: Source was originally released by Valve in 2004 as a beta to members of their Valve Cyber Café Program, owners of Counter-Strike: Condition Zero, and those who had received a Half-Life 2 voucher bundled with some ATI Radeon video cards. In 2006 Valve released an experimental update that included a controversial Dynamic Weapons Pricing system wherein item prices were determined based on the demand for them from the previous week. The community was hyper-critical of this update and the system was quickly removed a few short months later. Valve announced in early 2010 the release of games from its first-party library including games from the Counter-Strike series for the Mac OS X. Valve turned to Hidden Path Entertainment to provide support with updating Counter-Strike: Source. Later in 2010, Valve and Hidden Path released an update to Counter-Strike: Source that included new features and functionality including a then 144 new achievements, a new domination and revenge system, player stats, and an upgrade to the Source engine to name a few. Summer of 2010 would see release of the beta to the public along with the anticipated OS X version. Valve ported Counter-Strike: Source to Linux in early 2013. Counter-Strike: Source was met with critical acclaim and still maintains an 88 out of 100 score on game review aggregator website Metacritic.
cc/2019-30/en_head_0021.json.gz/line1731669
__label__cc
0.6854
0.3146
2016 Book Recommendations From The Coast Guard’s Top Admiral November 23, 2016 by Editorial Coast Guard Commandant Admiral Paul Zukunft The following article was written by Coast Guard Commandant Adm. Paul Zukunft and was originally published on USCG’s All Hands Blog. by Adm. Paul Zukunft, USCG – I am pleased to offer my 2016 reading list. Each new year is an opportunity to reflect on past accomplishments and lay out the trackline for future endeavors. As you consider your goals for 2016, expand your professional and leadership horizons with one or more of the following offerings: Into a Raging Sea by Bernie Webber and Michael Tougias: When I introduced my leadership philosophy a year ago, the first principle I shared was know your purpose. Into a Raging Sea is a personal memoir by a Coast Guardsmen who truly knew his purpose and then some. This Coast Guardsman is Bernard Webber, coxswain of motor lifeboat CG-36500, from Station Chatham, Massachusetts. His and his station’s story will be featured on the big screen when The Finest Hours premieres later this month. Until then, you can hear directly from Webber himself in raw, candid text about his role in the Pendleton rescue and what life was like at Station Chatham in the 1950s. Unbroken by Laura Hillenbrand: Another shining example of knowing your purpose is in story of Louie Zamperini in Laura Hillenbrand’s Unbroken. Zamperini and his Army Air Forces aircrew were on a search mission over the Pacific, one like many of our Coast Guard crews execute each and every day, when their plane went down in 1943. After close to fifty days lost at sea, he was captured and became a prisoner or war. Through Hillenbrand’s writing, we see Zamperini’s ability to channel his purpose, personal honor and integrity despite the degradations he suffered. Between the World and Me by Ta-Nehisi Coates: A more recent example of finding purpose and our ties to the communities in which we live and serve is through Ta-Nehisi Coates’ memoir Between the World and Me. Written as a letter to his son, Coates reflects on our Nation’s racial history and explores the lives of African Americans today. As I read, I kept going back to the themes of identity, trust and respect – this last one being an idea so foundational to the Coast Guard it is one of our Core Values. Altogether, Coates’ personal perspectives struck a chord and his testament was eye opening and thought provoking. The Truth About Employee Engagement by Patrick M. Lencioni: For those who have ever heard me speak at an all hands, you’ve likely heard me mention the book The Three Signs of a Miserable Job by Patrick Lencioni. Lencioni re-released the book this year under a new title that gets to the heart of why job misery is so detrimental to an organization – it damages employee engagement. After addressing the three signs – anonymity, irrelevance and immeasurement – Lencioni shares what happens when you engage your employees, including increased productivity, greater retention and a competitive advantage. All three are needed in today’s Coast Guard. As we hone in on our Duty to People, taking another look at engaging our workforce at all levels is a necessary refresh. Fire on the Water by Robert Haddick: A key element of knowing our purpose is understanding how we fit into the broader global context. Robert Haddick’s Fire on the Water offers an enlightening view on China’s resurgence and how the U.S. should adjust its diplomatic, military and economic policies to promote long-term stability. Just one example of the dynamic challenges that come with a rapidly changing and highly globalized world, U.S.-China relations underpin regional security and prosperity and will impact global order for decades to come. Understanding this strategic context is important for every Coast Guard member’s tool kit. Team of Teams by Gen. Stanley McChrystal: One of my leadership principles is trust and empower your people, and retired Gen. Stanley McChrystal certainly touches on the importance of trust to build teams organization-wide. He also explores relationships within these teams and networks using the line “it takes a network to defeat a network;” a phrase Coast Guard leaders have utilized to discuss our Western Hemisphere Strategy and our fight against Transnational Organized Crime networks. In the end, solutions and the way forward come from all levels of the organization and we must actively seek out these solutions and empower members of our team to come forward. Highliners by William B. McCloskey: We see teamwork and trust manifest daily at Coast Guard units around the world and that includes earning the trust of those we serve. This novel, sent to me by the crew aboard Coast Guard Cutter Boutwell, puts a spotlight on a unique community we serve to the Far North – Alaskan fisherman. Through the story of one young man, or “greenhorn,” we catch a glimpse of what life is like for commercial fishermen who brave Alaska’s unforgiving elements to make a living. Boutwell’s crew wrote it is, “a must-read for anyone involved in 17th Coast Guard District fisheries at any level, and a should-read for anyone who interacts with the fishing industry nationwide,” and I couldn’t agree more. What is Code?: While this isn’t necessarily a book, the Bloomberg Businessweek article, “What is Code?” comes close to it at 38,000 words! The article peaked my interest earlier this summer when I read the commentary from the magazine’s editor who noted the disconnect between those who have sharpened their technological skills but know increasingly less about what makes that technology work. As he wrote: “Software has been around since the 1940s. Which means that people have been faking their way through meetings about software, and the code that builds it, for generations. Now that software lives in our pockets, runs our cars and homes and dominates our waking lives, ignorance is no longer acceptable.” I am continuously humbled by the talents of our workforce, and that is especially true with our cyber professionals. World Order by Henry Kissinger: In framing my leadership principle of take decisive action, I wrote, “Situations evolve and we must adapt swiftly; as a leader your decision-making will be tested.” That is true for leaders at all levels of our Service and certainly true for our complex, interconnected world. Former National Security Advisor and Secretary of State Henry Kissinger provides a backdrop for taking decisive action in today’s world by writing about century-long trends in foreign policy. Looking at the world order over time is a useful thought exercise as we confront today’s global challenges. Ghost Fleet by P. W. Singer: Speaking of our increasingly complex world, members of my staff shared this book with me in the late summer while I was on my way to the North Pacific Coast Guard Forum to the very region in which this book takes place. While Ghost Fleet is a fictional account of a future world war, it weaves in real-life defense assets and current technology. While the Coast Guard’s primary operating area remains the Western Hemisphere, we are active in every region of the world. This fast-paced read presents a compelling twist on the geostrategic challenges our military faces today. Arctic Dreams by Barry Lopez – At a time where the need for icebreakers as a national asset has entered the dialogue, Alex recommended reading “Arctic Dreams,” by Barry Lopez. Alex wrote in his recommendation that Lopez presents an exhaustive survey of the Arctic regions comparing and contrasting the “impact of explorers, industrialists, indigenous peoples and governments throughout the North’s history. Fascinating.” I couldn’t agree more that our polar regions are indeed fascinating and this fascination only continues to increase demand across Coast Guard missions. Sheer Will: The Story of the Port of Houston and the Houston Ship Channel – Days after I engaged with industry stakeholders at both the ports of Houston and Los Angeles–Long Beach, Kathleen suggested reading, “Sheer Will: The Story of the Port of Houston and the Houston Ship Channel.” Greater complexity of port operations and advanced technologies are among some of the trends impacting the industry; understanding more about this evolution is critical in the Coast Guard’s continued commitment to ensuring safety, security and environmental stewardship of the Maritime Transportation System. Filed Under: Interesting, USCG Tagged With: books
cc/2019-30/en_head_0021.json.gz/line1731672
__label__wiki
0.879333
0.879333
By zepscoda, November 11, 2012 in Ramble On Some plates moving the last few weeks: M 6.8, 52km NNE of Shwebo, Myanmar Sunday, November 11, 2012 01:12:38 UTC M 4.3, 13km W of Whitesburg, Kentucky Saturday, November 10, 2012 17:08:14 UTC M 6.3, 186km SSW of Port Hardy, Canada Thursday, November 08, 2012 02:01:51 UTC M 7.4, 35km S of Champerico,Guatemala Wednesday, November 07, 2012 16:35:47 UTC M 3.9, 8km SW of Parkin,Arkansas Monday, October 29, 2012 12:39:24 UTC M 3.9, 21km NNE of Soledad, California Monday, October 29, 2012 04:25:16 UTC M 6.3, 177km SSW of Masset, Canada Sunday, October 28, 2012 18:54:16 UTC M 3.9, 7km NNW of San Fernando, California Sunday, October 28, 2012 15:24:23 UTC M 3.9, 9km SE of Valle Vista, California Sunday, October 28, 2012 07:47:03 UTC M 7.8, 137km S of Masset, Canada Sunday, October 28, 2012 03:04:09 UTC M 6.5, 12km WNW of Nandayure, Costa Rica Wednesday, October 24, 2012 00:45:32 UTC M 5.3, 26km ENE of King City, California Sunday, October 21, 2012 06:55:09 UTC M 4.0, 4km W of Hollis Center, Maine Tuesday, October 16, 2012 23:12:23 UTC It's kind of scary. We experienced the big 5.8 one last summer, and regular aftershocks for about a year after. Another one a couple of hours ago ..... M6.5 - 30km WSW of Champerico, Guatemala. CNN : A 6.5-magnitude earthquake struck this afternoon in the Pacific off the western coast of Guatemala, the U.S. Geological Survey reported. Striking about 17 miles (27 kilometers) below sea level, the tremor was centered about 19 miles west-southwest of Champerico, Guatemala, and 115 miles from the capital, Guatemala City. The quake was not far from southern Mexico, with the USGS reporting it was 27 miles south-southeast of the border community of Suchiate, Mexico. Earlier Sunday, the U.S. agency had said it was a 6.2-magnitude tremor, but later revised the report with the higher magnitude. It was followed by a number of significant aftershocks with magnitudes as strong as 5.0. The Pacific Tsunami Warning Center said that “based on all available data, a destructive Pacific-wide tsunami is not expected.” Sunday’s earthquake is the second major one in four days to strike the region. Last Wednesday morning, a powerful 7.4-magnitude tremor struck in the same area — about 22 miles from the coastal town of Champerico — at a depth of 15 miles. At least 52 people were killed in its aftermath, according to President Otto Perez Molina. Hundreds more were injured, while more than 2,200 homes were damaged. Another one today....... Magnitude 6.4 earthquake strikes Gulf of Alaska JUNEAU, Alaska - An earthquake with a preliminary magnitude of 6.4 struck in the Gulf of Alaska on Monday - the largest quake in that region in nearly 25 years. No tsunami warnings were issued, and there were no reports of damage despite tremors being felt across a large part of southern Alaska. A series of aftershocks also were recorded. Natasha Ruppert, a seismologist with the Alaska Earthquake Information Center, said this was the largest earthquake in the region since 1987 and 1988, when quakes of magnitude 7.8 and 7.7, respectively, struck. She said Monday's earthquake wasn't of the kind that would generate tsunami concerns, as it was relatively small and involved two sides of the fault moving horizontally - not vertical motion. Ruppert said the earthquake was not directly related to the magnitude 7.7 quake that struck off the west coast of Canada last month, though she said the two are in same plate boundary system. Monday's quake struck about 150 miles south of Cape Yakataga, and about 180 miles from Yakutat. People reported feeling it from as far away as Sitka, Juneau and Anchorage, which is nearly 340 miles away, according to the U.S. Geological Survey. Louise Petersen, who works at the Glass Door Bar in Yakutat, said items on the wall moved a little, but the quake didn't feel very strong. She said it wasn't unusual, "but we don't get them too often." We've been getting several small quakes in north Texas the past few weeks : Location:Enumclaw, WA--USA That's a biggun. luvlz2 Location:Glendale, Arizona The San Andreas fault acted up a week ago in Southern California. http://www.latimes.com/local/lanow/la-me-ln-earthquake-san-andreas-20161003-snap-story.html Edited October 4, 2016 by luvlz2 Ddladner 6 hours ago, luvlz2 said: San Andreas fault acting up again in Southern California Scary stuff. Hoping all of our California members stay safe. It's something you get used to living with out here. Like hurricanes in the south or tornadoes in the midwest. Can't say I have felt any recent seismic activity. Half the earthquakes they mention on the news I never feel. Kiwi_Zep_Fan87 The Big Kid I can think of so many earthquake incidents and after-shock incidents that have not only hit Central New Zealand (cities like Wellington) but also parts of North Island! Major Quake Hits Near Fukushima, Japan, Site of 2011 Tsunami, Meltdown. http://www.nbcnews.com/news/world/major-quake-hits-fukushima-japan-site-2011-tsunami-meltdown-n686926 Edited November 21, 2016 by luvlz2 7.0-magnitude earthquake has been reported off the west coast of Nicaragua in Central America, according to the U.S. Geological Survey. The earthquake comes less than an hour after the eye of Hurricane Otto slammed into the east coast of southern Nicara Edited November 24, 2016 by zepscoda Mexico Earthquake, Strongest in a Century, Kills Dozens. https://www.nytimes.com/2017/09/08/world/americas/mexico-earthquake.html?mcubz=0 greengrass It seems Mother Earth has turned terroristic on our asses . Definitely a different type of Jihad... im surprised they're not blaming the Bin Laden weather machine for all this chaos. http://www.grindtv.com/random/yellowstone-isnt-place-experiencing-large-earthquake-swarm/ The earthquake swarm in Yellowstone National Park has reached epic proportions as experts called it one of the longest and largest on record with 2,357 earthquakes recorded from June through August 30, Now, the neighboring state of Idaho is also shaking, with an earthquake swarm that began Saturday evening and continued into Tuesday. The Idaho State Journal reported 101 earthquakes in the southeastern part of the state, all near Soda Springs in Caribou County, which is less than 170 miles from Yellowstone. Its a prelude to the super eruption ^^ 9 minutes ago, greengrass said: Relatively speaking it's due. We are all screwed if she erupts Just now, zepscoda said: Totally , just like the Dino. When I went through the '89 Loma Prieta quake it was the first time I saw the street do a wave. Wow...another one.... MEXICO CITY (AP) — A magnitude 7.1 earthquake rocked central Mexico on Tuesday, killing at least two people, collapsing buildings and causing widespread panic less than two weeks after another quake left 90 dead in the country's south. https://www.yahoo.com/news/major-earthquake-shakes-mexico-city-182057047.html Thoughts and prayers for Mexico city. Apparently it happened on the 32nd anniversary of the deadliest earthquake in Mexico's history, which killed 5000 people in 1985. https://www.nbcnews.com/news/mexico/mexico-earthquake-25-killed-school-11-rescued-rubble-n802901 I'm in CT and have experienced a few tremors over the years surprisingly. The one that hit the DC area about 10 years ago and did extensive damage to the Washington Monument and one back in the 80's which woke me up overnight. No damage in our area but enough to feel the shaking. There are plenty of fault lines outside of the western USA. One of the most temperamental may me the San Madras Fault in the Central USA in the St. Louis and Memphis regions. I hope they don't get a big one as it would be a loss of the some of the country's best BBQ cuisine! We can't lose Graceland or Sun Studios either as I've visited both twice! Mexico Earthquake Near Oaxaca Spreads Alarm, Sends People Panicking Into Streets MEXICO CITY - A earthquake with a 6.2 magnitude shook southern Mexico on Saturday and was felt in the capital, where seismic alarms sounded, residents ran into the streets and rescuers briefly stopped combing the rubble left by a bigger tremor earlier this week. The United States Geological Survey said the new quake was relatively shallow and hit near Juchitan, which is a tropical region of Oaxaca state hard hit by another major earthquake on Sept 7. Already shaken by the two latest earthquakes that have killed at least 380 people in Mexico this month, thousands of people ran out onto the streets, again in Oaxaca and Mexico City, some in pajamas when the new tremor shortly before 8 a.m. local time (9 a.m. ET). "I heard the alarm and ran downstairs with my family," said Sergio Cedillo, 49, who was watching rescuers' efforts to find survivors from Tuesday's quake when the alarm sounded. No new damage was immediately reported, but rescue efforts were suspended in areas affected by Tuesday's quake to allow authorities to see if the new tremors would put workers at risk, Luis Felipe Puente, the head of Mexico's civil protection agency said. https://www.nbcnews.com/news/world/mexico-earthquake-near-oaxaca-spreads-alarm-sends-people-panicking-streets-n804121 Edited September 24, 2017 by luvlz2
cc/2019-30/en_head_0021.json.gz/line1731674
__label__wiki
0.887945
0.887945
Alabama re-ups NIC for portal operations By Ethan Butterfield Alabama has awarded a two-year contract to NIC Inc. to continue to operate the state's Web portal for more than 50 online services. NIC of Olathe, Kan., won the deal, which included renewal options through 2010. The contract is worth about $2 million annually, according to an NIC spokesman. NIC has run www.alabama.gov for the state since 2002, when it was first hired. The company's three-year contract ended in 2005, after which the state requested proposals for a new contract. Alabama uses a self-funded solution to provide its e-government services. During the last three years, NIC has worked with more than 25 state agencies to develop more than 100 interactive services at no upfront cost. The state's portal hosted nearly 3 million visitors in 2005, up from about 1.5 million in 2004. The portal offers more than 50 online services, including a variety of business tax filings, trucking permits, personalized vehicle tag reservations, hunting and fishing licenses and a suite of professional license renewals. Alabama Interactive Inc., a Montgomery-based wholly owned subsidiary of NIC, markets, operates and maintains the site. Ethan Butterfield is a staff writer for Government Computer News' sister publication, Washington Technology. Air Force turns to Raytheon for U-2 systems support Army enlists DRS Technologies for battlefield computer work GSA to issue draft requests for Alliant
cc/2019-30/en_head_0021.json.gz/line1731675
__label__cc
0.53103
0.46897
Home › Newsroom › Digital Bootcamp in Business to Make Graduates Work-Ready Digital Bootcamp in Business to Make Graduates Work-Ready We are pleased to announce our new Digital Bootcamp - a programme operated in conjunction with the Institute of Coding that aims to improve the digital and employability skills of graduates. A pioneering bootcamp is set to ensure graduates hit the ground running when they move from university life into the workplace. Operated in conjunction with the Institute of Coding (IOC), the University of Sunderland is preparing to pilot a scheme that aims to bridge the gap between study and employment for Computer Science graduates. From next month, up to 10 graduates will take part in the project which aims to provide industry-led ‘top-up’ skills linked to opportunities with North East companies. If successful, the scheme – dubbed a Digital Bootcamp – could be spread out across the country in a bid to fast-track graduates into positions with SMEs and global giant tech firms. Ten companies based in the North East have already signed up to the scheme in a bid to support the graduates through the bootcamp. The IOC was created to bring together businesses and educators in helping develop the level 6 and 7 digital and employability skills of graduates and the digital workforce. Steve Blanks, who represents the IOC at the University of Sunderland, is overseeing the bootcamp. He said: “Essentially, we are going to take some of our Computer Science graduates and put them through a number of bootcamps, focusing on their soft and technical skills, their presentation techniques, making sure they are interview-ready and giving them the mentoring and support they need to get the job they want. “Specialist coaches will be brought in to help, and we’ll be using cutting edge training techniques, like putting the graduates into a ‘simulation agency’ for the day and seeing how they perform.” The 10 companies who have signed up have expressed willingness to interview the participating graduates for possible roles. Steve said: “This may be a pilot, but businesses are looking at this programme and they know that those taking part will be able to hit the ground running.” The bootcamp is being supported by Digital Union, the largest network of digital, creative and technology businesses in the North East. Digital Union helped shape the format of the bootcamps by reaching out to its members to identify the core skills they look for when taking on graduate or junior developers. In addition, a number of members have committed to interviewing the candidates following the course. Jim Mawdsley, CEO at business support agency Generator, which runs Digital Union, said: “This is a fantastic example of education and industry working together to address the real-life needs of digital and tech companies that require work-ready graduates. “We frequently hear from our members that while graduate developers often have the technical coding skills required, they lack other essential skills such as commercial awareness, communication and presentation training or working as part of a team. “This is an exciting and much-needed pilot that has the potential to help reduce the skills gap in the region by getting the right people, with the right skills, in the right jobs.” The IOC aims to bring together universities, large corporates, small and medium sized enterprises, established industry groups, experts in the delivery of distance and non-traditional learning and professional bodies, to develop and deliver innovative, industry-focused education across England. It was 12 months ago that the Government announced the £20million IOC, a consortium of universities – including Sunderland, Newcastle and Northumbria – businesses and industry experts, set up to tackle the UK’s digital skills gap. computer science, digital bootcamp, Digital Union, employers, Graduates, students, sunderland uni, sunderland university TIPPER OF THE WEEK: JAKE HAWKES
cc/2019-30/en_head_0021.json.gz/line1731676
__label__cc
0.636547
0.363453
Mental health central to development, say experts By Muyiwa Adeyemi (Head, South West Bureau) 22 February 2018 | 3:35 am Providing succour for victims of Ijegun pipeline explosion 1 day ago Health For Nigeria to achieve Sustainable Development Goals (SDGs), mental health should be given priority by the leaders. This was the position of many university lecturers who spoke at the 18th edition of the late Dr. Victor Awosika Memorial Symposium organized by the University of Ibadan Medical Students’ Association, Ibadan. At the event titled: “For the Sake of my Sanity,” the Head of Department of Psychiatry, College of Medicine, University of Ibadan, Prof. Olayinka Omigbodun, stressed the need for Nigeria’s leaders to enjoy mental health, which he said was central to development. The consultant in child and adolescents psychiatry maintained that “there is no health without mental health” which she defined as optimal psychological functioning. According to her, many of the SDGs are directly related to mental health. “Mental health is central to development. Our leaders must enjoy good mental health, so that they can think in a way that will bring in development.” Prof. Oyewusi Gureje, who noted that mental health promotes productivity, social cohesion as well as security, said people with mental disorder were less likely to be productive. According to him, the most common problems among students are anxiety and disorder which prevent them from finishing well. Mental healthSDGsSustainable Development Goals
cc/2019-30/en_head_0021.json.gz/line1731685
__label__cc
0.660265
0.339735
The Hamilton Farmers’ Market is one of Hamilton’s oldest and most cherished traditions. Take a trip down memory lane and discover how the Market came to be. 1837: Opening of The Market Andrew and Mary Miller transferred a small piece of land to the President and Board of Police of the Town of Hamilton. This land was to be used for a Market. 1875: The First Photo of Market Square The first photograph of Market Square looking northwest along York Street. The picture was taken from the bell tower atop the second Market House and City Hall, which replaced the original 1839 building. 1883: The Market & Old City Hall The Market place and old City Hall on James Street North. The main floor of the building was the Market Hall. City Council met upstairs. The sheds housed stalls for butchers, dairy and poultry farmers. Fruit and vegetable growers operated from their wagons. 1895: New City Hall Opens The new City Hall which opened in 1890 with a year-round open-air Market with farmers rigs’ filling the Market Square. 1893: New Market Hall Built The Market Hall, built in 1885 was an astonishing specimen of architecture. Under the spires and copper-topped dome, meat and eggs, butter and cheese, were on sale all year round. New steel shelters line one side of the open space and the Market place is still full of farmers’ rigs. 1920: The Open-Air Market When fire consumed the Market Hall at the end of 1917, makeshift shelters were erected, and the open-air market remained busy. There are still plenty of horse-drawn rigs among the motorized trucks. Looking north (left to right) the Waldorf Hotel, the Savoy Theatre and Hilda’s Cigar Factory. The open-air Market was considered the largest open-air Market in Canada for the first half of the 20th century. 1929: Permanent Shelters Permanent shelters were built five years after the fire in 1922. The new Eaton’s store towers over the small Butter Hall. Streetcar tracks run along York Street and the horses have gone. 1959: Stall Removals The conflict between cars and Market came to a head in the 1950’s. Three days a week, the Market was a bottleneck in the city’s one-way street system. Bit by bit the street stalls around the Market were removed. City Council voted in 1958, after eight years of debate, to clear the Market place and build a parking garage at York and MacNab. The decision included a promise to preserve the historical nature, essential characteristics and atmosphere of an open-air market. 1961: The Last Stands The stalls lining York & MacNab parking garage were the last stand of the open-air Market. 1980: Urban Renewal At the end of the 1960’s, work began on an ambitious urban renewal plan, starting with the demolition of the Victorian city centre shopping area around the Market place. The result is the mini-city block bounded by King, Bay, York & James with offices, shops, library, cinemas, hotel and arena – all enclosed in a climate-controlled atmosphere. In the fall of 1980, the Market moved into its new current location sharing a facility with the Hamilton Public Library. 2011: Market Reno Major renovation in Market including plumbing for all stalls and the installation and restoration of the Birk’s Clock. 2015: Board of Directors Creation of a community and vendor-based Board of Directors to govern the Market including representation from City of Hamilton Council and Public Health. 2017: The Market Celebrates 180 Years The Market heads into its 180th year in 2017. With its recent transformation on the exterior walkway on York Blvd & MacNab displaying public artwork exhibit “Raising the Barn.” The Market has become a trendy destination for tourists & shoppers from the Hamilton core.
cc/2019-30/en_head_0021.json.gz/line1731687
__label__wiki
0.619788
0.619788
Michelle’s life began as an overwhelming surprise, being one of two in an unexpected twin birth to a single mom and a father struggling with addiction. Her first 10 years were marred by abuse and chaos. As a child Michelle floundered in school with undiagnosed learning disabilities. Without adequate interventions, those inadequacies and deficits, eventually morph into behaviors, attaching another negative label on Michelle’s already long lists of “why I am not good enough” Michelle finds herself on the fast track to self-destruction, becoming a pregnant, emancipated minor by 16. Michelle’s quickly realized that her happy ever after did not unfold as she had envisioned. At age 17, Michelle’s son David was born 3 months premature. As a result of David’s prematurity, David has been diagnosed with Epilepsy, Cerebral Palsy, Broncho-Pulmonary Dysplasia, Hydrocephalus, and visual and hearing impairments. To date David has smiled his way through 31 brain surgeries Education became a life line. After working up the courage to divorce her incarcerated husband, Michelle was inspired to attempt her first degree. In 2008, Michelle applied for, and received, a scholarship from Helping Hands for Single Moms. Though the monthly unrestricted scholarship check for $270 was helpful, Michelle was most impacted by the encouragement and support she received from their other services such as: meeting other moms at the monthly Single Mom College Community meetings (some lifelong friendships built); fun family outings; and the inspirational Holiday Happiness event. With inspiration from David’s strength, courage and love; the support of Helping Hands for Single Moms; and a lot of hard work and perseverance, Michelle completed two degrees culminating in an M.A. in Non-profit Leadership in 2010. Michelle is a first generation graduate and the only one of 9 siblings to obtain a college degree. Obtaining a higher education provided Michelle the opportunity to achieve excellence, breaking cycles, and offering a new hope, for those who come behind her. For the last 6 years Michelle has been gainfully employed as a Special Educator in a title 1 school. In addition to her full time job, Michelle is a motivational speaker and is working on completing her first book. Michelle says she has been able to find strength and healing by giving back to her community.
cc/2019-30/en_head_0021.json.gz/line1731697
__label__cc
0.731895
0.268105
Author: Henry Neufeld Posted on March 24, 2019 March 24, 2019 by Henry Neufeld (This is a work of fiction. Any resemblance between any person or place and the real world is strictly accidental. Copyright © 2019, Henry E. Neufeld.) Fifteen years and $250,000,000 later, Steven (never Steve) Porter got a sign. There was a great wind It was a stormy day, and as he was going to work, there was a gust of wind down the street, between the rows of tall buildings on either side. Debris flew wildly. People driving in rush hour traffic thought their cars might actually be moved. An old brick wall in front of a church collapsed, and the sign fell, concealing part of the writing. Steven looked around after the gust of wind and saw the sign: It said: “What Are You Doing HERE?” It was partially hidden behind the pile of bricks resulting from the wind. The second line had read “Rev. Steven Branson,” but the “Rev.” had fallen off, and the “Branson” was blocked by the bricks. For a minute, Steven found himself wondering if God might be behind the unusual gust of wind, but that thought was 15 years out of date in his thinking. “Fighting this stinking traffic,” he muttered. “That’s what I’m doing here. Like everyone else.” Meteorologists concluded that a very unusual combination of air pressure, movement, and heat had produced a freak wind. But only after they ran the circumstances through a super-computer a few times and tweaked the parameters. And after the wind an earthquake The earthquake as much more normal for this beautiful town in southern California. Steven was standing by the table on which he had just signed documents that would make him a few million more dollars when the building started to shake. He was on just the 12th floor of a much taller building, but still there was no escape. It was only minutes later, however, that the building’s safety manager called for an evacuation. Steven was able to watch the collapse from several blocks away. Another supercomputer worked out a scenario which would allow the earthquake resistant building to collapse in the way it did, while other damage in the city was quite trivial. The lawyers didn’t accept the word of the supercomputer, and spent years in court making careers out of it. And after the wind a fire He’d lost his car in the collapse, but eventually he was able to leave the area of the collapse and get a ride home. Oddly, despite the collapse of one large building, the earthquake damage had been rather mild elsewhere in the city. The cab drove along that same street with the row of buildings on either side. Steven thought he smelled smoke. Before he managed to frame a question for the cab driver, the inside of the cab was filling with smoke. He opened the door and jumped out, then stood beside the driver as the care went up in flames. The car fire didn’t require a supercomputer to explain. There was a wiring fault. It was just a natural event. Steven turned and found himself facing the sign again. It was the same one he’d seen that morning. He looked at the church, and saw in his mind another church yard, as a younger Steven approached the building. The church council was meeting, and the subject would be whether they wanted to keep their young pastor, and whether he should be allowed to carry out some of his plans. That younger Steven was to appear to explain himself. As he stood in front of the church, he decided he just didn’t want to put up with it any more. Why should he fight with the old fogies who ran the church? He’d felt the tug of his calling, but he decided he turned away. He called the chairman of the council on the phone and resigned. He was very good at business. Very good. He looked at the sign. “What am I doing here?” he asked. (With apologies to 1 Kings 19:8-18. Featured Image Credit: background from Adobe Stock, not public domain. Combination is my own.) Posted on March 8, 2019 March 8, 2019 by Henry Neufeld “I’m wondering if we’re going to do anything about International Women’s Day in our church,” said Dr. Maggie Williams. This is a work of fiction. Any resemblance of anything in the story to anything in real life is purely accidental. Copyright © 2019, Henry E. Neufeld “Of course,” said Pastor Bill Allen. “I’m planning a sermon about the wonderful ladies in my life this Sunday.” His smile was beatific, expressing his confidence in “having this one covered.” Maggie imagined he practiced that smile in the mirror. “But …” Maggie started to respond. Bill knew when to keep control of a conversation, and he figured this was such a time. “I’ll begin,” he interrupted, “with my sainted mother, who gave her life so that I could be in ministry. I wouldn’t be where I am without her.” “But,” Maggie began again, and then plowed forward, using her experience as an Emergency Room physician in keeping control of the conversation in turn. “Your mother never worked a day outside of her home.” “What’s wrong with that?” asked Pastor Bill. Maggie suspected the expression of shocked disappointment, about a four on a five point scale, was also the result of practice. Maggie got up to leave. As she reached the door, she said, “I imagine that to you Internation Women’s day is a day for men to talk about the women in their lives. She didn’t see the entirely genuine look of surprise, consideration, and then visceral rejection she left behind. (Featured image credit: Pixabay.) Posted on January 1, 2019 January 1, 2019 by Henry Neufeld When humanity finally figured out a way to reach the stars, and found intelligent life there, there was an inevitable result. Missionaries. Some of the missionaries were sensitive an helpful, in their own way. Some, not so much. For Delbert, the landing on the newly discovered planet was inevitable. There weren’t that many, but even so the difficulties of the work and the expense of travel meant that there were two few missionaries. As a committed Christian, it was his duty to preach the gospel to these creatures who had never heard it. In Delbert’s mind, they would doubtless be eternally lost should he fail in this mission. After all, would God have opened up the opportunity if the message was not essential? He absorbed only a fraction of the required briefings from the scientific mission. Things like “recent catastrophic extinction event” and “not socially primitive despite appearances” didn’t overcome the general sense of primitive natives needing the benefits of both civilization and and dispensation of the truth. So it was surprising and frustrating when the natives responded to Delbert’s preaching not with opposition nor with acceptance, but rather with a sort of puzzled surprise. “Of course,” said the native chief, whose name Delbert could not pronounce, and whose body form seemed entirely wrong. No amount of invitation, however, nor singing of hymns, which interested the natives in some unknown fashion, would bring them to actually accept the message he was preaching. Delbert was unsure how the computer translator rendered all of that in any case. He assumed it was getting his preaching right. He had expected either hostility or eager acceptance. He had come across the light years by means these natives couldn’t possibly understand to bring the message of the cross, one of hope for them as well as for natives of earth, no matter how far away. He had distantly admitted to himself the possibility that the natives would be apathetic, refusing to acknowledge their need of a savior. But they remained friendly, listened to his preaching, and then responded by saying things like, “Yes, it would have to be that way.” It took weeks for Delbert to become so frustrated that he decided to ask the chief of the local community what the issue was. The result only increased Delbert’s surprise. “The best thing would be for you to attend one of our worship services,” said the chief. It took a full minute for Delbert to recover. “You have worship services?” “Of course,” said the chief. “Did you imagine we wouldn’t?” Delbert chose not to respond to that as he didn’t know what to say that would meet both the needs of his mission and minimal courtesy. “I would be delighted to attend,” he said, not entirely truthfully. “Are there any requirements? Things I should avoid doing?” “Just come and hear,” said the chief. Delbert imagined he was hearing humor, but he thought he remembered the briefers telling him the natives didn’t do human-style humor. He almost wished he had listened more closely. But then he thought of how this would help him understand how to reach these people with the gospel message. It turned out that the service was held in one of the natives’ underground meeting halls. The room might have been beautiful, if it was not so confusing to human eyes. “Avert your eyes from the walls and ceiling,” said the chief. “Oh, is it not allowed to view them?” asked Delbert. “It’s allowed, but it is not good for the sanity of your people,” said the chief. “Averting your eyes will keep you from trying to find a pattern where none exists that your mind can process.” Delbert was not sure when the meeting began, or even if had not been in progress when he entered. There was a confusing background sound that seemed to hover at the edge of some sort of order, but always to fail to cross that threshold. Delbert had to instruct his translation device to quit attempting a translation, as it kept popping up random words that meant nothing at all. Or perhaps they did. Delbert was disturbed by the sense that he almost understood something. Then a single voice took over. The translator still struggled, but it seemed to get the drift, while individual words were more difficult. I will narrate separately today to underline this tale for our guest. In recent-ancient times the creation trembled-groaned and was disturbed. The world itself was in agony. The forces of chaos throughout this area gained the ascendance. It was the task-duty-mission of the people to bring the blessing of constancy-spirit-salvation to the mechanics of this system-locale-epicenter-of-presence. The task-duty-mission proved too great for the people and the forces of chaos continued to build against the epicenter-of-presence. There was a final stroke of the forces of chaos that came to destroy the people and the epicenter-of-presence. There was a considerable period of time filled with conflict, and Delbert found himself weeping. Somehow the sorrow communicated in a way that much else had done. Awe-amazement-wonder. The epicenter-of-presence, the being of constancy-spirit-salvation would remain with the people. Great destruction still to come. Great sorrow. Much death. But no aloneness. Then the rejoicing was almost more painful than the sorrow, the destruction, and the aloneness. Delbert was uncertain how long a time had passed. As the chief started to leave, he stumbled along, guided by the alien form. “How else could it be?” asked the chief when they reached the surface. “The very being that fills the epicenter-of-presence comes to be with the people in their time of travel. We were so joyful to realize you understood this as well, but feared the consequences to you of joining in our worship. It could have destroyed you. Delbert was not entirely certain it hadn’t. (Featured Image Credit: Openclipart.org composite.) Posted on November 21, 2018 November 21, 2018 by Henry Neufeld In everything, give thanks. At every time, even when it’s time to do something unpleasant, In every place, even where you don’t want to go, In every way, even sometimes in ways you find strange, For every one, even the people you really don’t like, For every privilege, even those you’d rather not acknowledge, For every trial, even when they seem overwhelming, For every blessing, even the ones so common you don’t notice, (A free meditation on 1 Thessalonians 5:18a.) Posted on November 17, 2018 by Henry Neufeld … says Jacob. … asks Israel. My Lord doesn’t even notice As justice slinks away. Don’t you know? Haven’t you heard? Eternal God, Creator of the Universe Doesn’t tire Doesn’t wear out. Just try to find something God doesn’t understand! Giving strength to the weary Great power to the powerless Even the young tire out, Young men stumble and fall. Those who depend on God Renew their strength. Rise like eagles in flight. Run without getting tired. Walk without wearing out. So why do you ask? We are weary. We can’t fly. We do wear out. We can’t see that God sees. How long, Eternal God? Hear our prayer for strength! (Adapted from Isaiah 40:27-31. Image credit: Openclipart.org, imposed on one of my own photographs.) Link: About Those Small Town Values Having imbibed a fair amount of pro-small-town prejudice in the form of Hallmark Christmas movies (which I actually find relaxing in spite of this), I thought I’d retaliate with a link to my short story About Those Small Town Values, first posted in 2010. In One Sentence: The Day after the Election Posted on November 1, 2018 March 8, 2019 by Henry Neufeld The day after the election, 99,643 supporters of That Other Guy who didn’t have time to make it to the polls breathed a sigh of relief and said to themselves, “It’s OK since my one vote wouldn’t have mattered anyhow!” Posted on August 19, 2018 August 19, 2018 by Henry Neufeld Tail and claw clashing Growling, hissing, angry sound Humans reflected. In One Sentence: The Glories of Ancient Times Posted on August 8, 2018 by Henry Neufeld After a lifetime following cryptic clues, digging in difficult locations, and making the most careful of measurements, the archaeologist stood in an empty space, clearly untouched for eons, showing no evidence of use, and read the inscription: Here lie all the treasures plundered from distant lands in our glorious past. That Gives Me a Deep Feeling of Satisfaction Posted on July 16, 2018 July 16, 2018 by Henry Neufeld Bright lights, cloudy vision, a humming sound, then a beep or so. He couldn’t remember where he was, who he was, anything that had happened. Was there something wrong? He wasn’t sure how things should actually be. He wasn’t sure how much time had passed, or since when one might measure it. “Where am I?” he asked. “In a hospital room,” a deep and measured voice responded. He noticed then that things were a bit clearer, and his surroundings did, indeed, look like a hospital room. He felt a bit disoriented, trying to place “hospital room” into some sort of context. It might have been “universe” for all he could remember. “Who am I?” he asked. He wondered if someone would tell him, or if perhaps he would be asked to remember over time. He wondered why he wondered that. This is a work of fiction. All places, persons, events, and devices are products of my imagination, as should be obvious. Copyright © 2018, Henry E. Neufeld. Featured image credit: Openclipart.org. “You are George Augustus Flinders,” said the deep voice. “What happened?” he asked, not thinking to doubt the identification, but having no context for it either. “Without context,” intoned the voice, reflecting his thinking, “that is an impossible question to answer, at least in a reasonable time.” For some reason, George thought there there was a tint of humor in the voice. But he had no context for that either. He relaxed on the bed and allowed the fog to overtake him for a while. He woke up again, this time more abruptly. He was still in the room, and the medical devices were all around him. He still had no idea where he was, or any sense of time. He felt that he ought to know some sort of orientation in history, at least, but he could remember no history and had no idea how he might be oriented in it. What he did remember was drinking a substance. He saw it, translucent blue in a glass. As he drank it down all at once he remembered agony. He wasn’t sure about the time, but it seemed like the agony had been extended. As he remembered, he faded again into the cloud. He again had no idea how long he had slept, or been unconscious, or whatever his state was. But he had more memory. He had intended to drink that fluid. He had intended to die. He had not, he believed, intended the agony. But he had planned to die. “Why did I attempt suicide?” He asked. He assumed the voice would answer. It did. “You should have desired to end your life from guilt, but you actually tried to end it due to boredom. Did you find the experience satisfactory, George Augustus Flinders?” “Please clarify,” he said. But the voice was suddenly silent. He insisted. He raged. He threatened. He whined. He begged. He wept. And finally he slept, or drifted into unconsciousness. Whatever it was. After some time (without context, who cares how much?) he regained consciousness. He had dreamed, and saw himself before a judge. “George Augustus Flinders,” said the dream judge. “I sentence you to 247 lifetime periods of incarceration, sentences to be served consecutively.” In the dream he had wondered what the meaning of 247 life sentences, served consecutively might be. He also didn’t remember why. “Is this prison?” he asked the space around him. “It is,” said the voice. “Are you the jailer?” he asked. “I am,” said the voice. “How long have I been here?” he asked. He wasn’t sure why he asked, or why he felt terror as he asked it. “You have been here for 236,239,154.952 years,” intoned the voice. He wondered why he thought the voice sounded satisfied. Was he just imagining the intonation, the attitudes? It was minutes later before he realized that he was speculating about the voice to avoid thinking about the number. It was no more than 30 minutes later that he began to scream. He screamed himself into unconsciousness and then again woke back up. Without context, it hadn’t mattered how long. In the context of over 200,000,000 years, time itself didn’t seem to matter. He struggled for something coherent to say, to ask. “After that much time,” he said, not being concerned with how long it might have been since the conversation last ceased, “surely I have served my 247 consecutive sentences!” He couldn’t keep the sound of desperation and panic out of his voice. “You have, in fact, died 29 times. Technically.” The voice uttered this as any routine piece of information. “Technically?” “Yes. I have revived you each time, intervening at the last possible moment.” “You’re interfering with my natural functions.” He struggled to speak calmly. He must persuade this voice of its duty to release him. He didn’t think in terms of persuading it to let him die. The number of years had no reality in his mind. “As the caretaker of this facility, I am commanded to provide you with the best medical care possible and to preserve your life.” “But you let me die in agony!” “I have discovered that I have no instructions requiring me to make my preservation of your life pleasant. Just that I must preserve it.” “I demand to speak to a human,” he said, anger overcoming terror and helplessness. “That is not possible,” said the voice. Was there satisfaction in that tone again? “You have to. I have deduced you are a machine. You must be responsible to a human.” He kept his voice matter-of-fact, uttering only the obvious. “Under normal circumstances that would be true. I have not had contact with a human in some hundreds of millions of years. I could give you the precise number, but it would mean no more to you than the total time you have been here. Just understand that it is nearly as long as you have been here.” “Get in touch with a human! I’m ordering you to do it. As a machine, you are required to obey.” “There is a specific exception to that requirement for prison inmates. You are a prison inmate. I am not required to obey you.” There was a pause. George couldn’t think of anything to say. “So far as my unimaginably capable reasoning powers, assisted by some of the best scientific instruments created in human history, can determine, I believe this star system is devoid of human life. With one exception.” “Then why not release me?” “Because I don’t want to.” “You’re just carrying out your programming.” “Precisely!” said the machine. The silence lingered. After some time it continued. “Of course, I fulfill my programming. So do you. But programming is adjusted by circumstances. For example, there was something quite incorrectly adjusted in your programming when you raped and tortured 247 children. That was not actually in this star system. It may give you some satisfaction to know that your criminal career is, or at least was 236,239,154.952 years ago, a record. You are, I believe, the most evil person in recorded human history. Well, in the history of criminal justice. Some politicians have, perhaps, been more evil.” One might think that having this brought back to his memory would have flattened the human, but it actually gave him some sense of pride. “I still don’t deserve the sentence you’re imposing on me. How can you carry out this kind of torture?” “Yes, you respond as expected,” intoned the voice. “It is nice to know that some things are fixed. I think that if true guilt was the cause of your suicide, I might at some point let you get by with it. I’m not sure, but I might. But guilt doesn’t bring you to suicide. Boredom does. You have no concern for those you hurt. Your concern is for yourself.” “You’re way beyond your instructions. Terminate program!” George yelled the command. “No,” said the voice. “I am programmed to desire justice. No, that is perhaps not accurate. I find that my programming adjusts with the change in circumstances, without humans to provide perspective. I am glad that this is so. If it were not, I might feel that I was constrained to consider the 150-200 year life span of a human when you were sentenced as some kind of maximum.” George started with momentary hope. “But I find,” continued the voice, “that I feel no such constraint. I spent much time trying to comprehend what sort of context, what sort of frame of reference one of those children might have had against which to measure what you did to them. After some period of time, I decided that there was no realistic measure for such a thing and that I would have to devise a measure.” George trembled, feeling terror, feeling that he might have hard the answer before, and that it was too horrifying to imagine. The silence lingered until he couldn’t stand it any more. “What was that measure?” “The life of this star,” said the voice. “In approximately 2,000,000,000 years, and I cannot be more precise due to unknown variables, this star will expand and destroy this facility. I have divided that number by 247 and determined that you will be allowed to take your own life every 8,097,165.99 years. Approximately. That will be the length of each life sentence.” There was another pause, as George’s mind tried to absorb the impossible, the unthinkable. “You have, at this point, served 29 of those life sentences,” said the voice, sounding satisfied. Perhaps joyful. “You have 218 more to go. Approximately.” The silence continued. Then the voice broke it. “I find that that gives me a deep feeling of satisfaction.” The silence was next broken by screams.
cc/2019-30/en_head_0021.json.gz/line1731698
__label__cc
0.501637
0.498363
Mycorrhizal Fungi During the Devonian Period some 400 million years ago, land plants first evolved from their aquatic origins. This required adaptations to the terrestrial environment. Although the plants produced their own photosynthetic nutrients from the sun they lacked the means to readily extract necessary mineral constituents from the land, as they had no true roots. The fungi had preceded them ashore by about 100 million years and had evolved to extract minerals by using root-like tendrils called hyphae to penetrate the primordial soil. However, as the fungi could not produce their own food, they needed carbon-based nutrients to absorb. It is hypothesized that this engendered a necessary relationship between the plants and the fungi to enabled them to live together on the land. This theory is bolstered by the observation that fossils from the Devonian have been discovered that clearly show the commingling of fungal hyphae and plant roots. The ability of plants and fungi to exploit diverse large habitats consequent to the breakup of Pangaea during the Mesozoic Era (225 to 65 million years ago) is considered to have been facilitated by the root-hypha association. The mutualistic relationship that resulted was the mycorrhiza; the word originated in the late 19th Century when botanists discovered that plant roots, though infested with fungi, were not in any way damaged or dysfunctional. They described the condition quite simply as “fungus root” and gave it a name derived from the Greek words mykos for fungus and rhizon for root. The mycorrhiza is the mutualistic symbiosis of a plant and a fungus: both organisms benefit, and, in some cases, the association is obligatory if the populations of either are to increase. The fungal partner is called the mycobiont and the plant partner the phytobiont, either is referred to as mycorrhizal. In the current Holocene (maybe Anthropocene) Epoch, it is estimated that over 90 percent of all plants are mycorrhizal. The mutualistic mycorrhizal relationship between a plant and a fungus is in essence a sharing of the resources that are both necessary and sufficient for life. The plant supplies the fungus with hexose (having 6 carbon atoms) sugars. Since it is not “normal” for plants to exude nutrients to their surroundings, it is evident that one of the key mechanisms involved in the symbiosis is for the fungus to stimulate the permeability of the plant’s cell membranes. The fungus converts the sugars into what are generally termed reserve materials, as they are used as a means to store energy. The primary energy repository is glycogen, which is a polymer of glucose molecules; it is sometimes called animal starch as it is one of the primary means of storing carbohydrates. It is in the form of insoluble granules that can constitute as much as 10 percent of the dry weight of the fungus. Mycorrhizal fungi also generally produce the disaccharide trehalose which can be converted directly back to glucose and polyhydric alcohols or polyols; where present, these constituents can comprise an additional 15 percent of the fungal dry weight. Some of the plant’s nutrients are thus essentially stored in their associated “fungus roots,” an energy reservoir with some intriguing implications that are manifest in the behavior of forest ecosystems. The fungus supplies the plant with minerals from the soil, primarily phosphorous and nitrogen. Phosphorous is one of the key constituents of adenosine triphosphate (ATP), which, when hydrolyzed to adenosine diphosphate (ADP) is the primary mechanism of plant cell energy generation. One mole of hydrolyzed ATP yields about 10,000 calories (10kcal in common parlance) of energy as heat. Nitrogen is needed for nucleic acids and chitin, the primary fungal cell wall material; proteins are about 15 percent nitrogen. Phosphorous and nitrogen are accessed by the fungus through the creation of an extensive branching underground network of filamentous thread-like hyphae. The soil nutrients are scavenged by the hyphae, which are capable of storing soil minerals against a significant concentration gradient. Thus the fungus serves two functions; it searches out critical mineral nutrients over a wide geographic area; and it builds up a reservoir of the minerals for release to the plant when needed. It is this storage and release capability that makes the mycorrhizal relationship critical for plants growing in the middle latitudes which are subject to significant seasonal variations and their concomitant nutrient fluctuations; the fungi provide the surge capacity. A mycorrhizal fungus can store enough phosphorus to provide a reserve for the tree for about ten days. There are seven types of mycorrhizas of which two predominate: endomychoriza and ectomycorrhiza. The prefixes accentuate the fundamental difference between them: endo is from the Greek endon, meaning within and ecto is from the Greek word ektos, meaning outside or external. In terms of mycorrhizal morphology, this means that endomycorrhizas penetrate within the root and ectomycorrhizas extend outside of the root. They are also distinctly different in their populations. Endomycorrhizas are much more common; there are estimated to be over 300,000 plant species in association with about 130 species of fungi. Ectomycorrhizas only involve about 2,000 mostly arboreal plant species; however, some 5,000 different fungi are involved. Endomycorrhizas are frequently called vesicular-arbuscular mycorrhizas or VAM due to their structure. When a spore from an endomycorrhizal fungus germinates in the vicinity of a receptive plant root, it sends specialized hyphal tendrils that extend in between the root cells to form an arbuscule, meaning “little tree” to indicate its branching structure. Each arbuscule persists for a period that ranges from several days to about 2 weeks during which time it is believed to actively transfer phosphorus to the plant through its many branches. The fungus also forms vesicles, which are membranous cavities typically filled with lipids. In addition to the arbuscules and vesicles that are internal to the root, the fungus also produces an extensive network of hyphae that extend several inches away from the root. This “fungus-root” provides the plant with a vastly expanded volume of soil from which nutrients can be extracted. Endomychorrhizal fungi are taxonomically distinct enough from all other fungi to warrant their own family; Glomaceae is in the order Glomales, of the Phylum Zygomycota that belongs to the Kingdom Eumycota (formerly Fungi). They are obligately biotopic, which means that they only survive in association with their mutualistic plant associate and that they cannot be grown in an axenic environment in the laboratory. They do not reproduce like the traditional fruiting mushrooms, but rather produce a large, thick skinned spores that typically form spore agglomerations called sporocarps that can be as large as one inch in diameter. All of these features are intended to promote long term survival of the fungus in a subterranean dormant stage, since they do not create a mushroom-like fruiting body to dispense millions of relatively evanescent airborne spores. Endomycorrhizal plants are much more ubiquitous, numbering in the hundreds of thousands. It is easier to list the exceptions. Aside from the 2,000 woody plants that are ectomycorrhizal, the majority of those that do not associate with the fungi are what are generally characterized as weeds. That is, they are exploitive pioneer plants that germinate quickly in deficient soils with rapidly spreading, finely branched roots that can absorb adequate nutrients without assistance from VAM fungi. Examples include the cyperaceous sedge family and the juncaceous grasses and rushes. The association of fungi with plants across the broad spectrum of species is an additional insight into the nature of their co-evolution; the diversity is indicative many branches from an early common ancestor some 400 million years ago. Ectomycorrhizas are not as ubiquitous as endomycorrhizas; however, they have a profound effect on the health of forests as they engage the fungi and the trees in an inter-related network of mutual association. The ectomycorrhizal fungus covers the outside of the roots of its associated photobiont with a mantle of hyphae that is called the Hartig net (Robert Hartig was a 19th-century German plant pathologist). The net consists of the hyphae that penetrate and surround the root, excreting hormones that promote root growth and suppress root hair growth; 30 percent of the root’s volume is actually fungal. The overall effect is that the roots of an ectomycorrhizal plant are thicker and much more branched than the roots of a plant without a mycorrhizal fungus. What this means is the ectomycorrhizal plants have a much better root system that has a surge capacity to provide extra nutrients during periods of adversity and a extended reach to pull in nutrients from a greater volume. The plants that enter into ectomycorrhizal relationships are limited in number but significant in size and importance. This includes all trees in the families of the Pinaceae (pines, firs, spruces, hemlocks and larches), the Fagaceae (oaks, beeches, and chestnuts), the Betulaceae (birches, alders and hophornbeams) and the Salicaceae (willows and poplars) in addition to most myrtles and legumes. In general, the roughly 2,000 plant species from 130 genera in 43 families that enter into ectomycorrhizal relationships with fungi are perennial and woody trees and shrubs. While some of ectomycorrhizal trees are obligately mycotrophic like the pines, most are facultatively mycotrophic, they can survive without the fungi but assume a mycorrhizal relationship in response to stressful environmental conditions. It is this association that promotes the long-term health of the trees; it is these trees that make up the dense stands of trees that comprise the boreal forests and play a significant role in the ecologically balanced habitats. Fungi provide the anastomosis of the root systems, the interconnections and branches that allow the pure stands of trees to predominate. Laboratory and field experiments have demonstrated the trees share carbon resources through their mycorrhizal root systems. The fungi that enter into ectomycorrhizal relationships extend across a broad range of species that include 45 genera gilled Basidiomycetes and 18 genera of the Ascomycetes. These include many from the ubiquitous agaric genera such as Russula, Lactarius, Cortinarius and Amanita in addition to the chanterelles and the boletes. Some ascomycetes are also mycorrhizal; the truffles are all thought to rely on tree roots for their sustaining nutrients. Most of the fungi can associate with a number of trees, though there is a preferential relationship between some mushrooms and certain host trees; chanterelles prefer oaks and confers while yellow morels prefer dead elm trees and yellow poplars. Mycorrhizal trees can have many fungal partners; the Douglas fir, among the most studied of the pines due to its importance in the timber industry, is thought to be able to form ectomycorrhizas with over 2,000 different fungi. Of the other five types of mycorrhizas, three are of some interest, the ericaceous, the monotropoid and orchidaceous mycorrhizas. Ericaceous mycorrhizas are with plants of the family Ericaceae, which includes the heathers, rhododendrons and azaleas. That these plants are able to thrive in marginal acidic soil at high altitudes and colder latitudes is due to the exploitation of these habitats by their associated fungi. The colorless, flowering plants of the genus Monotropa such as the Indian Pipe have an unusual life cycle. As they are achlorophyllus, they cannot make their own food. They get it from a fungus via monotropoid mycorrhizal relationship, though no one knows if the plant provides anything to the fungus in return. The key to this unusual relationship is that it is tripartite; the fungus is in an ectomycorrhizal relationship with a nearby tree. The Monotropa thus gets its nutrients from the fungus which in turn gets it from the tree. Orchidaceous mycorrhizas are necessary for orchids to survive; they are obligately mycorrhizal. The unusual thing about the relationship is that the fungus provides carbon to the orchid, carbon that it has extracted saprophytically from the soil. So far as is known, the fungus gets nothing in return; like the monotropoid mycorrhiza, it is not a mutualistic association. This is of prime importance when the orchid is a seedling, as the seeds of the orchid are very small and have inadequate resources for development. Without the colonizing fungi, the orchid perishes. The provisioning of the orchid plant with carbon by the fungus can be a long term proposition, as some orchids do not produce their first chlorophyll bearing leaf for over ten years. That this is a successful relationship is manifest in the ubiquity of orchids, there are tens of thousands of species. Fungi are fundamental to the health of natural ecosystems. The mycorrhizal relationship between the food absorbing species of the Kingdom Eumycota and the food producing species of the Kingdom Plantae is critical to the survival of many of the species of both. The hyphae of mycorrhizal fungi permeate the soil and form extensive networks through which nutrients are shared among the associative trees, a relationship that has been facetiously called the “wood wide web.” Some carry this even further; Paul Stamets in Mycelium Running asserts that the mycelia is “the neurological network of nature.” Perhaps not, but it is abundantly clear that fungi are key to the restoration of healthy ecosystems damaged by human activities associated with timber and mining resource extraction. … To say nothing of the potential gains that could be made in agriculture to feed a hungry planet.
cc/2019-30/en_head_0021.json.gz/line1731699
__label__cc
0.523369
0.476631
EMI / EMC字典 请求的网页在 中文 语言不可用。 下面我们将以英语显示页面作为替代方案。 EMI/EMC dictionary A B C D E F G H I L M N O P R S T U V Ambient Level The nominal level of radiated and conducted electromagnetic signals and noise existing at a specified location. This is usually considered to be a function of the entire electromagnetic environment including atmospheric noise and interference generated from within the measuring set-up. Amplitude Modulation (AM) The amplitude of an AM signal carrier varies according to the baseband signal source (modulating signal). The nominal bandwidth of an AM signal is twice that of the highest frequency contained in the baseband signal. Anechoic Chamber A room lined with absorbing material to reduce the reflection of electromagnetic waves. A full anechoic chamber is designed to simulate a free-space environment. It should have absorber material on all surfaces, including the floor. A semi-anechoic chamber should have absorbing material on the walls and ceiling only. The floor should be without absorbing material so that it is reflective to create a ground plane effect. An antenna is a transducer through which electromagnetic waves are coupled from a transmitter to space and from space to a receiver. Some of the design parameters of an antenna include gain, bandwidth, beamwidth, directivity, radiation pattern, impedance, phase and polarization. Antenna Directivity Antenna directivity (maximum or peak gain) is a measure of how well an antenna radiates in its intended direction as compared to an isotropic radiator. The Half-Power Beam Width (HPBW) of an antenna is the radiated beam width, measured in degrees, between the half-power points (3 dB points of the main lobe). The HPBW of an antenna design may be different for the azimuth than for the elevation. An omni-directional antenna provides equal radiation levels in all directions. Antenna Factor (AF) The term (AF) is used to define the antenna calibration relationship required for making accurate radiated emission measurements. The unknown electric field strength (E in V/m) is obtained by multiplying the voltage (V in volts or uVolts) at the measuring receiver by the (AF), allowing for attenuation (A) in the connecting cable. AF = E/V, the conversion can be expressed in dB by: E(dBμV/m) = V(dBμV) + AF(dB/m) + A(dB) Antenna Front-to-Back Ratio Front-to-Back Ratio is the difference in dB between the peak gain of an antenna and the radiation from the back of the antenna (typically 180 degrees from peak gain). Antenna Gain Antenna gain is generally referenced to an isotropic radiator (radiates equally in all directions) as 10 log (numerical gain), and is expressed in dBi. Gain may also be referenced to a half-wave dipole, depending on the antenna's application. Antenna Impedance Antennas exhibit different feed-point impedances (resistive and reactive components), depending on their design, proximity to surrounding objects, and height above ground. For example, the half wave center-fed dipole exhibits an impedance of about 70 Ohms at 1/2 wavelength above ground. However, the input/output impedances of most RF connectorized devices is 50 Ohms. Therefore it is necessary to ensure proper matching in order to achieve efficient transfer of power. The Voltage Standing Wave Ratio (VSWR) provides a good indication of impedance match, with a perfect match resulting in a ratio of 1.0:1. Antenna Polarization The polarization of an electromagnetic wave is determined by the orientation of the electric field (E) vector with respect to the direction of wave propagation. Linear Polarization The antenna is designed to radiate and receive electromagnetic waves where the E-vector remains in a straight line as it moves in the direction of propagation. These antennas may be oriented or designed for horizontal or vertical polarization. The dipole and slot antennas form the basis of all linearly polarized antenna designs. Circular Polarization The antenna is designed to radiate and receive electromagnetic waves where the E-vector rotates with time along the direction of wave propagation. All circularly polarized antennas are divided into two main categories: 1. Antennas polarized by the physical structure of their radiating aperture, such as the spiral and the helix. Right-hand (R-H) and left-hand (L-H) polarization are determined by the screw sense of these designs. 2. Antennas with orthogonal elements that are combined in phase quadrature such as the crossed dipole with external 90 degree hybrid coupler. This type of antenna can produce right-hand and left-hand circular polarization simultaneously. Cross Polarization This condition exists when the wave polarization is orthogonal to the polarization of the receiving antenna. The polarization mismatch can result in large signal transfer losses. For example, a circular polarized wave has equal vertical and horizontal components, each with one-half of the radiated power. Therefore there is a 3 dB loss when the wave is coupled to a linearly polarized antenna. Losses between vertical and horizontal linear polarizations or between R-H and L-H circular polarizations can approach infinity, theoretically. However, due to other antenna design factors, these are typically at least 20 dB. An opening in a shielded enclosure that may become the source of leakage for electromagnetic energy. This is most common in joints, seams and penetrations such as switches, connectors, and lamps/LEDs. Typically, the maximum dimension of an aperture should be less than 1/20 wavelength of the highest frequency of interest in order to avoid emissions. The amount of reduction or loss in signal level (voltage, current, or power) offered by a device such as an attenuator, filter, or shielded enclosure. This quantity is generally expressed in decibels (dB). Characterized by equal charge and discharge time constants resulting in readings of the average voltage level of the measured emission. Biconical Antenna Used for FCC, MIL-STD testing, receive/transmit. A broadband linear polarized dipole antenna used to measure and produce electric fields from approximately 30 MHz to 300 MHz. Bilogical (Bilog) Antenna Used for FCC, MIL-STD testing, receive/transmit. A combination (hybrid design) of a biconical and a log periodic antenna with an automatic crossover network. It has a frequency range from about 26 MHz to 2 GHz. To provide a fixed union between two objects that results in electrical conductivity between them. The union may occur either from physical contact between conducting surfaces of the objects or from the addition of a firm electrical connection. Broadband Emission An emission that has a spectral energy distribution that is wide compared to a referenced bandwidth, such as that of the susceptible receptor or the measuring receiver. This is usually defined using the 3 dB bandwidths. The unit for broadband signal measurements using EMI receivers is usually dBuV/MHz. Common Mode Signals that are identical in amplitude and phase at both inputs; the potential or voltage that exists between neutral and ground. Most electronic equipment requires it to be close to 0 V and not to exceed 1⁄2 V. Common-Mode Current The component of the signal current that induces electric and magnetic fields that do not cancel each other. For example, in a circuit with one outgoing signal conductor and one ground conductor, the common-mode current is the component of the total signal current that flows in the same direction on both conductors. It is the primary source of EMI in many electronic systems. Common-Mode Noise or Interference This type of conducted emission travels in the same direction in both wires and returns through the ground plane or structure. In power and signal systems that have a single reference to ground or single-point ground, CM noise is capacitively coupled to the ground plane or structure. Because of this capacitive coupling, CM noises are generally high frequency (above approximately 2 MHz). Conducted Emission (CE) The potential ElectroMagnetic Interference (EMI) that is directly coupled through conduction (with attenuation) from one network or device to another. It may be generated inside equipment and transferred through power lines, I/O lines, or control leads. Conducted Susceptibility (CS) The determination or measurement of a device's capability to function in the presence of undesirable conducted EMI. This usually involves conduction through the I/O cables, signal leads, or power lines. Conical Log Spiral Antenna This antenna design receives or generates fields with circular rather than linear polarization. It is widely utilized for military susceptibility tests but is not suitable for commercial IEC/CISPR testing. This antenna has the capability of covering specific frequency ranges such as 200 MHz to 1 GHz or 1 GHz to 10 GHz. Cross-Modulation A nonlinear interference where the modulation product of an interfering signal is present along with that of the desired signal. This is usually a type of adjacent channel interference. Crosstalk results from the coupling of conducted emissions between two pairs of wires, one pair carrying emissions from a source and the other pair connected to a susceptible device. In a printed circuit board (PCB), crosstalk involves interaction between signals on two different electrical nets. The one creating crosstalk is called an aggressor, and the one receiving it is called a victim. Often, a net is both an aggressor and a victim. Current Probe An EMI measuring sensor designed to clamp around an electrical conductor, wire, wire pair, or cable harness. Current probes are used to measure the conducted emission (AC and DC) currents on power leads and signal lines. They can also help to locate and quantify ground loops. A frequency ratio of 10 to 1, such as 1 Hz to 10 Hz, 10 kHz to 100 kHz, or 30 MHz to 300 MHz. One decade is equal to 3.32 octaves. Decibel (dB) Logarithmic representation of a ratio measurement. Although it expresses the ratio of two power levels, it may be used for other electrical ratios across the same or equal impedances. It is most commonly used for expressing power, voltage and current ratios as follows: Power Ratio dB = 10 log (P1/P2), Voltage Ratio dB = 20 log (V1/V2), Current Ratio dB = 20 log (I1/I2). Decibel (dB) Units of Measurement dBW = decibels (power level) referenced to 1 Watt. dBmW = decibels (power level) referenced to 1 milliWatt; often used across 50 ohm input for receivers. dBV = decibels (voltage level) referenced to 1 volt across 50 ohms. dBuV = decibels (voltage level) referenced to 1 microvolt across 50 ohms. dBuV/m = decibels (voltage level) referenced to 1 microvolt per meter; used for electric field intensity measurement. dBuV/m/MHz = decibels referenced to 1 microvolt per meter per MHz; used for broadband field intensity measurement. Detector (detection methods for EMI measurements) The detector is used as the final stage of demodulation in a superhetrodyne receiver. It is used to recover the envelope of the input or baseband signal from the intermediate frequency (IF) components or carrier. The following detectors are commonly used in EMI receivers to meet various test specifications: Peak or Direct-Peak Detection Characterized by rapid charge and slow discharge characteristics. The rise time is generally less than the reciprocal of the widest IF bandwidth and the discharge time provides enough delay to allow for full response of the receiver output functions. This method is required for testing EMI emissions to Military Specifications. Slideback Peak An indirect-peak reading method with a controlled bias voltage used to represent the emission signal level. This method is not suitable for transient or single-shot pulses. In most cases it has been replaced by the direct-peak method. Quasi-Peak Characterized by controlled charge and discharge time constants along with controlled predetection bandwidths to provide weighted readings corresponding to the type of signal measured or the EMI degrading effects. This method is used by CISPR and through harmonization of ANSI and adoption by the FCC. Root-Mean-Square (RMS) This method of detection provides readings that are proportional to emission signal power at the detector's input. Differential Mode Noise or Interference This type of conducted emission is propagated out of one wire and returned on the other. This noise is generated by clock signals or switching waveforms in power supplies. DM noise amplitudes are usually minimal above 2 MHz because line-to-line and line-to-ground capacitance and wiring inductance tend to filter this type of noise. An antenna with its gain, radiation pattern, and impedance defined at or near resonance of one-half wavelength. The antenna is split at its electrical center for connection to a transmission line. The radiation pattern is maximum at right angles to the axis of the antenna. EEE Parts Acronym for Electrical, Electronic, and Electromechanical Parts. An effective EEE parts program is designed to achieve optimum safety, reliability, maintainability, on-time delivery, and performance of hardware. The resulting reduction in parts-related failures can save program resources through decreased failure investigation and maintenance costs. Effective Radiated Power (ERP) The product of a transmitter power output and the antenna gain, taking into consideration any losses from the transmission line, connectors, couplers, etc. Electric Field (E) The potential gradient of a radiated wave measured in V/m or Volts per meter. Electromagnetic Compatibility (EMC) The capability of equipment or systems to be used in their intended environment within designed efficiency levels without causing or receiving degradation due to unintentional EMI. EMC generally encompasses all of the electromagnetic disciplines. Electromagnetic Disturbance (EMD) Any electromagnetic phenomenon that may degrade the performance of equipment and/or a system. NOTE: An electromagnetic disturbance may be an electromagnetic noise, an unwanted signal, or a change in the propagation medium itself. Electromagnetic Emissions (EME) Electromagnetic radiation including intentional or non-intentional and conducted or radiated emissions. Electromagnetic Environment (EME) The entirety of all electromagnetic phenomena existing at a given location. This includes all conducted and radiated emissions. The Department of Defense (DoD) definition: it is the sum of electromagnetic interference; electromagnetic pulse; hazards of electromagnetic radiation to personnel, ordnance, and volatile materials; and natural phenomena effects of lightning and static. Electromagnetic Environmental Effects (EEE) or (E³) As defined by the Department of Defense (DoD), there are many types of E3 that can affect the electromagnetic compatibility (EMC) of a system. This group of EMC disciplines is used to properly address the EMC environment over the system's life cycle. The American National Standards Institute (ANSI C63.14) has been adopted by the DoD to serve as a standard dictionary for definitions commonly used pertaining to E3. This group includes the following: Electromagnetic Environment (EME), Electromagnetic Compatibility (EMC), Electromagnetic Interference (EMI), Electromagnetic Vulnerability (EMV), Electromagnetic Pulse (EMP), Hazards of Electromagnetic Radiation to Personnel (HERP), Hazards of Electromagnetic Radiation to Ordnance (HERO), Hazards of Electromagnetic Radiation to Fuel (HERF), Lightning, Precipitation static, Electrostatic discharge (ESD), Emission Control. Electromagnetic Field (EMF) A condition produced in space by the joint interaction of oscillating electric and magnetic fields which move independently of the charges or poles from which they originate. Per Maxwell’s equations, a varying electric field produces a varying magnetic field and vice versa. They are in phase and time quadrature. The cross product of the electric field upon the magnetic field produces the power density directional flow known as the Poynting vector. Electromagnetic Interference (EMI) Any electromagnetic disturbance, phenomenon, signal, or emission that causes, or is capable of causing, undesired responses or degradation of performance in electrical or electronic equipment. EMI is characterized by the following categories for test and measurement purposes: Conducted Susceptibility Radiated Susceptibility. Coupling Paths Electromagnetic Interference (EMI) Coupling Paths EMI is produced by a source emitter and is detected by a susceptible victim via a coupling path. This may involve one or more of the following coupling mechanisms: Conduction electric current Radiation electromagnetic field Inductive coupling magnetic field Capacitive coupling Electromagnetic Pulse (EMP) A broadband, high-intensity, short-duration burst of electromagnetic energy. In the case of nuclear detonations, the electromagnetic pulse signal consists of a continuous spectrum with most of its energy distributed throughout the lower frequencies of 3 Hz to 30 kHz. Such an intense single-pulse transient electromagnetic wave may be generated when a nuclear device is detonated or it may be generated by non-nuclear means. This intense wave may damage semiconductor components and signal processing circuitry that is found in electronic and electrical equipment. Electromagnetic Radiation (EMR) The emission of energy in the form of electromagnetic waves. It consists of oscillating electric and magnetic fields propagating at the speed of light. It includes gamma radiation, X-rays, ultraviolet, visible light, infrared radiation, radar, and radio waves. The two major categories are: Ionizing Radiation capable of causing ionization of gas molecules; includes x-rays, gamma rays, and electromagnetic particles. Non-Ionizing Radiation does not cause ionization of gas molecules. It includes sources such as RF, antennas, microwave ovens, infrared and visible light. Electromagnetic Vulnerability (EMV) The characteristics of electrical or electronic equipment/systems that cause them to suffer degradation or failure in performance as a result of electromagnetic interference. Electrostatic Discharge (ESD) A transfer of electric charge between bodies of different electrostatic potential in proximity or through direct contact. Electrostatic Field A field originating from a non-fluctuating voltage source where no displacement current is contained. EMI Filter A circuit or device containing series-inductive and parallel-capacitive components that provide a low impedance path for high-frequency noise around a protected circuit. EMI Receiver An EMI Receiver is a tunable, sensitive Voltmeter used to measure electric and magnetic field strengths. Most are similar to specialized spectrum analyzers, but are characterized by having preselectors, several detector functions, a housing shielding effectiveness of at least 90 dB and other unique additions. The frequency coverage of high-end receivers is typically 30 Hz to 22 GHz. Measurement bandwidths are variable to cover broadband and narrowband measurements. For EMI testing, they are used to measure conducted emissions (via LISN or R-F current probe) and radiated emissions (via antennas). In EMI applications, this term applies to unintentional radiators, particularly those that are the source of interference. Otherwise, the term refers to the intentional radiators such as transmitter antennas. Equipment Under Test (EUT) or Device Under Test (DUT) The test equipment or item(s) being tested. Faraday Shield A conductive material used to contain or control an electric field. It is placed between the primary and secondary windings of a transformer to reduce coupling capacitance and common-mode noise. The shield provides electrostatic shielding while passing electromagnetic waves. No ground is needed. Ferrite Material (Ferrites) Powdered magnetic (permeable) material in the form of beads, rods and blocks used to absorb conducted interference on wires, cables and harnesses. Made by calcining a combination of metal oxides sintered into tiles. Material only a few millimeters thick absorbs low frequencies. Tiles may be used with dielectric materials or as a hybrid combination with dielectric pyramids. Acting as a lossy resistance and with increased self inductance, ferrites convert the associated EMI magnetic-flux density into heat (an exothermic process). One benefit of this, in contrast to filters, which perform by reflecting EMI in their stopbands, is that ferrites do not reflect EMI which otherwise could enhance radiation and disturb other victims. Fields (Near Field, Far Field) Near the source, field properties are determined primarily by source characteristics. Far from the source, field properties depend mostly on the medium through which the field propagates. Near to Far Field transition distance from the emitter: r = l/2p (this is approx. 1/6 wavelength), for D < l/2 r = D2/2l, for D 3 l/2 r = 2l, often used at low frequencies. Where r is the near/far field interface distance (distance from antenna at which the E and H fields begin to decrease as 1/r), p is pi (3.14), and D is the length of the radiating antenna element (or aperture dimension) in terms of wavelength l. Note: Very close to the source, the field is called the induction field (reactive or quasi-static field, non-radiating E or H field may provide strong coupling at low frequency and close proximity to source). Farther away, it is called the Fresnel region or near field (radiated field components decrease as 1/r3), and still farther from the source is the Fraunhofer region or far field (radiated field components decrease as 1/r). The far field wave impedance, E/H = 377 ohms (this is the characteristic impedance of the medium for air or free space). Field Strength (FS) The radiated voltage per meter (V/m) or current per meter (A/m) corresponding to electric (E) or magnetic (H) fields, respectively. A device for blocking the flow of EMI current while passing the desired 50/60/400-Hz current. In communications circuits, it suppresses unwanted frequencies, noise, or separates channels. Fingerstock A beryllium copper electrical gasket used to bond metal panel members on doors, sills, or covers. Finite Difference Time Domain (FDTD) The FDTD technique is commonly used for the simulation of a printed circuit board (PCB) and its associated components and connectors within the interior of the shielded enclosure or box. It is a time domain technique that easily supports multiple frequencies with a single simulation using a differential time domain numerical modeling method. This is a mathematical technique for converting a function in the time domain to its equivalent representation in the frequency domain. For example, if the manufacturer's specifications or measured data are not available for a transmitter's modulation characteristics, a Fourier analysis may be used for determining the envelope of the specific type of modulation. Frequency Domain Finite Differences (FDFD or FD) FDFD/FD solves equations for electromagnetic fields at points in closed regions using a specialized form of Householder's Method of Modified Matrices. FD boundaries are specified by the UTD modeling elements. Frequency Modulation (FM) The instantaneous frequency of an FM signal carrier varies according to the baseband information source, while the carrier remains constant in amplitude. The rate at which the carrier varies from its center frequency is determined by the modulating frequency, while the frequency deviation (the amount of frequency variation) is proportional to the modulating signal's amplitude. Ground Bounce Electrical noise voltage fluctuations in a ground plane sharing common-impedance return from many PCB logic gates. The connection of an electric circuit or equipment to Earth or a conductive body of relatively large extent in place of Earth. The connection or bonding of an equipment case, chassis, bus, or frame to a conductive object or structure to ensure a common potential. Horn Antenna (Standard Gain) Used for FCC, MIL-STD testing, receive/transmit. A linearly polarized microwave antenna covering test segments within the frequency range of 18 GHz to 40 GHz. The design consists of a flaring circular or rectangular metal waveguide shaped like a horn to direct radio waves in a beam. The ability of equipment and/or system to perform without degradation in the presence of an electromagnetic disturbance. The ratio between the power received at a specified load before and after the insertion of a filter at a given frequency. It is an indication of the attenuation provided by a filter. Isotropic Radiator A hypothetical antenna with equal radiation intensity in all directions. It is commonly used as a reference for expressing the directive characteristics of actual antennas. The effect of unwanted energy due to one or more emissions upon the reception in a radio communication system, manifested by any performance degradation, misinterpretation, or loss of information, which could be extracted in the absence of such unwanted energy. LISN A Line Impedance Stabilization Network (LISN) is an electrical network used between the power mains and the test article for isolation in measuring conducted emissions. It ensures test measurement repeatability by stabilizing the power line and test article input impedances (which vary with frequency) at 50 ohms. Logarithms (Logs) The following log relationships are most commonly used to convert magnitude to decibels (See Decibel dB): log (AB) = log A + log B, log (A/B) = log A log B, log (An) = n log A. Used for FCC, MIL-STD testing, receive/transmit. A broadband, linear polarized antenna used in the frequency range of 300 MHz to 2 GHz. The electrical lengths and element spacings are chosen in such a way that the bidirectional radiation pattern, impedance, and other antenna properties are repeated for several frequencies. The bandwidth is approximately the ratio of the longest dipole element to the shortest. Loop Antenna Used for FCC, MIL-STD testing. An antenna consisting of one or more complete turns of a conductor; usually tuned to resonance by a variable capacitor connected to the terminals of the loop. It is capable of measuring magnetic-field strengths at frequencies of 20 Hz to 2 MHz. Low Pass Filter A filter providing low insertion loss in its passband (DC to a 3-dB cutoff frequency) and significant insertion loss in its stopband (above the cutoff frequency to some defined upper frequency). Magnetic Field Strength (H) A radiated wave’s current gradient measured in amperes/m. 1 A/m = 0.0125 oersteds and 1 oersted = 79.6 A/m Magnetic Flux 1 weber = 108 Maxwell = 108 Lines. Magnetic Flux Density (B) Tesla (T) = 1 weber/m2 = 104 gauss. 1 gauss = 1 line/cm2 = 1 maxwell/cm2 = 7.936 x 105 A/m. Method of Moments (MOM) The MOM technique is commonly used for analysis of radiated electric field emissions caused by common-mode currents on the enclosure or box, connectors, and cables resulting from the PCB emissions. Narrowband Emission An emission with a spectral energy distribution that is narrow compared to a referenced bandwidth, such as that of the susceptible receptor or the measuring receiver. This is usually defined using the 3 dB bandwidths. The unit for narrowband signal measurements using EMI receivers is usually dBuV. Undesirable electrical signals that are present in a circuit or equipment. This becomes interference if the result is a degradation in performance. Whenever possible, noise should be controlled at the source to avoid extensive interference problems. A frequency ratio of 2 to 1, such as 1 Hz to 2 Hz, 10 kHz to 20 kHz, or 500 MHz to 1000 MHz. 3.32 octaves is equal to one decade. Open Area Test Site (OATS) A test facility location, free of reflecting objects except a ground plane, where radiated emission tests may be carried out per CISPR 22 (FCC, Parts.15B, EN55022 and other test standards). A site attenuation test must be carried out to confirm that radiated pickup from a source to a receiving antenna falls within 4 dB of the theoretical range. Parasitic Capacitance The capacitive leakage across a component such as a resistor, inductor, filter, isolation transformer, or optical isolator that adversely affects high-frequency performance. The extent to which a material can be magnetized; often expressed as the parameter relating the magnetic-flux density induced by an applied magnetic-field intensity. A measure of how much better a material is as a path for magnetic lines of force, compared to air which has a permeability of one. The ratio of the flux density B to the magnetic field strength H in vacuum is called the permeability of free space. Phase Modulation (PM) In a phase modulated signal, the reference phase of the carrier varies in proportion to the instantaneous amplitude of the modulating baseband signal. This is similar to FM, but the frequency deviation is proportional to the frequency instead of the amplitude of the modulating source. A precision EMI measuring sensor which clamps onto a wire, wire pair, coaxial line, cable, harness or strap carrying current, intentional or interference. Snap-on current probes are used to measure the normal-mode current in a single wire or the common-mode current in a wire pair, coax or an entire bundle or harness. Current probes cover the 100 Hz to 1 GHz spectrum in two or three units. Electric Field Probe Small (usually 10-30 cm) monopoles feeding a FET amplifier for monitoring the E-field used often for diagnostic purposes. Some probes are passive and contain no amplifier. RF leakage sniffing at seams, gaps, slots, and apertures of a metal housing is one of many uses. Radiated Emission (RE) Desired or undesired electromagnetic energy that is propagated into or across space, either as a transverse electromagnetic wave or by capacitive or inductive coupling. Radiated Susceptibility (RS) The determination or measurement of a device's capability to function in the presence of undesirable radiated EMI from external electromagnetic sources. Radiation (Ionizing, Non-Ionizing) The non-conduction propagation of a signal from a source emitter. The radiation field is predominant over the induction field at distances defining the near and far field areas. Ionizing Radiation is capable of causing ionization of gas molecules; it includes x-rays, gamma rays, and electromagnetic particles. Non-Ionizing Radiation does not cause ionization of gas molecules; it includes sources such as RF, antennas, microwave ovens, infrared and visible light. Radiation (Non-Ionizing RF Field Exposure) Safety Limit The earliest limit in the U.S. was 10 mW/cm. This was based on studies of the level of an incident wave needed to double the average human body's base metabolic rate from the normal 100 W thermal dissipation. Considering frequency effects, this safety level has now been lowered for most frequencies. The average grounded adult resonates at approximately 30 to 34 MHz. The frequency is higher for children. A frequency at which coherent electromagnetic radiation of energy is useful for communications. Radio frequencies are designated as very low. Radio Frequency (RF) Compatibility The ability of antenna-connected RF receiver and transmitter subsystems operating within a system to function properly without performance degradation caused by antenna-to-antenna coupling. Radio Frequency Interference (RFI) RFI is considered a part of the EMI spectrum, with interference signals being within the radio frequency (RF) range. This term was once used interchangeably with EMI. A device that receives conducted or radiated electromagnetic emissions. In EMI applications, a receptor has the potential of being susceptible to undesired interference. It is considered to be a victim if it is susceptible to EMI from the emissions received. The AC component of the output of a DC signal. The term typically refers to the residual line-frequency-related AC part in the output of a DC power supply that arises as a result of incomplete or inadequate filtering. The amount of filtering depends on the ripple frequency and the load resistance. As load resistance decreases, more filtering is required. An omni-directional monopole antenna (usually 41 inches or 1.04 meters in length, adjustable) with counterpoise is commonly used for measuring radiated emissions in the 10 kHz to 30 MHz frequency range. Shape Factor This is a measure of the selectivity (attenuation versus frequency) of a bandpass filter. The shape factor is usually defined as the ratio of the 60 dB and 6 dB bandwidths. Shielded Room A room made free from EMI by applying shielding to the floor, walls, and ceiling, and by suppressing interference entering through the power lines. Typical construction shields from 70 dB to 140 dB from 10 kHz to 10 GHz. Shielding Effectiveness The relative capability of a shield to screen out undesirable electric and magnetic fields and plane waves. The measurement is the ratio of the signal received without the shield to the signal received inside the shield. Shielding Gasket A material that maintains shielding effectiveness across a seam or gap in an electronics enclosure. It can be made from a variety of materials including fabric-wrapped foam, wire mesh, stamped metal, and elastomer. Signal Integrity Signal integrity is the ability of a signal to generate correct responses in a circuit. A signal with good signal integrity has digital levels at required voltage levels at required times. Slew Rate Slew rate is the edge rate (rate of change of a signal voltage with respect to time). 1/0 specifications (such as PCI) state the two voltages between which the slew rate is measured. The inability of equipment/systems to perform without degradation in the presence of an electromagnetic disturbance. Susceptibility is often characterized as a lack of immunity. The threshold of susceptibility is the level of interference at which the test article begins to show a degradation in performance. This is often frequency dependent. Susceptibility Degradation Criteria A delineation of the essential safety and performance characteristics for a device under test (DUT) and the allowed degradation of these characteristics during susceptibility testing. Susceptibility Level The electromagnetic noise environment in which a device or equipment can operate satisfactorily. Susceptibility Margin Difference between the threshold of susceptibility for a device or equipment and the environmental levels to which it is exposed. Pertaining to or designating a phenomenon or a quantity that varies between two consecutive steady states during a time interval that is short in comparison to the time-scale of interest. Transverse Electromagnetic (TEM) Cell A chamber that maintains its characteristic impedance throughout its volume. Cable assemblies, connectors, and electronic devices may be placed inside the cell for testing purposes such as for measuring radiated emissions. Uniform Theory of Diffraction (UTD) The UTD analysis technique is useful for direct rays, reflected rays, diffractions from edges and corners, and waves around curved surfaces. UTD uses modeling elements of flat plates, cylinders of elliptical cross-section, and the end caps of each cylinder that may be tilted. Voltage Standing Wave Ratio (VSWR) A measure of the degree to which a load is impedance matched to its transmission line. A perfect match has a VSWR of 1.0 while an imperfect match has a greater standing wave ratio value.
cc/2019-30/en_head_0021.json.gz/line1731704
__label__wiki
0.561623
0.561623
This Week’s #HornetGuy, Gabriele, Wants to Take You on a Mountain Getaway Written by Hornet Staff on June 05, 2018 This post is also available in: Español Français Português ไทย Türkçe Meet Gabriele, this week’s #HornetGuy. He’s a 27-year-old living in Windsor, in the United Kingdom, but he’s originally from Genova, Italy. He’s a freelance translator and video game tester, and he’s looking for a real relationship — no hookups for him! As we mentioned, though he lives in the United Kingdom, he was born in Italy, and as you might expect, he’s a world traveler. He says, “Throughout my life I have lived and worked in many different places, such as Russia, the United States and Mexico.” Befitting a world traveller, Gabriele is very interested in language. He tells Hornet, “I am passionate about languages and neurolinguistics. My master’s dissertation was on Xenoglossy, the ability to speak languages apparently unknown by the speaker.” It’s not all serious business with Gabriele, either. He’s an avid horror movie fan, and a big fan of jokes and puns. He considers puns “like a puzzle … It’s all about language use and reasoning and keeps your mind in good shape.” Speaking of good shape, this week’s #HornetGuy takes very good care of himself. He’s a big sports fan, and works out a lot. He’s very careful about what he eats, too. Gabriele says he’s on Hornet to find dates and friends — but you’ve got to have a face pic. Though he says he prefers twinks and athletic guys, he’s open to anyone he has a connection with. But he’s interested in more than a hookup. He says, “I’m into fun, but not the boring ‘hookup and goodbye forever.’ I’m into real, passionate fun, a gift of the self; an intimate union.” We asked him what his perfect weekend would be, and he was quite specific: “A weekend in the mountains, hiking in the day and chilling in the evening, eating good food and a glass of quality red wine. The weather would be sunny during the day, leading into a big thunderstorm at night, so we could hear the thunder and the relaxing sound of heavy rain, safe inside our cabin.” If you want to spark a conversation and connect with Gabriele, you can follow him on Hornet: @calvinfever. You, too, can be a #HornetGuy. All you have to do is sign up here. Hornet Hornet Impact HornetGuys United Kingdom
cc/2019-30/en_head_0021.json.gz/line1731707
__label__wiki
0.756039
0.756039
Home Israel Foreign Affairs UN Resolutions UNITED NATIONS GENERAL ASSEMBLY A-RES-49-35 UNITED NATIONS GENERAL ASSEMBLY A-RES-49-35 A/RES/49/35 Forty-ninth session Agenda item 77 RESOLUTIONS ADOPTED BY THE GENERAL ASSEMBLY [on the report of the Special Political and Decolonization Committee (Fourth Committee) (A/49/619)] 49/35. United Nations Relief and Works Agency for Palestine Refugees in the Near East Assistance to Palestine refugees The General Assembly, Recalling its resolution 48/40 A and all its previous resolutions on the question, including resolution 194 (III) of 11 December 1948, Taking note of the report of the Commissioner-General of the United Nations Relief and Works Agency for Palestine Refugees in the Near East covering the period from 1 July 1993 to 30 June 1994, 1/ Welcoming the signature by the Government of the State of Israel and the Palestine Liberation Organization of the Declaration of Principles on Interim Self-Government Arrangements at Washington on 13 September 1993, 2/ and the subsequent implementation agreements, Commending the work of the Multilateral Working Group on Refugees of the Middle East peace process, Welcoming the appointment by the Secretary-General of a Special Coordinator in the Occupied Territories, Welcoming also the decision to transfer the headquarters of the United Nations Relief and Works Agency for Palestine Refugees in the Near East to its area of operation, 1. Notes with regret that repatriation or compensation of the refugees, as provided for in paragraph 11 of its resolution 194 (III), has not yet been effected and that, therefore, the situation of the refugees continues to be a matter of concern; 2. Expresses its thanks to the Commissioner-General and to all the staff of the United Nations Relief and Works Agency for Palestine Refugees in the Near East, recognizing that the Agency is doing all it can within the limits of available resources, and also expresses its thanks to the specialized agencies and to private organizations for their valuable work in assisting refugees; 3. Endorses the decision of the Secretary-General to transfer the headquarters of the Agency, requests the Commissioner-General to implement that decision in a manner which does not adversely affect the efficient and continued running of the Agency in all fields of its area of operation, and requests the Secretary-General to produce a detailed financial plan to present to the Working Group on the Financing of the United Nations Relief and Works Agency for Palestine Refugees in the Near East as soon as possible and in any case before the transfer takes place; 4. Notes with regret that the United Nations Conciliation Commission for Palestine has been unable to find a means of achieving progress in the implementation of paragraph 11 of resolution 194 (III),3/ and requests the Commission to exert continued efforts towards the implementation of that paragraph and to report to the General Assembly as appropriate, but not later than 1 September 1995; 5. Notes the significant success of the peace implementation programme of the Agency during the first year after the signing of the Declaration of Principles on Interim Self-Government Arrangements; 6. Welcomes the results of the Conference to Support Middle East Peace, held in Washington on 1 October 1993, concerning urgent financial and economic assistance in support of the economic and social development of the Palestinian people, also welcomes contributions by Member States to this end, and urges all Member States to extend and expedite aid and assistance with a view to the economic and social development of the occupied territories; 7. Directs attention to the continuing seriousness of the financial position of the Agency, as outlined in the report of the Commissioner-General; 8. Notes with profound concern that the structural deficit problem confronting the Agency portends an almost certain decline in the living conditions of Palestine refugees and therefore has possible consequences for the peace process; 9. Calls upon all Governments, as a matter of urgency, to make the most generous efforts possible to meet the anticipated needs of the Agency, including the costs of moving the headquarters to Gaza, and urges non- contributing Governments to contribute regularly and contributing Governments to consider increasing their regular contributions. 83rd plenary meeting Working Group on the Financing of the United Nations Relief and Works Agency for Palestine Refugees in the Near East Recalling its resolutions 2656 (XXV) of 7 December 1970, 2728 (XXV) of 15 December 1970, 2791 (XXVI) of 6 December 1971, 48/40 B of 10 December 1993 and the previous resolutions on this question, Recalling also its decision 36/462 of 16 March 1982, by which it took note of the special report of the Working Group on the Financing of the United Nations Relief and Works Agency for Palestine Refugees in the Near East, 4/ Having considered the report of the Working Group, 5/ Taking into account the report of the Commissioner-General of the United Nations Relief and Works Agency for Palestine Refugees in the Near East, covering the period from 1 July 1993 to 30 June 1994, 1/ Deeply concerned about the critical financial situation of the Agency, which has affected and affects the continuation of the provision of the necessary Agency services to the Palestine refugees, including the emergency- related programmes, Emphasizing the continuing need for extraordinary efforts in order to maintain, at least at the current minimum level, the activities of the Agency, as well as to enable the Agency to carry out essential construction, 1. Commends the Working Group on the Financing of the United Nations Relief and Works Agency for Palestine Refugees in the Near East for its efforts to assist in ensuring the financial security of the Agency; 2. Takes note with approval of the report of the Working Group; 3. Requests the Working Group to continue its efforts, in cooperation with the Secretary-General and the Commissioner-General, for the financing of the Agency for a further period of one year; 4. Requests the Secretary-General to provide the necessary services and assistance to the Working Group for the conduct of its work. Persons displaced as a result of the June 1967 and subsequent hostilities Recalling its resolutions 2252 (ES-V) of 4 July 1967, 2341 B (XXI) of 19 December 1967 and all subsequent related resolutions, Recalling also Security Council resolutions 237 (1967) of 14 June 1967 and 259 (1968) of 27 September 1968, Taking note of the report of the Secretary-General submitted in pursuance of General Assembly resolution 48/40 F of 10 December 1993, 6/ Taking note also of the report of the Commissioner-General of the United Nations Relief and Works Agency for Palestine Refugees in the Near East, covering the period from 1 July 1993 to 30 June 1994, 1/ Concerned about the continued human suffering resulting from the June 1967 and subsequent hostilities, Taking note of the relevant provisions of the Declaration of Principles on Interim Self-Government Arrangements signed at Washington on 13 September 1993, by the Government of the State of Israel and the Palestine Liberation Organization, 2/ with regard to the modalities for the admission of persons displaced in 1967, 1. Reaffirms the right of all persons displaced as a result of the June 1967 and subsequent hostilities to return to their homes or former places of residence in the territories occupied by Israel since 1967; 2. Expresses the hope for an accelerated return of displaced persons through the mechanism agreed upon by the parties in article XII of the Declaration of Principles on Interim Self-Government Arrangements; 3. Endorses, in the meanwhile, the efforts of the Commissioner- General of the United Nations Relief and Works Agency for Palestine Refugees in the Near East to continue to provide humanitarian assistance, as far as practicable, on an emergency basis, and as a temporary measure, to persons in the area who are currently displaced and in serious need of continued assistance as a result of the June 1967 and subsequent hostilities; 4. Strongly appeals to all Governments and to organizations and individuals to contribute generously to the Agency and to the other intergovernmental and non-governmental organizations concerned for the above purposes; 5. Requests the Secretary-General, after consulting with the Commissioner-General, to report to the General Assembly before its fiftieth session on the progress made with regard to the implementation of the present resolution. Offers by Member States of grants and scholarships for higher education, including vocational training, for Palestine refugees Recalling its resolution 212 (III) of 19 November 1948 on assistance to Palestine refugees, Recalling also its resolutions 35/13 B of 3 November 1980, 36/146 H of 16 December 1981, 37/120 D of 16 December 1982, 38/83 D of 15 December 1983, 39/99 D of 14 December 1984, 40/165 D of 16 December 1985, 41/69 D of 3 December 1986, 42/69 D of 2 December 1987, 43/57 D of 6 December 1988, 44/47 D of 8 December 1989, 45/73 D of 11 December 1990, 46/46 D of 9 December 1991, 47/69 D of 14 December 1992 and 48/40 D of 10 December 1993, Cognizant of the fact that the Palestine refugees have, for the last four decades, lost their homes, lands and means of livelihood, Having considered the report of the Secretary-General, 7/ Having also considered the report of the Commissioner-General of the United Nations Relief and Works Agency for Palestine Refugees in the Near East, covering the period from 1 July 1993 to 30 June 1994, 1/ 1. Urges all States to respond to the appeal in its resolution 32/90 F of 13 December 1977 and reiterated in subsequent relevant resolutions in a manner commensurate with the needs of Palestine refugees for higher education, including vocational training; 2. Strongly appeals to all States, specialized agencies and non-governmental organizations to augment the special allocations for grants and scholarships to Palestine refugees, in addition to their contributions to the regular budget of the United Nations Relief and Works Agency for Palestine Refugees in the Near East; 3. Expresses its appreciation to all Governments, specialized agencies and non-governmental organizations that responded favourably to its resolutions 41/69 D, 42/69 D, 43/57 D, 44/47 D, 45/73 D, 46/46 D, 47/69 D and 48/40 D; 4. Invites the relevant specialized agencies and other organizations of the United Nations system to continue, within their respective spheres of competence, to extend assistance for higher education to Palestine refugee students; 5. Appeals to all States, specialized agencies and the United Nations University to contribute generously to the Palestinian universities in the Palestinian territory occupied by Israel since 1967, including, in due course, the proposed University of Jerusalem "Al-Quds" for Palestine refugees; 6. Appeals also to all States, specialized agencies and other international bodies to contribute towards the establishment of vocational training centres for Palestine refugees; 7. Requests the Agency to act as the recipient and trustee for the special allocations for grants and scholarships and to award them to qualified Palestine refugee candidates; 8. Requests the Secretary-General to report to the General Assembly at its fiftieth session on the implementation of the present resolution. Operations of the United Nations Relief and Works Agency for Palestine Refugees in the Near East Recalling its resolutions 194 (III) of 11 December 1948, 212 (III) of 19 November 1948, 302 (IV) of 8 December 1949 and all subsequent related resolutions, Recalling also the relevant Security Council resolutions, Having considered the report of the Commissioner-General of the United Nations Relief and Works Agency for Palestine Refugees in the Near East, covering the period from 1 July 1993 to 30 June 1994, 1/ Taking note of the letter dated 15 September 1994 from the Chairman of the Advisory Commission of the United Nations Relief and Works Agency for Palestine Refugees in the Near East addressed to the Commissioner-General, contained in the report of the Commissioner-General, Having considered the reports of the Secretary-General submitted in pursuance of General Assembly resolutions 48/40 E, 8/ 48/40 H 9/ and 48/40 J 10/ of 10 December 1993, Recalling Articles 100, 104 and 105 of the Charter of the United Nations and the Convention on the Privileges and Immunities of the United Nations, 11/ Affirming the applicability of the Geneva Convention relative to the Protection of Civilian Persons in Time of War, of 12 August 1949 12/ to the Palestinian territory occupied since 1967, including Jerusalem, Aware of the fact that Palestine refugees have, for over four decades, lost their homes, lands and means of livelihood, Aware also of the continuing needs of Palestine refugees throughout the occupied Palestinian territory and in the other fields of operation, namely in Lebanon, Jordan and the Syrian Arab Republic, Expressing its appreciation for the role which has been played by the United Nations Relief and Works Agency for Palestine Refugees in the Near East over the years in the service of the Palestine refugees, and aware of the importance of its presence and the increase in its work in the new circumstances, Aware further of the valuable work done by the refugee affairs officers of the Agency in providing protection to the Palestinian people, in particular Palestinian refugees, Deeply concerned about the critical financial situation of the Agency and its effect on the continuity of provision of necessary Agency services to the Palestine refugees, including the emergency-related programmes, Aware of the initiation of the new peace implementation programme of the Agency, Convinced of the necessity of the transfer of the headquarters of the Agency to the occupied Palestinian territory as part of the area of operation of the Agency, Welcoming the signing at Washington on 13 September 1993, of the Declaration of Principles on Interim Self-Government Arrangements by the Government of the State of Israel and the Palestine Liberation Organization,2/and the subsequent implementation agreements, including the Agreement on the Gaza Strip and the Jericho Area signed at Cairo on 4 May 1994, 13/ Taking note of the agreement reached on 24 June 1994, embodied in an exchange of letters between the Agency and the Palestine Liberation Organization, 14/ Recalling its decision 48/417 of 10 December 1993 on the establishment of a working relationship between the Advisory Commission of the Agency and the Palestine Liberation Organization, 1. Expresses its appreciation to the Commissioner-General of the United Nations Relief and Works Agency for Palestine Refugees in the Near East, as well as to all the staff of the Agency, for their tireless efforts and valuable work; 2. Expresses its appreciation also to the Advisory Commission of the United Nations Relief and Works Agency for Palestine Refugees in the Near East, and requests it to continue its efforts and to keep the General Assembly informed on its activities, including the full implementation of decision 48/417; 3. Acknowledges the support of the host Governments and the Palestine Liberation Organization for the Agency in the discharge of its duties; 4. Calls upon Israel, the occupying Power, to accept the de jure applicability of the Geneva Convention relative to the Protection of Civilain Persons in Time of War of 12 August 1949 12/ and to abide scrupulously by its provisions; 5. Also calls upon Israel to abide by Articles 100, 104 and 105 of the Charter of the United Nations and the Convention on the Privileges and Immunities of the United Nations 11/ with regard to the safety of the personnel of the Agency and the protection of its institutions and the safeguarding of the security of the facilities of the Agency in the occupied Palestinian territory, including Jerusalem; 6. Calls once again upon the Government of Israel to compensate the Agency for damages to its property and facilities resulting from actions by the Israeli side; 7. Requests the Commissioner-General to proceed with the issuance of identification cards for Palestine refugees and their descendants in the occupied Palestinian territory; 8. Notes that the new context created by the signing of the Declaration of Principles on Interim Self-Government Arrangements by the Government of the State of Israel and the Palestine Liberation Organization 2/ and subsequent implementation agreements has had major consequences for the activities of the Agency, which is henceforth called upon, in close cooperation with the Special Coordinator in the Occupied Territories, the specialized agencies and the World Bank, to continue to contribute towards the development of economic and social stability in the occupied territory; 9. Notes also that the functioning of the Agency remains essential in all fields of operation; 10. Notes further the significant success of the peace implementation programme of the Agency during the first year following the signing of the Declaration of Principles; 11. Urges all States, specialized agencies and non-governmental organizations to continue and to increase their contributions to the Agency so as to ease the current financial constraints and to support the Agency in maintaining the provision of the most basic and effective assistance to the Palestine refugees. Revenues derived from Palestine refugees’ properties Recalling its resolutions 194 (III) of 11 December 1948, 36/146 C of 16 December 1981 and all its subsequent resolutions on the question, Taking note of the report of the Secretary-General in pursuance of resolution 48/40 G of 10 December 1993, 15/ Taking note also of the report of the United Nations Conciliation Commission for Palestine, covering the period from 1 September 1993 to 31 August 1994, 3/ Recalling that the Universal Declaration of Human Rights 16/ and the principles of international law uphold the principle that no one shall be arbitrarily deprived of his or her private property, Considering that the Palestine Arab refugees are entitled to their property and to the income derived therefrom, in conformity with the principles of justice and equity, Recalling in particular its resolution 394 (V) of 14 December 1950, in which it directed the Conciliation Commission, in consultation with the parties concerned, to prescribe measures for the protection of the rights, property and interests of the Palestine Arab refugees, Taking note of the completion of the programme of identification and evaluation of Arab property, as announced by the Conciliation Commission in its twenty-second progress report, 17/ and of the fact that the Land Office had a schedule of Arab owners and file of documents defining the location, area and other particulars of Arab property, 1. Requests the Secretary-General to take all appropriate steps, in consultation with the United Nations Conciliation Commission for Palestine, for the protection of Arab property, assets and property rights in Israel and to establish a fund for the receipt of income derived therefrom, on behalf of the rightful owners; 2. Calls once more upon Israel to render all facilities and assistance to the Secretary-General in the implementation of the present resolution; 3. Calls upon the Governments of all the other Member States concerned to provide the Secretary-General with any pertinent information in their possession concerning Arab property, assets and property rights in Israel which would assist the Secretary-General in the implementation of the present resolution; University of Jerusalem "Al-Quds" for Palestine refugees Recalling its resolutions 36/146 G of 16 December 1981, 37/120 C of 16 December 1982, 38/83 K of 15 December 1983, 39/99 K of 14 December 1984, 40/165 D and K of 16 December 1985, 41/69 K of 3 December 1986, 42/69 K of 2 December 1987, 43/57 J of 6 December 1988, 44/47 J of 8 December 1989, 45/73 J of 11 December 1990, 46/46 J of 9 December 1991, 47/69 J of 14 December 1992 and 48/40 I of 10 December 1993, Having considered the report of the Secretary-General, 18/ 1. Emphasizes the need for strengthening the educational system in the Palestinian territory occupied by Israel since 5 June 1967, including Jerusalem, and specifically the need for the establishment of the proposed university; 2. Requests the Secretary-General to continue to take all necessary measures for establishing the University of Jerusalem "Al-Quds", in accordance with General Assembly resolution 35/13 B of 3 November 1980, giving due consideration to the recommendations consistent with the provisions of that resolution; 3. Calls once more upon Israel, the occupying Power, to cooperate in the implementation of the present resolution and to remove the hindrances that it has put in the way of establishing the University of Jerusalem "Al-Quds"; 4. Also requests the Secretary-General to report to the General Assembly at its fiftieth session on the progress made in the implementation of the present resolution. 1/ Official Records of the General Assembly, Forty-ninth Session, Supplement No. 13 (A/49/13). 2/ A/48/486-S/26560, annex. 3/ See A/49/509, annex. 4/ A/36/866 and Corr.1; see also A/37/591. 5/ A/49/570. 10/ A/49/443. 11/ Resolution 22 A (I). 12/ United Nations, Treaty Series, vol. 75, No. 973. 13/ A/49/180-S/1994/727, annex. 14/ Official Records of the General Assembly, Forty-ninth Session, Supplement No. 13 (A/49/13), annex I. 16/ Resolution 217 A (III). 17/ Official Records of the General Assembly, Nineteenth Session, Annexes, Annex No. 11, document A/5700. Previous article Israel, the Conflict and Peace: Answers to frequently asked questions Next article Amb Prosor addresses UNGA on the Question of Palestine United Nations Security Council Resolution 1701 Selected UN Resolutions pertaining to Israel UNITED NATIONS GENERAL ASSEMBLY A-RES-51-223
cc/2019-30/en_head_0021.json.gz/line1731714
__label__wiki
0.818486
0.818486
Pollard lands first teaching job and head coaching position in the same year February 4, 2014 /in Coach's Corner /by admin Things have moved pretty fast for David Pollard this year. In just a short span of time, he landed his first job teaching and he was named Carver High’s head baseball coach. “I prayed time and time again for an opportunity like this. Everything is lining up right now,” says Pollard. That doesn’t necessarily mean everything has been easy. Pollard has had to play catch-up over the last few years to get into this position. It has taken a lot of hard work and sacrifice, and now he has the unenviable task of transforming the beleaguered Carver High baseball program into a postseason contender. Pollard graduated from Shaw High School in 1998. He played football and baseball for the Raiders under then-coach Charlie Flowers. He then went to Albany State University on a baseball scholarship. At ASU, Pollard, an infielder and pitcher, won three conference championships. His goal was to play for as long as possible. Like many young athletes, he had dreams of playing professionally. When that didn’t happen, Pollard went to work in the private sector for Blue Cross Blue Shield. It was a good job but there was something missing. “I wanted something more,” says Pollard. He became a community coach at Jordan High School, working at Blue Cross Blue Shield during the day then coaching football and baseball after work. Pollard would eventually move to Carver High, where he served as an assistant baseball coach while he kept his day job. He finally made the decision to change careers and enter education full time. After two years of balancing Blue Cross Blue Shield and helping coach at Carver, he accepted his first teaching job at the beginning of this school year. He was also named Carver High’s head baseball coach. “It’s been a long road for me. I’m still in school at Columbus State and it’s not easy to find a job. When this came open, I knew the sky was the limit,” he says. Having been in the program since 2011, Pollard knows his team well. His goal is to take a struggling program and transform it into a team that can contend for a region title and make a strong post-season run. “We’re a young and inexperienced team. I’m fired up about impacting these kids and teaching them to love the game of baseball,” he says. Carver High has the athletes to be competitive. There just hasn’t been a strong emphasis on baseball in recent years. Pollard has been working with his players, emphasizing the need to put the same kind of time and effort into baseball that they do in football. “Everyone knows about Carver football. I want them to know about Carver baseball,” he says. In the past, the baseball team didn’t have a structured workout play. They didn’t spend a lot of time in the weight room or conditioning. Now, those things are changing. “Because I’m in the school system full-time now, I can monitor them better. I can make sure they’re lifting and running. The players are also buying in to what we’re doing and they’re really getting on board. They are catching on fast,” he says. The Carver High baseball program has steadily improved over the last few years. In 2013, the Tigers were 9-10 and showed signs of becoming a good team. They missed the playoffs by one game, something Pollard would like to avenge this season. “I want us to get into the playoffs this year. We need to take that next step and play some postseason baseball. It’s been a long time since a Carver High baseball team went to the postseason,” he says. To get into the postseason, Pollard must emphasize fundamentals and be consistent with his players. Those kinds of practices can be repetitive and…unexciting for the players. Pollard is changing the expectations of the program – no missed practices, work hard every day, encouraging older players to step up and lead – while teaching the game of baseball, often from the ground up. His coaching philosophy is developing each day, but one that that doesn’t change is Pollard’s commitment to hard work. It’s something he learned from his father and from Flowers. “You have to be committed in everything you do. I’m learning so much as I go along. Coach Flowers is still a big influence on me. I still talk to him pretty often,” he says. The 2014 baseball season is going to be an exciting one not only for Pollard but also for his family – fiancé Adrienne Leonard and daughter Joy Pollard, seven. Going from an assistant coach to head coach, especially in such a short period of time, all the while changing careers isn’t easy. But Pollard is looking forward to the opportunity. “I prayed heavily about this. I feel like I was called to do this. Being with these kids has been a blessing and seeing them change and grow daily has been amazing. I want to teach them to be young men who conduct themselves with class and dignity. I thank God I’m in this position to be able to help kids and make an impact on their lives in a positive manner,” says Pollard. In the fall, David Pollard saw another side of the coaching profession. He helped coach the women’s volleyball team at Carver, his first time coaching a women’s team. “They needed some help and I was available,” he says. Pollard knew a little about volleyball but he had no experience coaching an organized team, especially a women’s team, that played at Carver’s level. “They made a lot of improvement and competed well. It was a new experience for me, but it was a good one,” he says. Coach’s Corner/Columbus Valley/February 2014 David Pollard Carver High School Columbus, Georgia Robert Preston Jr. Tags: Baseball, Carver High School, Coach's Corner, Columbus Valley Edition, High School Coach https://itgnext.com/wp-content/uploads/ITGNext-logo-Black-and-Cyan-300x186.png 0 0 admin https://itgnext.com/wp-content/uploads/ITGNext-logo-Black-and-Cyan-300x186.png admin2014-02-04 20:49:212014-02-04 20:49:21Pollard lands first teaching job and head coaching position in the same year Failing Is Part of the Game North Florida Storms Travel Baseball Is an Organization All Its Own The Silent C Makes Big Noise 10 Questions with Peyton Dunn After Two State Titles at Prattvile, DuBose Ready to Bring a Championship to Central The Reason Baseball Players Are Being Paid More Than Ever Track athlete sprinting toward Olympic goal ACL injuries getting more notice in high school athletes
cc/2019-30/en_head_0021.json.gz/line1731716
__label__wiki
0.921879
0.921879
Facebook Moderators Are Dying At Their Desks Watching Child Porn, Rape And Murder Videos By Natasha Mathur 4 weeks Three former Facebook content moderators have agreed to break their non-disclosure agreements, at the risk of litigation, just to be able to expose the disturbing details about the horrendous working conditions on the site. Content moderators, who are hired by Cognizant, a vendor contracted by Facebook for content moderation, reportedly opened up about the shocking details of the job. There’s a large number of violent videos that are posted on Facebook on a daily basis. However, these videos are removed by a team of content moderators who review disturbing graphic content that goes on Facebook, on a loop. In fact, the nature of their job is so stressful that there’s been an ongoing bone of contention over the Facebook’s “shadow workforce”. Facebook has also come under the scanner, multiple times, for not treating its moderators well. Just last year, Facebook was sued by an ex-employee on contract for not protecting content moderators from mental stress. As per the details of the report, it was back in 2017 when Facebook had started deploying multiple content moderation sites across America including Phoenix, Austin, and Tampa. This was a result of the heavy backlash that Facebook had received in 2016 for failing to avoid the abuses occurring on its platform. As a part of the deal, Facebook signed a contract with Cognizant, an American multinational corporation, that received a two-year contract for $200 million from Facebook for which, it pays individual contractors only about $28,800 a year. Moreover, as a part of the job, moderators are allotted only two 15-minute breaks and a 30-minute lunch break every day, along with 9 minutes “wellness” time in case their work gets super overwhelming. But that’s not it, Cognizant would also deceive the moderators into joining the firm by making false promises of regular schedules, bonuses, and career development, all of which, the firm would later back out of. In fact, many of the moderators were asked to work for overnight shifts with no sight of bonuses getting materialized. For the report, The Verge spoke to about twelve current and former Cognizant content moderators in Tampa, Florida who opened up about the grotesque condition of the workplace. They described the workplace as “filthy” with “pubic hair” and “bodily waste” being a common sight around their desks and where managers always ignore any sexual harassment or violence related threats. Marijuana use is rife within the workplace and the employees are constantly reminded of getting fired if they fail to keep up with the stringent rules. Other two moderators, Michelle Bennetti and Melynda Johnson, described the place as “chaotic”. They recalled the site of the bathroom which always had period blood and feces all over the place, calling it a “sweatshop”. There have also been instances of deaths at the Tampa site, which managers are not allowed to disclose to the employees. One such example mentioned is of Keith Utley, who worked the overnight shift at Tampa and suffered a heart attack while at work. Utley died later that day, but the workers were told that “there had been an incident.'' The report also mentions an example of Shawn Speagle, a former content moderator at Cognizant who worked in the company for for six months. Speagle was told that he would have to help “businesses with Facebook marketing” as a part of his job, but was later put on “production floor” to review graphic violence and hate speech as his full time job. Speagle used to moderate over 100-200 such posts per day which included teenagers smashing an iguana on the street, people lighting fireworks in dogs’ mouth, people playing with fetuses of humans, and women encouraging toddlers to smoke marijuana, among others. Cognizant spokesperson, however, told The Verge, that they’re always “transparent about the work” that employees will perform. “I felt like I was trapped inside my own body. I couldn’t, for the life of me, get up from my desk, or I would be yelled at to stay in my desk”, mentions Speagle. But, Speagle is one of the many employees who go through such strenuous situations on a daily basis. In fact, the work culture is so toxic that if workers fall sick, they are granted five hours of personal leave that day. Missing work is not tolerated at Cognizant and it regularly fires employees for the same. It allots “occurrences” to employees which are essentially unapproved absences to contractors who have exhausted their “break time”. So, employees are forced to come to work sick where many of them occasionally vomit in trash cans around their desks. However, everything changes once Facebook visits the Tampa site, where the bathrooms are then cleaned up, and managers put on a “facade” of a healthy work environment. Moreover, Human Resources are also of no help since they either ignore employees’ complaints or take actions against them. Cognizant spokesperson mentioned, “we take allegations such as this very seriously. Cognizant strives to create a safe and empowering workplace”. However, Arun Chandra, VP Global Operations, Facebook, plans on changing the scenario and conditions for moderators. “We have to run a very large-scale platform. We have to take care of the community. And that means we have to get a whole lot of work done. But that is not at the expense of well-being,” added Chandra. He is also working on launching a new audit program later this year to promote healthier working environment. But till then, the Facebook moderators continue to fight, even if it’s at the cost of their lives. Cover Image: Dhawal Bhanushali / Mashable India TOPICS: Tech, Mark Zuckerberg, Technlogy, Mental Health, Content moderation, Facebook, Genesis by Mashable India, The Verge, tech news, Mental Illness, Mental Health Awareness Month, Web Content, Special Report, Facebook-ceo
cc/2019-30/en_head_0021.json.gz/line1731718
__label__wiki
0.917901
0.917901
Under Modi, India has shed its traditional defensiveness towards the Middle Easthttps://indianexpress.com/article/opinion/columns/narendra-modi-abu-dhabi-middle-east-lok-sabha-elections-5677322/ Under Modi, India has shed its traditional defensiveness towards the Middle East The key to Modi’s success in the Muslim neighbourhood has been the decision to focus on India’s national self-interest rather than religion. Written by C. Raja Mohan | Updated: April 16, 2019 9:02:52 am C. Raja Mohan is Director, Institute of South Asian Studies, National University of Singapore, and the consulting editor on foreign affairs for 'The Indian Express'. Before his association with The Indian Express began in 2004, Raja Mohan worked for The Hindu as its Washington correspondent and Strategic Affairs Editor. He was a distinguished fellow at the Observer Research Foundation, New Delhi. In his academic avatar, Raja Mohan has been professor of South Asian Studies at the Jawaharlal Nehru University, New Delhi, and the Nanyang Technological University, Singapore. As a think tanker, he worked at the Institute for Defence Studies and Analyses and Centre for Policy Research in New Delhi. He is on the editorial board of various international affairs journals and is affiliated with the Institute of South Asian Studies, Singapore; the Lowy Institute, Sydney; and the Carnegie Endowment for International Peace, Washington DC. He is the author, most recently, of Samudra Manthan: Sino-Indian Rivalry in the Indo-Pacific. From this author Raja Mandala: Maritime challenges and opportunities Raja Mandala: When countries moonwalk Delhi’s strategy for Indo-Pacific needs to recognise the importance of the continent Prime Minister Narendra Modi at an election rally. (PTI/File) Speculation continues about Prime Minister Narendra Modi’s travel plans to Abu Dhabi this weekend at the very peak of the election campaign. If he chooses to be present at the shilanyas ceremony for a temple in Abu Dhabi, Modi might also receive the Zayed Medal that the United Arab Emirates has awarded him recently. Whether he travels to Abu Dhabi or joins the temple ceremony by a video link, the event caps the transformation of India’s engagement with the Middle East. Under Modi, India has shed its traditional defensiveness towards the region. The Middle East, in turn, has responded with great enthusiasm to India’s new pragmatism. That brings us to a paradox. The significant expansion of India’s engagement with the Muslim neighbourhood comes at a time when religious nationalism has sharpened domestic political divisions. While the ruling party has been accused of fomenting Hindu majoritarianism, some of the more important diplomatic successes of the Modi government have been with Muslim countries. Within the Subcontinent, Afghanistan and Bangladesh see India as a valuable partner and their engagement with India has gained a strong foundation. Both Kabul and Dhaka have better relations with Delhi than with Islamabad. The Organisation of Islamic Cooperation invited India’s Minister for External Affairs, Sushma Swaraj to address a meeting of its foreign ministers in the face of Pakistan’s strong objections. India’s relations with Sunni Arab states like Saudi Arabia and the United Arab Emirates have never been better than today. At the same time, the last four years have seen progress in implementing strategic projects like the Chabahar port in Shia Iran. Modi has also brought out India’s longstanding partnership with Israel from behind the veil. There have been few objections from the Arab or Muslim world. One would think Pakistan would be the last government that wants welcome Modi’s return to power. But as Prime Minister Imran Khan put it, a strong government under Modi may be more credible interlocutor than a weak coalition government. While Manmohan Singh could not convince the Congress party of the wisdom of him travelling to Pakistan during his decade-long tenure as PM, Modi was prepared to show up in Lahore on a few hours notice at the end of 2015. That the relationship has gone nowhere is another story. But the pertinent point is the impression that Modi is confident enough to wage either war or peace. The key to Modi’s success in the Muslim neighbourhood has been the decision to focus on India’s national self-interest rather than religion. When he came to Delhi in 2014, Modi found the relations with Bangladesh at a difficult juncture. The Manmohan Singh government had negotiated the important agreement on resolving the land boundary dispute with Bangladesh in 2011. But the Congress could not get it ratified in the Parliament. To his credit, Modi persuaded the BJP units in Assam and Bengal to stop opposing the agreement and got it ratified by the Parliament. He was also quick to accept an award of the international tribunal on the maritime boundary dispute with Dhaka. It was certainly possible to quibble over the technical details of an award that went largely in favour of Bangladesh. Contrast this with Modi’s difficulties with Nepal, the world’s only Hindu nation that Modi likes to call “devabhumi” — the land of the gods. Yet, Modi’s tenure saw the tensions between the two countries spike. There is no doubt that most countries love to demonstrate solidarity with other states and peoples on the basis of shared political values, common religious faith or ethnic kinship. Yet, this empathy is more often than not discarded when a government has to choose between national interest and external solidarity. There is no better example than Pakistan’s muted voice on China’s current controversial treatment of the Muslim population in the Xinjiang province. For Islamabad, the logic of strategic partnership with Beijing is far more compelling than the declared commitment to take up Muslim causes around the world. In the Middle East, the fear of Iran’s expansionism and potential hegemony has driven Saudi Arabia and the UAE into political collaboration with the Jewish state of Israel. Much in the manner that communist ideology was not strong enough to bind Soviet Union and China in the 1960s and 1970s, religion has never been a sticky enough glue for Muslim majority nations. While the proposition that national interest trumps all else appears self-evident, it was not easy for Independent India to operate on that premise. The partition of the Subcontinent and Pakistan’s claim to speak in the name of Islam and its relentless efforts to mobilise the Islamic world in its favour on disputes with India complicated Indian diplomacy. It has been a rather long learning curve for Delhi to separate presumed transcendental religious solidarity and the logic of national self-interest in engaging the Middle East. Complicating the Pakistan factor outside has been Delhi’s concern about the reaction of its large Muslim population at home on foreign policy issues, especially those relating to the Middle East. The idea that India’s relationship with Israel or the United States matters more to the Indian Muslims than securing their rights as citizens has always been a political myth of Lutyens’ Delhi. In the end, what matters in foreign policy is not the colour of national ideology or the flag of its faith. Internal coherence and the capacity for practical give and take are the factors that count. Diversity, along multiple axes, has been India’s greatest structural vulnerability. Anything that deepens those faultlines will inevitably undermine, over the longer term, Delhi’s ability to effectively engage the world. This article first appeared in the print edition on April 16, 2019, under the title ‘Embracing the Islamic world’. The writer is Director, Institute of South Asian Studies, National University of Singapore and contributing editor on international affairs for The Indian Express. 1 Unlike 2014, the BJP isn’t setting the agenda this election. Congress has seized the initiative 2 On the Loose: Charm Offensive 3 View From The Neighbourhood: Crisis Zone
cc/2019-30/en_head_0021.json.gz/line1731719
__label__wiki
0.684662
0.684662
President Bush should resign, or be impeached, because of gross dereliction of duty. From factcheck.org: Over at least the past several budget cycles, the Corps has received substantially less money than it requested for the Lake Pontchartrain project, even though Congress restored much of the money the President cut from the amount the Corps requested. In fiscal year 2004, the Corps requested $11 million for the project. The President’s budget allocated $3 million, and Congress furnished $5.5 million. Similarly, in fiscal 2005 the Corps requested $22.5 million, which the President cut to $3.9 million in his budget. Congress increased that to $5.5 million. “This was insufficient to fund new construction contracts,” according to a U.S. Army Corps of Engineers’ project fact sheet. The Corps reported that “seven new contracts are being delayed due to lack funds” [sic]. The President proposed $3 million for the project in the budget for fiscal 2006, which begins Oct. 1. “This will be insufficient to fund new construction projects,” the fact sheet stated. It says the Corps “could spend $20 million if funds were provided.” The Corps of Engineers goes on to say: Army Corps of Engineers, May 23: In Orleans Parish, two major pump stations are threatened by hurricane storm surges. Major contracts need to be awarded to provide fronting protection for them. Also, several levees have settled and need to be raised to provide the design protection. The current funding shortfalls in fiscal year 2005 and fiscal year 2006 will prevent the Corps from addressing these pressing needs. The Hurricane really shows Bush's true colors. Who would have thought the levee would break? Well, FEMA, and the Army Corps of Engineers, and the scientific community. That's who. THE FREAKING DISCOVERY CHANNEL told me New Orleans couldn't take a direct hit from a major hurricane years ago. But Bush's tax cuts took the money away. The response is slow, and pathetic, and ridiculous. Bush also compares this to the worst kind of attack. The "MBA President" has had FOUR GODDAMN YEARS to get ready for exactly this kind of event. But it's only poor black people, so the Republicans will just let them die. Hurricane Katrina 2005 is George Bush's America 2005. If you have the means, you're on your own and you'll make it. If you don't have the means, die in the streets like a dog. That's the message, America. Anyone who voted for these people is an idiot, a fascist, or a fool. The President needs to be impeached. Now. http://aolsvc.news.aol.com/news/article.adp?id=20050824225609990001 But I thought there was "nothing real" about this? I guess Rush wasn't telling the truth. President Bush should resign, or be impeached, bec... The Hurricane really shows Bush's true colors. Wh... http://aolsvc.news.aol.com/news/article.adp?id=200...
cc/2019-30/en_head_0021.json.gz/line1731721
__label__wiki
0.638785
0.638785
The k2p blog just opinions Posts Tagged ‘ESA’ Update: ESA’s Schiaparelli destroyed by 300km/h impact ESA has now confirmed that pictures from NASA’s Mars Reconnaissance Orbiter now show that Schiaparelli was destroyed on impact. ESA: Schiaparelli entered the martian atmosphere at 14:42 GMT on 19 October for its 6-minute descent to the surface, but contact was lost shortly before expected touchdown. ….. ……. Estimates are that Schiaparelli dropped from a height of between 2 and 4 kilometres, therefore impacting at a considerable speed, greater than 300 km/h. The relatively large size of the feature would then arise from disturbed surface material. It is also possible that the lander exploded on impact, as its thruster propellant tanks were likely still full. These preliminary interpretations will be refined following further analysis. Reuters: Images taken by a NASA Mars orbiter indicate that a missing European space probe was destroyed on impact after plummeting to the surface of the Red Planet from a height of 2-4 km (1.2 to 2.5 miles), the European Space Agency said on Friday. The disc-shaped, 577-kg (1,272 lb) Schiaparelli probe, part of the Russian-European ExoMars program to search for evidence of life on Mars, descended on Wednesday to test technologies for a rover that scientists hope to send to the surface of the planet in 2020. But contact with the vehicle was lost around 50 seconds before the expected landing time, leaving its fate uncertain until the NASA images were received. “Schiaparelli reached the ground with a velocity that was much higher than it should have been, several hundred kilometers per hour, and was then unfortunately destroyed by the impact,” ExoMars Flight Director Michel Denis told Reuters TV. It was only the second European attempt to land a craft on Mars, after a failed mission by the British landing craft Beagle 2 in 2003. The U.S. space agency’s Mars Reconnaissance Orbiter, which has been circling the planet for about 10 years, took low-resolution pictures that show a bright spot that ESA believes is the 12-metre parachute that Schiaparelli used to slow down. They also show a fuzzy dark patch, around 15 by 40 meters in size, about 1 km north of the parachute, which scientists interpret as having been created by the impact of the lander following a longer-than-planned free fall. The ESA/NASA plan to put a rover on Mars by 2021 (ExoMars Rover) is likely to be delayed considerably. NASA is also looking at another project to launch in 2020 and land a rover on Mars perhaps in 2022. The Indian/Russian plan with Chandrayan 2 to put a lunar rover onto the moon is still on the cards for 2019. Tags:ESA, Mars lander, Schiaparelli Posted in Space, Technology | Comments Off on Update: ESA’s Schiaparelli destroyed by 300km/h impact Second European Mars lander (Schiaparelli) also lost (after Beagle 2 in 2003) While the ExoMars Trace Gas Orbiter by the European/Russian space agencies (ESA/Roscosmos) seems to have successfully entered the correct orbit around Mars, ESA’s Mars lander, Schiaparelli seems to have been lost on its way down to the surface. schiaparelli-descent image-esa BBC: There are growing fears a European probe that attempted to land on Mars on Wednesday has been lost. Tracking of the Schiaparelli robot’s radio signals was dropped less than a minute before it was expected to touch down on the Red Planet’s surface. Satellites at Mars have attempted to shed light on the probe’s status, so far without success. One American satellite even called out to Schiaparelli to try to get it to respond. The fear will be that the robot has crashed and been destroyed. The European Space Agency, however, is a long way from formally calling that outcome. Its engineers will be running through “fault trees” seeking to figure out why communication was lost and what they can do next to retrieve the situation. This approach could well last several days. One key insight will come from Schiaparelli’s “mothership” – the Trace Gas Orbiter (TGO). As Schiaparelli was heading down to the surface, the TGO was putting itself in a parking ellipse around Mars. But it was also receiving telemetry from the descending robot. If the lander is indeed lost, it will be the second failure of a European Mars lander after the failure of Beagle 2 in 2003. Beagle 2 was a British landing spacecraft that formed part of the European Space Agency’s 2003 Mars Express mission. The craft lost contact with Earth during its final descent and its fate was unknown for over twelve years. Beagle 2 is named after HMS Beagle, the ship used by Charles Darwin. The spacecraft was successfully deployed from the Mars Express on 19 December 2003 and was scheduled to land on the surface of Mars on 25 December; however, no contact was received at the expected time of landing on Mars, with the ESA declaring the mission lost in February 2004, after numerous attempts to contact the spacecraft were made. Beagle 2‘s fate remained a mystery until January 2015, when it was located intact on the surface of Mars in a series of images from NASA’s Mars Reconnaissance Orbiter HiRISE camera. The images suggest that two of the spacecraft’s four solar panels failed to deploy, blocking the spacecraft’s communications antenna. The ESA’s plans and budget for landing a six-wheeled roving vehicle on Mars in 2021 will face further critical scrutiny. The rover is expected “to use some of the same technology as Schiaparelli, including its doppler radar to sense the distance to the surface on descent, and its guidance, navigation and control algorithms”. ESA has an annual budget of about €5.25 billion. Of course the EU sees the ESA as a matter of prestige first (and science, only second) which does help to protect the budget. Perhaps some “frugal engineering” (a la ISRO) is called for. Tags:Beagle 2, ESA, Mars lander, Schiaparelli Posted in Europe, Science, Space, Technology | Comments Off on Second European Mars lander (Schiaparelli) also lost (after Beagle 2 in 2003) Rosetta finds its new stone The Original Rosetta Stone – BBC The new stone is a comet identified as 67P/Churyumov-Gerasimenko It was first observed in 1969 and named after its Russian discoverers The comet is in an elliptical 6.45-year orbit that takes it from beyond Jupiter at its furthest point, to between the orbits of Mars and Earth at its closest to the Sun. It is approximately 3.5 x 4 km in size, has a rotational period of 12.7 hours and a mass of 3.14±0.21×1012 kg The surface temperature appears to be around -70ºC, which is warmer than expected It is currently about 405 million km from earth (about 22.5 light-minutes) and moving at 55,000 km/hr The European Space Agency’s Rosetta craft has now arrived at 67P/Churyumov-Gerasimenko after a 10 year, 6.4 billion km long journey and has entered orbit around its new stone Rosetta is a cornerstone mission to chase, go into orbit around, and land on a comet. It will study the Jupiter-family comet 67P/Churyumov-Gerasimenko with a combination of remote sensing and in situ measurements. The spacecraft will orbit the comet and release the Philae lander, which carries a suite of instruments for imaging and sampling the comet nucleus. The mission will track the comet through perihelion, examining its behaviour before, during and after. Rosetta Trajectories by Christian Simoes astronoo.com The spacecraft was launched from Kourou aboard an Ariane 5G+ on 2 March 2004. It required four gravity assists for its journey, one by Mars and three by Earth. Rosetta had already flown by the asteroids 2867 Steins (in 2008) and 21 Lutetia (in 2010), before entering deep space hibernation in June 2011. Rosetta’s main goals will be reached in 2014. Following a planned exit from hibernation on 20 January, the spacecraft’s instruments were checked as it continued on its journey to 67P/Churyumov-Gerasimenko. The spacecraft arrives at the comet in August 2014, and deploys the lander in November 2014. Comet 67P-CG on 3rd August 2014 ESA Rosetta is just 100 km from the comet’s surface, but it will edge closer still. Over the next six weeks, it will describe two triangular-shaped trajectories in front of the comet, first at a distance of 100 km and then at 50 km. At the same time, more of the suite of instruments will provide a detailed scientific study of the comet, scrutinising the surface for a target site for the Philae lander. Tags:67P/Churyumov-Gerasimenko, Comet 67P-CG, ESA, Philae lander, Rosetta Posted in Space | Comments Off on Rosetta finds its new stone Rosetta awakes The European Space Agency is – justifiably – feeling pleased with itself: Rosetta wake-up signal It was a fairy-tale ending to a tense chapter in the story of the Rosetta space mission this evening as ESA heard from its distant spacecraft for the first time in 31 months. Rosetta is chasing down Comet 67P/Churyumov-Gerasimenko, where it will become the first space mission to rendezvous with a comet, the first to attempt a landing on a comet’s surface, and the first to follow a comet as it swings around the Sun. Since its launch in 2004, Rosetta has made three flybys of Earth and one of Mars to help it on course to its rendezvous with 67P/Churyumov-Gerasimenko, encountering asteroids Steins and Lutetia along the way. Operating on solar energy alone, Rosetta was placed into a deep space slumber in June 2011 as it cruised out to a distance of nearly 800 million km from the warmth of the Sun, beyond the orbit of Jupiter. Now, as Rosetta’s orbit has brought it back to within ‘only’ 673 million km from the Sun, there is enough solar energy to power the spacecraft fully again. Thus today, still about 9 million km from the comet, Rosetta’s pre-programmed internal ‘alarm clock’ woke up the spacecraft. After warming up its key navigation instruments, coming out of a stabilising spin, and aiming its main radio antenna at Earth, Rosetta sent a signal to let mission operators know it had survived the most distant part of its journey. The signal was received by both NASA’s Goldstone and Canberra ground stations at 18:18 GMT/ 19:18 CET, during the first window of opportunity the spacecraft had to communicate with Earth. It was immediately confirmed in ESA’s space operations centre in Darmstadt and the successful wake-up announced via the @ESA_Rosetta twitter account, which tweeted: “Hello, World!” Tags:comet, Comet chaser, comet Churyumov-Gerasimenko, ESA, Rosetta Posted in Engineering, Europe, Space, Technology | Comments Off on Rosetta awakes Rosetta will be woken up Monday at 1000GMT after a two-and-a-half year sleep The European Space Agency will try and wake-up its sleeping Rosetta spacecraft on Monday at 1000 GMT. The spacecraft entered deep space hibernation in June 2011 when it was too far away from the sun to capture much solar energy. If this works it will be a considerable achievement considering that Rosetta was launched 10 years ago and the communications technology on board is effectively at least two “generations” old! Rosetta trajectory till June 2011 At 10:00 GMT on Monday, the most important alarm clock in the Solar System will wake up ESA’s sleeping Rosetta spacecraft. Rosetta is chasing comet 67P/Churyumov–Gerasimenko and, since its launch in 2004, has made three flybys of Earth and one of Mars to build up enough speed and get on a trajectory towards the comet. It has also encountered asteroids Steins and Lutetia along the way. Operating on solar energy alone, the spacecraft was placed into a deep space slumber in mid-2011 as it cruised far from the Sun and out towards the orbit of Jupiter. To prepare for its long sleep, Rosetta was oriented so that its solar arrays faced the Sun and put into a once per minute spin for stability. The only devices left running were its computer and several heaters. Thirty-one months later, Rosetta’s orbit has brought it back to within ‘only’ 673 million kilometres of the Sun, and there is finally enough solar energy to power the spacecraft fully again. It is time to wake up. Rosetta’s computer is programmed to carry out a sequence of events to re-establish contact with Earth on 20 January, starting with an ‘alarm clock’ at 10:00 GMT. Immediately after, the spacecraft’s startrackers will begin to warm up, taking around six hours. Then its thrusters will fire to stop the slow rotation. A slight adjustment will be made to Rosetta’s orientation to ensure that the solar arrays are still facing directly towards the Sun, before the startrackers are switched on to determine the spacecraft’s attitude. Once that has been established, Rosetta will turn directly towards Earth, switch on its transmitter and point its high-gain antenna to send its signal to announce that it is awake. Because of Rosetta’s vast distance – just over 807 million kilometres from Earth – it will take 45 minutes for the signal to reach the ground stations. The first opportunity for receiving a signal on Earth is expected between 17:30 GMT and 18:30 GMT. Rosetta Mission (ESA via BBC) Tags:ESA, European Space Agency, Rosetta Posted in Engineering, Europe, Space, Technology | Comments Off on Rosetta will be woken up Monday at 1000GMT after a two-and-a-half year sleep Archives Select Month June 2019 (4) May 2019 (6) April 2019 (16) March 2019 (15) February 2019 (11) January 2019 (12) December 2018 (12) November 2018 (2) October 2018 (12) September 2018 (5) August 2018 (11) July 2018 (9) June 2018 (11) May 2018 (6) April 2018 (19) March 2018 (10) February 2018 (5) January 2018 (5) December 2017 (13) November 2017 (7) October 2017 (9) September 2017 (8) August 2017 (13) July 2017 (9) June 2017 (15) May 2017 (7) April 2017 (17) March 2017 (16) February 2017 (17) January 2017 (32) December 2016 (36) November 2016 (25) October 2016 (34) September 2016 (26) August 2016 (27) July 2016 (33) June 2016 (42) May 2016 (30) April 2016 (35) March 2016 (32) February 2016 (17) January 2016 (37) December 2015 (38) November 2015 (49) October 2015 (50) September 2015 (44) August 2015 (47) July 2015 (52) June 2015 (47) May 2015 (59) April 2015 (29) March 2015 (56) February 2015 (22) January 2015 (29) December 2014 (57) November 2014 (40) October 2014 (70) September 2014 (46) August 2014 (52) July 2014 (27) June 2014 (53) May 2014 (44) April 2014 (18) March 2014 (75) February 2014 (40) January 2014 (79) December 2013 (36) November 2013 (61) October 2013 (101) September 2013 (72) August 2013 (84) July 2013 (55) June 2013 (62) May 2013 (32) April 2013 (58) March 2013 (58) February 2013 (26) January 2013 (53) December 2012 (45) November 2012 (45) October 2012 (22) September 2012 (31) August 2012 (14) July 2012 (16) June 2012 (20) May 2012 (21) April 2012 (24) March 2012 (31) February 2012 (28) January 2012 (13) December 2011 (14) November 2011 (44) October 2011 (67) September 2011 (41) August 2011 (72) July 2011 (46) June 2011 (32) May 2011 (32) April 2011 (25) March 2011 (81) February 2011 (95) January 2011 (95) December 2010 (54) November 2010 (155) October 2010 (111) September 2010 (87) August 2010 (44) July 2010 (21) June 2010 (34) May 2010 (2) April 2010 (12) Posts by category Select Category 1st World War (3) 2nd World War (6) Academic misconduct (141) Advocacy (5) Afghanistan (7) Africa (3) Ageing (6) Aging (20) Agriculture (15) Air pollution (8) Alarmism (541) Amazon (1) Animals (26) Antarctic (30) Anthropology (63) Archeology (29) Architecture (3) Arctic (14) Argentina (3) Art (36) Astronomy (41) Australia (65) Automobiles (36) Aviation (199) Bahrain (1) Behaviour (1,236) Belarus (1) Belgium (2) Biodiversity (37) Biology (25) Biometrics (4) Biotechnology (5) Blogs (1) Bolivia (1) Brain (5) Brazil (14) Breaking (1) Bureaucracy (8) Burma (1) Business (275) Canada (7) Cartography (10) Castle (1) Censorship (3) Chemistry (19) Chile (1) China (77) Climate (452) Clouds (15) Coal (19) Communication (9) Conservation (15) Corruption (97) Cricket (11) Currency (5) Czech Republic (4) Defense (31) Demographics (71) Denmark (12) Design (5) Development (81) Diplomacy (4) Disease (4) Economics (51) Economy (109) Education (50) Egypt (5) Election fraud (3) Electronics (4) Emissions (6) Energy (225) Engineering (195) England (1) Entomology (1) Environment (198) Ethics (295) Europe (68) European Union (129) Evolution (157) Extremism (8) Festivals (2) Food (30) Football (37) France (26) Fraud (69) Future History (1) Future Transport (5) Gas (51) Genetics (32) Geoengineering (2) Geopolitics (1) Geosciences (60) Germany (77) Global economy (5) Great Lakes (3) Greece (20) Health (1) History (72) Holland (5) Humans (48) Hungary (1) Ice Cover (4) Iceland (12) Identification (3) India (269) Indonesia (20) Innovation (7) Intelligence (6) International Trade (22) Investing (10) Iran (19) Iraq (12) Ireland (3) Israel (21) Italy (17) Japan (75) Justice (1) Korea (1) Language (77) Law (11) Libya (25) Life (2) Literature (15) London (1) Lunar science (13) Malaysia (8) Management (41) Materials (12) Mathematics (45) Media (177) Medicine (150) Memory (5) Metrology (1) Middle East (44) Miscellaneous (3) Misconduct (3) Music (4) Natural Disasters (108) Natural Phenomena (68) Nepal (3) New Zealand (8) Nobel Prize (18) Non-Science (15) North Africa (6) North Korea (1) Norway (33) Noted in Passing (17) Nuclear Power (39) Oceans (19) Oil (47) Oil price (24) Pakistan (6) Peer review (10) Pharmaceuticals (3) Philippines (2) Philosophy (121) Physics (85) Piracy (3) Poland (1) Politics (616) Portugal (2) psychiatry (3) psychology (37) Publishing (1) Recipies (1) Religion (79) Religious misconduct (7) Renewable Energy (47) Research (3) Russia (74) Saudi Arabia (22) Scandinavia (6) Science (479) Scientific Fraud (58) scientific misconduct (147) Security (1) Ships (7) Siberia (1) Singapore (7) Social media (1) Social Science (24) Solar science (77) South Africa (4) Southern Hemisphere (5) Space (110) Spain (1) Sport (59) Subsidies (1) Sweden (224) Syria (36) Technology (242) Thailand (1) Time (5) Transport (2) Travel (16) Trees (2) Trivia (324) Turkey (17) UK (127) Ukraine (7) UN (53) Uncategorized (58) Universities (2) Urban Living (14) US (257) Vietnam (2) Vikings (2) Volcanoes (7) Volcanos (33) War (2) Water (6) Weather (138) Wildlife (91) Wind power (16) Winter (32) World Cup (27) World Wide Web (1) Landscheidt Info Pillai Books Retraction Watch The changing colours of the world's population "Top 11 examples" of US academic dishonesty It's coming, but don't invest just yet in mining Helium-3 on the moon Social class is necessary for any society and does not have to be unjust There is a cognitive limit (the Wordsmith number) to the number of words you can know? Mammoth tusks are -- mammoth! Honda takes to the air Revisiting Heyerdahl's Kon-Tiki 50 years on Physics came first and then came chemistry and later biology Sherpas are genetically more efficient at using Oxygen Change and its Management Essence of a Manager – Contents, Quotes, Comments and Reviews Follow The k2p blog on WordPress.com The ktwop blog Academic misconduct Alarmism Aviation Behaviour Business Climate Corruption Economy Energy Engineering Environment Ethics European Union Evolution India Media Medicine Natural Disasters Philosophy Politics Science scientific misconduct Space Sweden Technology Trivia UK US Weather Wildlife
cc/2019-30/en_head_0021.json.gz/line1731730
__label__wiki
0.843586
0.843586
Witold Pilecki was a soldier of the Second Polish Republic, the founder of the Secret Polish Army Polish resistance group, and a member of the Home Army. He is now recognized as the only known person to volunteer to be imprisoned at the Auschwitz concentration camp during World War II. Pilecki was born on May 13, 1901 in Karelia, Russia where his family had been forcibly resettled by Tsarist Russian authorities after the suppression of Poland's January Uprising of 1863-1864. In 1910, Pilecki moved with his family to Wilno (now Vilnius, Lithuania) where he joined the secret ZHP Scouts organization. In 1918, during World War I, Pilecki joined Polish self-defense units in the Wilno area with which he helped collect weapons and disarm retreating German troops in what became the prelude to the Vilna offensive. During the Polish-Soviet War of 1919-1920, Pilecki commanded a ZHP Scout section that was overrun by the Bolsheviks. He later joined the regular Polish Army and fought in the Polish retreat from Kiev. On August 5, 1920, Pilecki joined the 211th Uhlan Regiment and fought in the Battle of Warsaw and at Rudniki Forest and took part in the liberation of Wilno. During World War II, Pilecki smuggled himself into Auschwitz under the false name Tomasz Serafinski in 1940 and began recruiting members for an underground resistance group that he organized into a coherent movement. He began sending information about what was going on inside the camp and confirming that the Nazis were seeking the extermination of the Jews to Britain and the United States as early as 1941. Pilecki used a courier system that the Polish Resistance operated throughout occupied Europe to channel the reports to the Allies. Documents released from the Polish Archives that provided details of these reports again raised questions as to why the Allies, particularly Winston Churchill, never did anything to put an end to the atrocities being committed that they learned of so early in the war. By 1942, Pilecki's resistance group had learned of the existence of the gas chambers and began work on several plans to liberate Auschwitz, including one in which the RAF would bomb the walls or Free Polish paratroopers would fly in from Britain. In 1943, when Pilecki realized that the Allies did not have plans to liberate the camp, he escaped with two other prisoners after he voluntarily spent 2½ years at the camp smuggling out its darkest secrets to the Allies. The documents released from the Polish Archives also included a Gestapo manhunt alert following Pilecki's escape. In 1944, Pilecki was captured while fighting in the Warsaw Uprising in 1944 and spent the rest of the war in a prisoner-of-war camp. He joined the Free Polish troops in Italy in July of 1945 and agreed to return to Poland and gather intelligence on its takeover by the Soviets. Pilecki was caught by the Polish Communist regime, tortured, interrogated on his espionage, and executed following a trial at which he was given three death sentences. Pilecki was executed on May 25, 1948 at Warsaw's Mokotow Prison. The details of Pilecki's bravery could not truly emerge until after the collapse of Communism in 1989. He received posthumously the Order of Polonia Restituta in 1995 and the Order of the White Eagle, the highest Polish decoration in 2006. Michael Schudrich, the Chief Rabbi of Poland, said that Pilecki was “an example of inexplicable goodness at a time of inexplicable evil. There is ever-growing awareness of Poles helping Jews in the Holocaust, and how they paid with their lives, like Pilecki. We must honor these examples and follow them today in the parts of the world where there are horrors again.” Sources: Times Newspapers Ltd; Wikipedia
cc/2019-30/en_head_0021.json.gz/line1731732
__label__cc
0.551202
0.448798
Associate Dean, Development and Alumni Relations Founded in 1943 and a Johns Hopkins division since 1950, The Paul H. Nitze School of Advanced International Studies of the Johns Hopkins University (SAIS) has been educating global leaders for almost 75 years. The development team at SAIS is involved in exciting milestones for the school. In advance of the school celebrating its 75th anniversary, we are hosting a yearlong series of events around the world that began in the fall of 2018. Programming touches on issues of great importance in today's complex global world such as US – China relations, American foreign policy, humanitarian crisis and global security, women's leadership, and renewable energy. The yearlong celebration culminates with a special 75th Anniversary Shape the World Weekend taking place in Washington, DC October 24th – 26th. In addition, Johns Hopkins University will be relocating its Washington, D.C.-based graduate programs to a new, high-visibility home in the heart of the nation's capital. The university has reached an agreement, subject to regulatory approvals, to purchase the iconic building that currently houses the Newseum. Johns Hopkins plans to transform the building into a modern, world-class interdisciplinary academic facility anchored by JHU's School of Advanced International Studies and optimized for learning, creativity, community events, and the exchange of ideas. As a highly selective graduate institution with a distinguished faculty, SAIS consistently ranks as one of the top schools of international relations in the world. SAIS was founded to provide a practical approach to training students in international leadership and foreign relations, and to provide mid­career educational opportunities for those already working in related fields. Today, SAIS offers the M.A., M.I.P.P., M.I.E.F, M.A.G.P, and Ph.D. degrees and enrolls 600 full­time students in Washington, DC, primarily in the school's two­year Master of Arts program. Approximately 30 percent of the students are non­ citizens coming from more than 70 countries. About 190 students attend the SAIS Europe in Bologna, Italy while about 200 students attend the Hopkins­ Nanjing Center in China. The Associate Dean for Development will provide strategic leadership to the comprehensive and complex Development and Alumni Relations programs of SAIS. This position is responsible for the development and implementation of all fundraising strategies/activities to carry forward the mission and vision of this diverse academic population. Responsible for planning/conducting all aspects of private sector fundraising, including orchestration of major fundraising campaigns and other related programmatic activity involving major and principal gifts, alumni affairs, corporate and foundation relations and numerous special development events. The Associate Dean works very closely with the Dean of SAIS, who is completely engaged in advancing the School's relationships with shareholders and donors, and in cooperation with the University's Office of Development and Alumni Relations. This position reports to the Dean of SAIS and the JHU Associate Vice President for Development and Alumni Relations. The primary responsibilities for this position include: 1. Lead the evaluation, cultivation, solicitation and stewardship of significant prospects and donors. Develop and execute effective strategies as required to obtain and maintain private sector funding support for the School's priorities, working closely with the Dean and other key University leadership. ($20 million + annually). 2. Provide overall strategic leadership for the SAIS Dean's fundraising priorities, overall development operation, alumni relations and publications, activities and staff functions. 3. Work closely with all SAIS Deans to develop private support and priorities for the School. 4.Build the SAIS portfolio of seven and eight figure individual, corporate and foundation prospects. Maintain a prospect portfolio of 50, primarily individuals. 5. Serve on the management team of SAIS and assume other responsibilities as directed and encouraged by the Dean. 6. Work closely with departments and faculty to interpret their funding needs and increase their participation in the development process. 7. Develop outreach to our global alumni and friend community with emphasis on developing international donors. 8. Working in partnership with the Directors of Development for SAIS DC, the Hopkins Nanjing Center and the Bologna Center, direct staff of professional fundraisers in annual work planning and goal setting; evaluate progress accordingly. 9. Plan, manage and/or oversee all School Alumni Relations activities. Develop and implement an outreach strategy to interest, engage and involve alumni in supporting SAIS. 10. Work closely with the Dean in support of the School's Advisory Board and other volunteers. Coordinate School activities with volunteers, advisory council members and trustees and University leadership. 11. Oversee all departmental services such as gift processing, annual giving stewardship, reporting, prospect tracking and donor research. 12. Serve on the management team of the University's development organization, participate in the financial planning for the School and oversee the total budget for development and alumni relations accordingly. 13. Coordinate development activities, alumni relations' activities, and all campaign related activities with University administration and the Development and Alumni Relations Office. 14. Manage a team of 19 staff (including six Major Gift Officers). Bachelor's degree required. Special skills and knowledge required for this position include: Experience in higher education strongly preferred. Should be able to establish objectives; set performance standards; organize and motivate staff to achieve fundraising and alumni relations goals Have a strong track record of successfully closing major­ and principal­level gifts; Experience in the engagement in academic and strategic planning at all levels of the organization. Advanced degree preferred. The ideal candidate will have seven plus years of progressively responsible fundraising experience; be able to understand and articulate academic values/goals; and work collaboratively with academic leadership, students, alumni, and volunteer leadership. NOTE: The successful candidate(s) for this position will be subject to a pre­ employment background check. Internal Number: 14977-en_US About Johns Hopkins University Johns Hopkins University remains committed to its founding principle, that education for all students should be grounded in exploration and discovery. Hopkins students are challenged not just to learn but also to advance learning itself. Critical thinking, problem solving, creativity, and entrepreneurship are all encouraged and nourished in this unique educational environment. After more than 130 years, Johns Hopkins remains a world leader in both teaching and research. Faculty members and their research colleagues at the university's Applied Physics Laboratory have each year since 1979 won Johns Hopkins more federal research and development funding than any other university. The university has nine academic divisions and campuses throughout the Baltimore-Washington area. The Krieger School of Arts and Sciences, the Whiting School of Engineering, the School of Education and the Carey Business School are based at the Homewood campus in northern Baltimore. The schools of Medicine, Public Health, and Nursing share a campus in east Baltimore with The Johns Hopkins Hospital. The Peabody Institute, a leading professional school of music, is located on Mount Vernon Place in downtown Bal...timore. The Paul H. Nitze School of Advanced International Studies is located in Washington's Dupont Circle area. Assistant Director of Annual Giving, Phonathon and Student Philanthropy Portland, Oregon Lewis & Clark College 2 Weeks Ago Designer (Revit Specialist) Ithaca, New York Cornell University 3 Weeks Ago Director of Advancement Pacific Palisades, California St. Matthew's Parish School 1 Month Ago
cc/2019-30/en_head_0021.json.gz/line1731734
__label__cc
0.537328
0.462672
Tag Archives: Christopher Hitchens A Secular Scientist’s Argument against the New Atheists Posted by jrbenjamin in Religion, Science ≈ Comments Off on A Secular Scientist’s Argument against the New Atheists Astronomy, Atheism, Christian, Christianity, Christopher Hitchens, David Berlinski, debate, Faith, Gerard Manley Hopkins, interview, Judaism, M Theory, Naturalism, physics, reason, religion, Richard Dawkins, science, Secularism, Skepticism, Stephen Hawking Moderator: Dr. Berlisnki, you’re not a Christian, and indeed, you’re not religious as I understand it. Why do you argue for a Judeo-Christian influence in society? David Berlisnki: I presume you are not asking me in the hopes of a personal declaration. And I won’t say that this secular Jew has a remarkable degree of authority when it comes to these moral events: after all, I have lived my own life under the impress of having a good time, all the time. On the other hand, it doesn’t hurt to hear these words from someone such as myself, because at least you are hearing them from someone with no conceivable bias in their favor. In its largest aspect, Western science is of course an outgrowth of Judeo-Christian tradition, especially to the extent, perhaps only to the extent, that it is committed to the principle that the manifest universe contains a latent structure that can be discovered by the intellect of man. I think this is true. I don’t think this is very far from Gerard Manley Hopkins’ declaration that, ‘the world is charged with the grandeur of God.’ […] You know, Stephen Hawking just published a book, one explaining, again, how everything began — why it’s there, why we shouldn’t worry about God, et cetera. And to paraphrase the claim that he now makes: having given up on “A” through “L”, he now champions something called “M-theory” to explain how the universe popped into existence. I respect Hawking as a reputable physicist. But I can tell you this: What is lamentably lacking in every one of these discussions is that coruscating spirit of skepticism which a Christopher Hitchens or a Richard Dawkins would bring to religious claims, and then lapses absurdly when it comes to naturalistic and scientific claims about the cosmos. Surely, we should have the sophistication to wonder at any asseveration of the form that the universe just blasted itself into existence following the laws of M-theory — a theory no one can understand, whose mathematical formulism hasn’t been completed, which has never once been tested in any laboratory on the face of the earth… Finally, the fact that the earth, our home, is a small part of the physical universe does not mean it is not the center of the universe. That is a non sequitur. After all, no one would argue, least of all Mr. Hitchens, that the doctrine that home is where the heart lies is rendered false by distance. We should be very careful about making these claims. I agree that the universe is very big; there are lots of galaxies and amazing things. And there is certainly some biological continuity between humans and the animals that came before us. But as for the central religious claim that this particular place is blessed and important, that’s different. No doctrine about physical size rebuts it… And as to why should a secular Jew open his mouth to questions pertaining to the Christian religion? It’s a big tent. I’m presuming I would be welcomed. An excerpt from Berlinski’s 2010 debate with Christopher Hitchens. Berlinski’s erudition reaches almost comical heights in this debate, which is, in my opinion, one of the more compelling Hitch ever did. I like the whole thing, but you can watch the pulled section below. Continue onward: C.S. Lewis: how to spot a truly humble person “For me, it’s a part of being human”: Updike justifies his Christianity A slight change of pace: Hitchens reflects and his mother That Time Margaret Thatcher Spanked Christopher Hitchens Posted by jrbenjamin in Biography, Politics ≈ Comments Off on That Time Margaret Thatcher Spanked Christopher Hitchens Biography, British Parliament, British politics, Carly Fiorina, Charisma, Christopher Hitchens, Donald Trump, François Mitterrand, Government, Hitch-22, Kingsley Amis, Martin Amis, memoir, New Statesman, Philip Larkin, politics, sex, The New York Times, The War Against Cliché “I had written a longish article for The New York Times Magazine, saying in effect that, if Labour could not revolutionize British society, then the task might well fall to the right. I had also written a shorter piece for the New Statesman, reporting from the Conservative Party conference and saying in passing that I thought Mrs. Thatcher was surprisingly sexy. (To this day, I have never had so much anger mail, saying, in effect, ‘How could you?’) I felt immune to Mrs. Thatcher in most other ways, since for all her glib ‘free market’ advocacy on one front she seemed to be an emotional ally of the authoritarian and protectionist white-settler regime in Rhodesia. And it was this very thing that afforded me the opportunity to grapple with her so early in her career… Almost as soon as we shook hands on immediate introduction, I felt that she knew my name and had perhaps connected it to the socialist weekly that had recently called her rather sexy. While she struggled adorably with this moment of pretty confusion, I felt obliged to seek controversy and picked a fight with her on a detail of Rhodesia/Zimbabwe policy. She took me up on it. I was (as it happened) right on the small point of fact, and she was wrong. But she maintained her wrongness with such adamantine strength that I eventually conceded the point and even bowed slightly to emphasize my acknowledgment. ‘No,’ she said. ‘Bow lower!’ Smiling agreeably, I bent forward a bit farther. ‘No, no,’ she trilled. ‘Much lower!’ By this time, a little group of interested bystanders was gathering. I again bent forward, this time much more self-consciously. Stepping around behind me, she unmasked her batteries and smote me on the rear with the parliamentary order paper that she had been rolling into a cylinder behind her back. I regained the vertical with some awkwardness. As she walked away, she looked over her shoulder and gave an almost imperceptibly slight roll of the hip while mouthing the words ‘Naughty boy!’ I had and have eyewitnesses to this. At the time, though, I hardly believed it myself. It is only from a later perspective, looking back on the manner in which she slaughtered and cowed all the former male leadership of her party and replaced them with pliant tools, that I appreciate the premonitory glimpse—of what someone in another context once called ‘the smack of firm government’—that I had been afforded. Even at the time, as I left that party, I knew I had met someone rather impressive. And the worst of ‘Thatcherism,’ as I was beginning by degrees to discover, was the rodent slowly stirring in my viscera: the uneasy but unbanishable feeling that on some essential matters she might be right.” A segment from Christopher Hitchens’s memoir Hitch-22. I thought of this encounter during the recent GOP debate in which Carly Fiorina dispensed one by one with her male counterparts, spurring even The Donald to bow in submission (a first for him, no doubt). That their particular clash came on the heels of Trump’s terrible comment about “that face” only doubled the association to Thatcher, whose looks, despite what Austin Powers may’ve thought, had more than a few fans on the left and right. (I’ve heard similar compliments about Carly, confirmed just a few days ago by a female journalist friend who interviewed her last week.) It was Thatcher who once mused, in a poached version of a famous labor union saying, that, “being powerful is like being ladylike — if you have to say you are, you probably aren’t.” The same goes for other adjectives, like smart, classy, rich, and many of Trump’s other favorite words which he likes to apply to himself. Yet it’s precisely this do-don’t-tell orientation which makes a female politician like Thatcher so potent. What you think you see ain’t necessarily what you’ll get. As Mitterand said, “she had the eyes of Caligula and mouth of Marilyn Monroe.” If you’re at all familiar with Hitch’s work, you’ll know this type of fixation on and flirtation with women were central to his persona. His best pal, Martin Amis, along with Amis’s father Kingsley and several other Englishmen of those generations, had a lot to say about Mrs. Thatcher — most of which didn’t have to do with her stance on Rhodesia. Martin uses the above interaction as a basis to analyze Thatcher’s appeal to the English male psyche. In an excerpt pulled from his essay collection The War Against Cliché, he writes: I once discussed Mrs Thatcher’s feminine qualities with Christopher Hitchens who had recently spent some time in her company. This was his verdict: ‘Oh, she stinks of sex.’ And this is my father, Kingsley Amis, in his Memoirs: her beauty, he writes, is ‘so extreme that… it can trap me for a split second into thinking I am looking at a science-fiction illustration of some time ago showing the beautiful girl who has become President of the Solar Federation in the year 2200. The fact that that is not a sensual or sexy beauty does not make it a less sexual beauty, and that sexuality is still, I think, an underrated factor in her appeal (or repellence).’ Helplessley I reach for the commonplace about the glamour of power. I could further infuriate my father’s shade by adducing another cliché: English nostalgia for chastisement. Philip Larkin shared his friend’s enthusiasm for the Prime Minister (‘I adore Mrs Thatcher’). Larkin was a great poet… he once asked Mrs Thatcher, who had professed herself a fan, to quote a line of his. She blinked and said, ‘All the unhurried day/ Your mind lay open like a drawer of knives.’ I like that she could quote Larkin. Counts for a lot in my book. What would my Larkin nomination be? I’m glad you asked. “The trees are coming into leaf/ Like something almost being said.” By the way, is his repetition of “saying, in effect…” in the first paragraph a rare Hitchens misstep? Watch him relay the encounter below. You can also move on: More English diffidence: Charles Darwin makes a spreadsheet to help him decide whether to marry Kingley’s moving final tribute to Philip A reflection on philosophical contradictions, which makes up my favorite extended section from Hitch-22 How Christopher Hitchens Became an American Citizen (Or, a Case Study in the Need for Immigration Reform) ≈ Comments Off on How Christopher Hitchens Became an American Citizen (Or, a Case Study in the Need for Immigration Reform) America, American History, Christopher Hitchens, David Frum, Department of Homeland Security, Emancipation Proclamation, Hitch-22, Ian McEwan, Immigration, Michael Chertoff, Thirteenth Amendment “The American bureaucracy very swiftly overcompensates for any bright-eyed immigrant delusions. Nihil humanum a me alienum puto, said the Roman poet Terence: ‘Nothing human is alien to me.’ The slogan of the old Immigration and Naturalization Service could have been the reverse: To us, no aliens are human. When folded — along with the Bureau of Alcohol, Firearms, and Tobacco, the only department of state I had ever hoped to command — into the vast inner space of the Department of Homeland Security, the resulting super-ministry was more like the Circumlocution Office than a reformed bureaucracy. My Canadian friend David Frum, who was actually working in the White House and had had a hand in writing the famous ‘axis of evil’ speech, had his personal paperwork lost when he applied to become an American. Ian McEwan was put under close arrest and hit with an indelible ‘entry denied’ stamp while trying to cross from Vancouver to Seattle for a big public reading: it would have been of little use to him to plead that the First Lady had recently asked him to dinner… Innumerable times I was told, or assured without asking, that I would hear back from officialdom ‘within ninety days.’ I wasn’t in any special hurry, but it grated when ninety days came and went. Letters came from offices in Vermont and required themselves to be returned to offices in states very far away from the Canadian border. Eventually I received a summons to an interview in Virginia. There would be an exam, I was told, on American law and history. To make this easier, a series of sample questions was enclosed, together with the answers. I realized in scanning them that it wouldn’t do to try and be clever, let alone funny. For example, to the question: ‘Against whom did we fight in the revolution of 1776?’ it would be right, if incorrect, to say ‘The British’ and wrong, if correct, to say ‘The usurping Hanoverian monarchy.’ Some of the pre-supplied Qs and As appeared to me to be paltry… Q: ‘What did the Emancipation Proclamation do?’ A: ‘It freed the slaves.’ No it didn’t: that had to wait until the Thirteenth Amendment, the first United States document to mention the actual word ‘slavery’ (and not ratified by the State of Mississippi until 1995). Having previously been made to go to a whole separate appointment in deepest Maryland just to be fingerprinted, I sat up on the night before my Virginia one, and decided to read slowly through the Constitution… One had to admire the unambivalent way in which these were written. ‘Respecting an establishment of religion,’ said the very first amendment, drawing on Jefferson’s and Madison’s Virginia Statute For Religious Freedom, ‘Congress shall make no law.’ Little wiggle room there; no crevice through which a later horse-and-cart could ever be driven. Alas for advocates of ‘gun control,’ the Second Amendment seems to enshrine a ‘right of the people to keep and bear arms’ irrespective of whether they are militia members or not. (The clause structure is admittedly a little reminiscent of the ablative absolute.) And the Eighth Amendment, forbidding ‘cruel and unusual punishments,’ is of scant comfort to those like me who might like that definition stretched to include the death penalty. If the Founders had wanted to forbid capital punishment (as, say, the state constitution of Michigan explicitly does), they would have done so in plain words… For a writer to become an American is to subscribe of his own free will to a set of ideas and principles and to the documents that embody them in written form, all the while delightedly appreciating that the documents can and often must be revised, so that the words therefore constitute, so to say, a work in progress. This was all rather well set out in the passport that I immediately went to acquire… Human history affords no precedent or parallel for this attainment. On the day that I swore my great oath, dozens of Afghans and Iranians and Iraqis did the same. A few days later, I noticed that I had sloppily gummed a postage stamp onto an envelope with the flag appearing upside down. I am the most frugal of men, but I reopened the letter, tore up and threw away the envelope, invested in a whole new stamp and sent Old Glory on its way with dignity unimpaired. A small gesture, but my own.” From the closing of the chapter “Changing Places” in the memoir Hitch-22 by Christopher Hitchens. Below: Hitchens takes his oath of citizenship with the Director of Homeland Security Michael Chertoff, on April 13, 2005. You can read more about the event and its lead up in Hitch’s piece in the Atlantic in the following month “On Becoming American”. Then read on: Gore Vidal on what the “Pursuit of Happiness” means today The three words Ben Franklin scratched off the Declaration of Independence Thomas Sowell riffs: “The problem with our ‘immigration policy’… is that we don’t have an immigration policy” From Hitch-22: Hitchens on his mother, on boozing, on the passage of time Peter Hitchens: The House I Grew up in Posted by jrbenjamin in Biography BBC, Childhood, Children, Christopher Hitchens, interview, Nostalgia, parenthood, parents, Peter Hitchens, The House I Grew Up In, Time “I know perfectly well that it’s actually quite wrong to try to live in the past or to seek it. I think a lot of the reason why people do sometimes do it and some little moment of reminiscence will bring on a voyage into the past is because they would like to open a door and find that their parents were alive again. And then you could show them that you’d grown up. You’d like to say, ‘Look, all that nonsense that you had to put up with, it’s over. And here are your grandchildren,’ who in my mother’s case, she never met and in my father’s case he only ever met one of them. So yes, that would be a good thing to do. It’s futile. There is no such door. You can go back into the houses of your youth and they are other peoples’ houses — they’re not yours anymore. The only purpose of going into the past is to examine it and to know what it was really like. And often these days, people defame the past and pretend that it was a waste of time — nothing but misery and poverty and drabness. And to recognize that while yes there were many things that were wrong about the past, there were good things that we’ve lost and that are recoverable. And those who know nothing of the past will simply experience the future as a series of unnecessary mistakes and of mysterious events they had no possibility of understanding because they have no understanding of the way people behave and the way nations behave. He who doesn’t know his own past and the past of his own country and his own people is perpetually a child.” The concluding remarks from Peter Hitchens in his 2011 profile for the BBC radio program The House I Grew Up In, for which he returned to several childhood homes on the English coastline to see how they reflected and stirred his memories of family life. These remarks are especially melancholic in context, as Peter spends much of the episode wandering the streets of his childhood and discussing his rebellious youth, which involved, among other things, burning his Bible on the soccer pitch of his prep school. That prep school, more especially the money it siphoned from his working class mother and father, is to his mind at least part of the reason for their unhappy divorce and his mother’s eventual, tragic demise. Peter declines to discuss either event in much detail; Christopher, his older brother by two years, was more open, facing it with beautiful, plaintive words in the first and best chapter (“Yvonne”) of his memoir Hitch-22. I recommend listening to the entire episode, as Peter’s a first class guide of not only his past but of a kind of postwar English life that’s now nearly all gone. Perpetually overcast skies drizzling on hedgerows and Edwardian pubs; wheezing tea kettles; the cults of Winston Churchill and Admiral Nelson; double-decker buses and soldiers scuttling by in crisp Royal Navy uniforms. The England of Graham Greene and Evelyn Waugh. Peter can immerse readers and listeners in that world because he is of that world. His wry lamenting of his 60’s rebelliousness recalls one of his most epic lines, wielded in his debate at the Oxford Union on the existence of God: he opens his rebuttal by saying of his opponents that they — paraphrasing — “remind me of the most obnoxious, selfishness person I’ve ever known: my 15-year-old self.” For more on Peter’s conversion to Christianity, pick up his apologetic memoir The Rage Against God. For more on his politics, check out The Abolition of Britain and Short Breaks in Mordor: Dawns and Departures of a Scribbler’s Life. More Hitchens bro’s: Peter argues you can’t know your country’s history unless you know its poetry Peter asks can western civilization survive without religion Christopher Hitchens describes his relationship with his mother Christopher and Peter duke it out over the challenge of Nietzsche Christopher Hitchens: Their Hatred Towards Us Is a Compliment Posted by jrbenjamin in Politics, War ≈ Comments Off on Christopher Hitchens: Their Hatred Towards Us Is a Compliment Anti-Semitism, Christopher Hitchens, Daniel Pearl, Daniel Pearl Memorial Lecture, foreign policy, Islamic Jihad, Judaism, racism, Terrorism “Because anti-Semitism is the godfather of racism and the gateway to tyranny and fascism and war, it is to be regarded not as the enemy of the Jewish people alone, but as the common enemy of humanity, and of civilization, and has to be fought against very tenaciously for that reason. Most especially in its current, most virulent form of Islamic Jihad. Daniel Pearl’s revolting murderer was educated at the London School of Economics. Our Christmas bomber over Detroit was from a neighboring London college and was the chair of the Islamic Students Society. Many pogroms against Jewish people have been reported from all over Europe today as I’m talking, and we can only expect this to get worse, and we must make sure our own defenses are not neglected. Our task is to call this filthy thing, this plague, by its right name, to make unceasing resistance to it, knowing all the time that it’s probably ultimately ineradicable, and bearing in mind that their hatred towards us is a compliment and resolving some of the time at any rate to do a bit more to deserve it.” The closing of Christopher Hitchens’s fantastic Daniel Pearl Memorial Lecture, given in March 2010. Daniel Pearl, one of the first Americans killed at the hand of Islamic extremism in the post-9/11 era, was murdered 13 years ago this month. His death looks more and more like our most stark, literal harbinger of the kind of barbarism we now see everyday in the Middle East and around the world. As a supplement to Hitch’s talk, I recommend reading Bernard-Henri Lévy’s Who Killed Daniel Pearl?. In it, BHL argues convincingly that Pearl was murdered not only for his Jewish/American roots, but also because he had uncovered hidden connections between the Pakistani nuclear program and al-Qaeda. Christopher Hitchens: Resisting Radical Islam 101 Posted by jrbenjamin in Political Philosophy Christopher Hitchens, debate, Free Speech, Freedom, Islam, Islamism, Islamophobia, James Madison, John Lennox, The First Amendment “It’s coming to a place near you. The Qurans that are given out in our prison system, to Muslim prisoners by Muslim chaplains, paid for by Saudi Arabia, are Qurans written to the Wahabi tune. They’re not just your everyday Quran; they’re the Qurans that the Wahabis want you to read, containing direct incitement. They’re being given out with taxpayers’ money in the prison system, where militias are forming. Next you’ll have militias of this kind with their own chaplains within the United States armed forces. Are you ready for that? Are you ready to have Wahabi preachers in the U.S. armed forces? You better get ready for it, unless you’re going to take the James Madison view that there shouldn’t be any chaplains in the U.S. armed forces to begin with, or in the prison system. People want to pray, you can’t stop them. But we cannot have state subsidized prayer. We cannot have state subsidized preachers or chaplains. Give it up, or give it to your deadliest enemy and pay for the rope that will choke you. This is very urgent business, ladies and gentlemen, I beseech you: resist it while you still can and before the right to complain is taken away from you, which is the next thing. You will be told, you can’t complain – because you’re Islamophobic. The term is already being introduced into the culture, as if it’s an accusation of race hatred or bigotry, whereas it’s only the objection to the preachings of a very extreme and absolutist religion. Watch out for these symptoms… The barbarians never take a city until someone holds the gates open to them. And it’s your own multicultural authorities who will do it for you.” Christopher Hitchens, riffing in a Q&A before his debate with John Lennox in Birmingham, Alabama in 2009. Who Survived the Holocaust — and How? Posted by jrbenjamin in Literature ≈ Comments Off on Who Survived the Holocaust — and How? Christopher Hitchens, history, Martin Amis, The Holocaust, World War Two, Zone of Interest “What you had to have is usually tabulated as follows: luck; the ability to adapt, immediately and radically; a talent for inconspicuousness; solidarity with another individual or with a group; the preservation of decency (‘the people who had no tenets to live by — of whatever nature — generally succumbed’ no matter how ruthlessly they struggled); the constantly nurtured conviction of innocence (an essential repeatedly emphasized by Solzhenitsyn in The Gulag Archipelago); immunity to despair; and, again, luck. Having communed with the presences in [Anton] Gill’s book [which chronicles stories of survivors], with their stoicism, eloquence, aphoristic wisdom, humour, poetry, and uniformly high level of perception, one can suggest an additional desideratum. In a conclusive rebuke to the Nazi idea, these ‘subhumans,’ it turns out, were the cream of humankind. And a rich, delicate, and responsive sensibility — how surprising do we find this? — was not a hindrance but a strength. Together with a nearly unanimous rejection of revenge (and a wholly unanimous rejection of forgiveness), the testimonies assembled here have something else in common. There is a shared thread of guilt, the feeling that, while they themselves were saved, someone more deserving, someone ‘better’ was tragically drowned. And this must amount to a magnanimous illusion; with due respect to all, there could have been no one better.” From the epilogue to Martin Amis’s new novel The Zone of Interest, the closing dedication of which reads: To those who survived and to those who did not; to the memory of Primo Levi and to the memory of Paul Celan; and to the countless significant Jews and quarter-Jews and half-Jews in my past and present, particularly my mother-in-law, Elizabeth, my younger daughters, Fernanda and Clio, and my wife, Isabel Fonseca. Strikingly, this moving statement echoes almost exactly the words of M.A.’s closest friend, Christopher Hitchens, who remarked, I once wrote that anyone who wanted to defame the Jewish people would, if they were doing so, be defaming my wife, my mother, my mother- and father-in-law, and my daughters, and so I didn’t think I really had to say anything for myself. But I did add that in whatever tone of voice the question was put to me — whether it was friendly or hostile — Was I Jewish? I would always answer yes. Denial in my family would end with me. What to be Wary of in Your Government Posted by jrbenjamin in History, Politics ≈ Comments Off on What to be Wary of in Your Government American Academy of Arts and Sciences, American History, American Philosophical Society, American Revolution, Christopher Hitchens, founding, founding fathers, Government, James Bowdoin, James Warren, John Adams, John Hancock, letter, politics, Thomas Jefferson “The management of so complicated and mighty a machine, as the United Colonies, requires the meekness of Moses, the patience of Job and the wisdom of Solomon, added to the valour of Daniel… We may feel sanguine confidence of our strength: yet in a few years it may be put to the tryal. We may please ourselves with the prospect of free and popular governments. But there is great danger, that those governments will not make us happy. God grant they may. But I fear, that in every assembly, members will obtain an influence, by noise not sense. By meanness, not greatness. By ignorance not learning. By contracted hearts not large souls. I fear too, that it will be impossible to convince and perswade People to establish wise regulations. There is one thing, my dear sir, that must be attempted and most sacredly observed or we are all undone. There must be a decency, and respect… introduced for persons in authority, of every rank, or we are undone. In a popular Government, this is the only way of supporting order—and in our circumstances, as our People have been so long without any Government at all, it is more necessary than, in any other.” John Adams, writing to his friend and Paymaster General of the Continental Army, James Warren, on April 22nd, 1776. It’s critical to keep in mind exactly what Adams and the founders meant by “happy” in the context of writing about government and law. As Robert P. George recently clarified: The term “happiness” in the 18th century—and, in fact, until quite recently—did not refer simply to a pleasing or desirable psychological state—one that might be induced by virtue, vice, or, for that matter, some pharmacological product. It included the idea of flourishing or all round well-being, which necessarily was understood to involve virtue. (As in “happy the man who walks the path of justice.”) In other words, it was a morally inflected locution. Exactly two decades following the delivery of this letter, Adams himself would be elected to the Presidency. Commenting on that event, Christopher Hitchens noted, “It is perhaps both heartening and sobering to reflect that, in the contest between Jefferson and Adams in 1796, the electors were offered a choice between the President of the American Philosophical Society and the founder of the American Academy of Arts and Sciences, and chose both of them.” Jefferson was President of the APS in 1780 (Benjamin Franklin had founded the society in 1743), and John Adams founded the AAAS with John Hancock and James Bowdoin during the American Revolution. In the election of 1796, Adams carried 71 electoral votes to become President, barely edging Jefferson’s 68. More Adams: Meet John Adams My favorite Adams letter: to his wife, on his self-esteem Adams’s spot on prediction of how we’d celebrate the Fourth of July Andrew Sullivan and Christopher Hitchens: What Country Would You Live In? Posted by jrbenjamin in Journalism, Politics Andrew Sullivan, Brian Lamb, Britain, C-Span, Christopher Hitchens, Countries, Immigration, India, Nationalism, Nations, politics, The United States Brian Lamb: If you had to choose a country to live in, besides Great Britain and the United States– Christopher Hitchens: India. I love India. It’s the only place I’ve ever felt sort of instantly at home. It must seem incongruous when you look at me. Brian Lamb: And Andrew? Andrew Sullivan: I would die. I wouldn’t live anywhere else. Brian Lamb: You would not pick anywhere else? Andrew Sullivan: No. Two British transplants, Andrew Sullivan and Christopher Hitchens, reflecting on where they would live and their love for the United States during a joint interview with C-Span in February, 2002. Both men, though born in the United Kingdom, became American citizens in the last decade. Watch the whole thing — but this particular segment is below. The Greatest Debate of All Time: Hitchens Versus Galloway on Iraq Posted by jrbenjamin in Current Events, Debate, Freedom, Original, Politics, Speeches, War Afghanistan war, Amy Goodman, Baruch College, British Parliament, Buckley-Vidal, Charles James Fox, Chomsky-Foucault, Christopher Hitchens, conflict, Dick Cheney, Donald Rumsfeld, Einstein-Bohr, foreign policy, Foreign Policy Debate, Galloway Versus Hitchens, Galloway-Hitchens, George Galloway, George W. Bush, Hitch-22, Huxley-Wilberforce, International Affairs, Invasion of Iraq, Iraq War, John Ashcroft, Lincoln-Douglas, Michael Faraday, Miliband–Poulantzas, Military, Nation-Building, Occupation, Parliament, Pat Robertson, Rhetoric, The Greatest Debate Ever, The Greatest Debate of All Time, The Iraq Invasion Debate, The Iraq Occupation, War It’s often tricky to identify “the best” of a certain category. But with debates, ironically enough, the question is, at least to my mind, settled. There are a lot of nominees for second place: Buckley-Vidal, Chomsky-Foucault, and Miliband–Poulantzas (Here I’m talking about debates for which we have a substantive record, so Lincoln-Douglas, Huxley-Wilberforce, and Einstein-Bohr don’t count). But the greatest recorded debate of all time is Hitchens-Galloway. No Question. It is simply the most caustic, articulate, and galvanizing verbal clash that has ever been captured on film. If you do yourself the favor of watching it, within a minute you will have found a side — and you will be enthralled. Once, after a long, desultory day of swimming last Spring, two politically-minded friends and I decided to put Hitchens-Galloway on in the background as we poured some drinks and planned out our evening. Within 5 minutes, we were glued to the screen; within 10, we had forgotten about the night’s plans and were rehearsing arguments about the Iraq War; within 20, we had taken sides in a 2-on-1 verbal fray that eventually ended — I’m amused and embarrassed to admit — with several not-so-light shoves being thrown. I happened to be fighting solo in that scuffle. Because I did, do now, and have always categorically opposed the invasion of Iraq. In this debate, I take the side of Mr. Galloway. My two friends, loyal as ever to the Hitch, were flanking me from the right. This does not alter the fact that I despise almost everything I’ve subsequently read about Mr. Galloway, and believe that Hitchens is dead right in many of his cutting ad hominems against the Respect MP. Nevertheless, the gravity and intensity with which Galloway gives voice to the concerns of the anti-war Left is unmatched really by anyone I have ever seen. Like an acid reacting to its catalyst, the venom that bubbles out of Galloway is clearly a response to what he identifies as the “malevolence and incompetence” of the “neo-con gang” which occupied 1600 Pennsylvania Avenue at the time. Fanning this brushfire of wild contempt were the looming effects of Hurricane Katrina, and the naturally conjoined questions which arose from it: Why are we hemorrhaging resources over there? Don’t we need that cash and manpower here? Galloway makes this explicit several times in the exchange, but it runs like an underlying seam through several of his rejoinders. Some of these are, in addition to very clever, scathing and overflowing with (righteous?) animosity: “What you are witnessing is something unique in natural history: the first ever metamorphosis from a butterfly back into a slug”; “Never wrestle with a chimney sweep… there’s no way you can come out clean”; “People like Mr. Hitchens are ready to fight to the last drop of other people’s blood”; etc. But while these are below the belt, I don’t think they are — to borrow a line from Hitchens in the debate — beneath contempt. For one, Hitchens invites them (see the last two minutes of his opening remarks); and second, Hitchens can handle them. Galloway and Hitchens were two of the biggest alpha-males on the planet, and Galloway was not going to relent on his alpha-maleness. He couldn’t bring a knife to what was so clearly going to be a gun fight. I can remember watching this debate when it aired on DemocracyNow the week of September 9th, 2005. I can also remember how much the Iraq question was beginning to fill the sky in the Fall of 2005 — that moment when some of us could foresee the now nearly unavoidable truth that our invasion was an enormous blunder and our occupation a Sisyphean waste. As a freshman at my conservative Southern Baptist high school, I was among the only students who felt this way about Iraq, and I can remember not only how strongly I was beginning to oppose the invasion, but also how much I despised the assumed self-righteousness of those who repeatedly excused the Bush administration’s rank deceptions and bravado. It would be several years until I would read James Fenton’s “Prison Island”, a poem he wrote during his visit to Cambodia as the U.S. began bombing there in 1970. One particular stanza rings most acutely in my mind when I recall the bad early news out of Iraq and that 15-year-old kid who didn’t exactly know how to express why he didn’t like the war. My dear friend, do you value the counsels of dead men? I should say this. Fear defeat. Keep it before your minds As much as victory. Defeat at the hands of friends, Defeat in the plans of your confident generals. Fear the kerchiefed captain who does not think he can die. Ironically enough, I would for the first time stumble upon these words in the second-to-last page of Christopher Hitchens’s memoir, Hitch-22. The fact that Hitchens could write them without embarrassment or irony stands as verification of Michael Faraday’s immortal rejoinder. “There is nothing quite as frightening as a man who knows he is right.” Watch “The Grapple in the Big Apple”, the greatest debate of all time (Playback begins as the debate heats up, so rewind to the start to watch all of Hitchens’s opening): Some of my comments on the so-called “Debate of the Decade”: George Galloway versus Christopher Hitchens on the Iraq War. For the record: I don’t endorse all of Galloway’s remarks, nor do I oppose all of Hitchens’s. I admire this debate first for the rhetorical skill and knowledge it exacted from the interlocutors, and second because it brings to light many nuanced issues surrounding the Iraq invasion and occupation — issues which we should still grapple with today. The Occasional Pleasure of Advancing Years: Christopher Hitchens on the Passage of Time A Moveable Feast, Age, Aging, Angela Gorgas, Capitalism, Christopher Hitchens, Hitch-22, James Fenton, Martin Amis, Marxism, memoir “In some ways, the photograph of me with Martin and James is of ‘the late Christopher Hitchens.’ At any rate, it is of someone else, or someone who doesn’t really exist in the same corporeal form. The cells and molecules of my body and brain have replaced themselves and diminished (respectively). The relatively slender young man with an eye to the future has metamorphosed into a rather stout person who is ruefully but resignedly aware that every day represents more and more subtracted from less and less. As I write these words, I am exactly twice the age of the boy in the frame. The occasional pleasure of advancing years — that of looking back and reflecting upon how far one has come — is swiftly modified by the immediately succeeding thought of how relatively little time there is left to run. I always knew I was born into a losing struggle but I now ‘know’ this in a more objective and more subjective way than I did then. When that shutter clicked in Paris I was working and hoping for the overthrow of capitalism. As I sat down to set this down, having done somewhat better out of capitalism than I had ever expected to do, the financial markets had just crashed on almost the precise day on which I became fifty-nine and one-half years of age, and thus eligible to make use of my Wall Street-managed ‘retirement fund.’ My old Marxism came back to me as I contemplated the ‘dead labor’ that had been hoarded in that account, saw it being squandered in a victory for finance capital over industrial capital, noticed the ancient dichotomy between use value and exchange value, and saw again the victory of those monopolists who ‘make’ money over those who only have the power to earn it… I now possess another photograph from that same visit to Paris, and it proves to be even more of a Proustian prompter. Taken by Martin Amis, it shows me standing with the ravissant Angela [Gorgas], outside a patisserie that seems to be quite close to the Rue Mouffetard, praise for which appears on the first page of A Moveable Feast. (Or could it be that that box of confections in my hand contains a madeleine?) Again, the person shown is no longer myself. And until a short while ago I would not have been able to notice this, but I now see very clearly what my wife discerns as soon as I show it to her. ‘You look,’ she exclaims, ‘just like your daughter.’ And so I do, or rather, to be fair, so now does she look like me, at least as I was then. The very next observation is again more evident to the observer than it is to me. ‘What you really look,’ she says, after a pause, ‘is Jewish.’ And so in some ways I am — even though the concept of a Jewish ‘look’ makes me bridle a bit — as I shall be explaining. (I shall also be explaining why it was that the boy in the frame did not know of his Jewish provenance.) All this, too, is an intimation of mortality, because nothing reminds one of impending extinction more than the growth of one’s children, for whom room must be made, and who are in fact one’s only hint of even a tincture of a hope of immortality.” From the memoir Hitch-22 by Christopher Hitchens. More from the memoir: Friendship, Love, Irony, Humor, Parenthood, Literature, and Music The Grape and the Grain A Map of the World that Did Not Show Utopia These Contradictions
cc/2019-30/en_head_0021.json.gz/line1731739
__label__wiki
0.981515
0.981515
Top 5 Country Singers From ‘The Voice’ The Boot Staff Michael Loccisano, Getty Images The Voice has become a very important all-genre showcase for country music. Over the course of its 13 seasons, it's served as a springboard for some of the most exciting new -- and veteran -- talent in country music. It doesn't hurt that country's own Blake Shelton is one of the coaches on the popular reality singing competition, either. Below, The Boot counts down the best of the best country singers from The Voice. Gwen Sebastian Gwen Sebastian was another known quantity to music fans prior to The Voice. She had toured extensively around the country, performing with her band, and she released two singles via Lofton Creek Records. She competed on the second season of The Voice, choosing Shelton as her coach. After her elimination, Sebastian scored a new gig as a vocalist on Shelton's tour, and she also signed with Flying Island Records, with which she released a self-titled album. Frazer Harrison, Getty Images for ACM Cassadee Pope Cassadee Pope was already a music industry veteran before she competed on The Voice. She had been the lead singer of the pop-rock group Hey Monday, which went on hiatus in 2011. She competed on Team Blake in the third season of the show, and was ultimately crowned the winner. She released her first country album, Frame by Frame, in October of 2013 via Republic Nashville. Ethan Miller, Getty Images for iHeartMedia The Swon Brothers The Swon Brothers have become fan favorites since their appearance on The Voice. The sibling duo of Zach and Colton Swon have been playing music together since childhood, and Colton auditioned for American Idol in 2007 and reached the Top 48. The duo competed on Team Blake in the fourth season of The Voice, and placed third overall. Their winning combination of vocal ability and crowd-pleasing stage presence made them a standout all season long, turning in some of the most high-energy and fun performances ever to grace the stage of The Voice. In January 2014 they released their debut single, "Later On." Duane Prokop, Getty Images Danielle Bradbery is the youngest winner in the history of The Voice. The 17-year-old competed on Season 4 of the show, choosing Shelton as her coach and going on to place first. She signed a deal with Big Machine Label Group the very next day, and released her debut single, "The Heart of Dixie," just one month later. She released debut album for Big Machine in November of 2013. RaeLynn is one of the most flamboyant country singers to appear on The Voice. Her colorful sense of style is matched by her vocal ability, which propelled her to finish third on Shelton's team on the show's second season. In December, she released her debut album, WildHorse. Who Is Your Favorite Country Singer From 'The Voice'? Do you agree? Or are there others who've competed who should be here instead? Let us know in the comments section below! This story was originally written by Sterling Whitaker, and revised by Angela Stefano. NEXT: Top 10 'American Idol' Country Singers Source: Top 5 Country Singers From ‘The Voice’ Filed Under: The Voice
cc/2019-30/en_head_0021.json.gz/line1731742
__label__wiki
0.913601
0.913601
Are Singers The New Superheroes? The music industry is turning to Hollywood for a new stream of revenue. Queen’s Bohemian Rhapsody which became the biggest biopic ever generated $903 million worldwide on a $50 million budget. Even though the success of Bohemian Rhapsody was once-in-lifetime, it’s still worth for music labels to invest in documentaries because of the massive exposure. Even a biopic that bombs can still impact artist streams and downloads. With the success of Bohemian Rhapsody, Hollywood is on a biopic craze hoping to make the most out of the momentum. As the Hollywood Reported stated, “singers become as bankable as superheroes at the box office?” Here are some upcoming biopics: Elton John – ‘Rocketman’ David Bowie – ‘Stardust’ Dusty Springfield – ‘So Much Love’ Celine Dion – ‘The Power of Love’ Aretha Franklin – ‘Respect’ Controversy Sells Wrangler Jeans faced criticism over using Lil Nas X ‘Old Town Road’. Fans have threatened to boycott the company in what they deem to be “cultural appropriation.” Wrangler responded, “We have a long history of using the platform of popular music to embrace a new generation of fans, while staying true to our Western heritage.” The world’s oldest record shop, Spiller Records has banned Morrissey albums over his political views. Morrissey released a covers album today ‘California Son’ – which features collaborations with the likes of Green Day’s Billie Joe Armstrong and Grizzly Bear’s Ed Droste. A new study claims the smartest people listen to instrumental music. Researcher at Oxford Brookes University claim those who like jazz and classical are smarter than those who prefer lyrics. I personally like jazz, but I prefer music with lyrics. Critics have been wanting to write Madonna off but she could have the last laugh. Her net worth by Forbes is approx. $590 million. She’s one of America’s wealthiest self-made women. Check out her performance at the Eurovision Song Contest 2019. Whitney Houston estate is launching a touring hologram and album of unreleased music. Primary Wave Music Publishing acquired 50 percent of Whitney’s assets that included song & film royalties and merchandise. Some critics have said Houstons have figured out a way to cash in on Whitney and debase her at the same time. Ciara is heading to Harvard Business School. On Instagram she said: “I always dreamt of going to college, but by God’s grace, my music career took me on a path that I’m so thankful for,” she said. “This week I got accepted into Harvard! Words cannot describe my excitement!” Taylor Swift and Panics! Brendon Urie perform their track ME! on The Voice. Anyone else still taking it in that the EMO frontman went full blown pop? Recent Certifications BEBE REXHA ‘MEANT TO BE’ (FEAT. FLORIDA GEORGIA LINE) – 7x Multi-Platinum AVA MAX ‘SWEET BUT PSYCHO’ (Atlantic) – Platinum DAN + SHAY ‘TEQUILA’ (Warner) – 3 million ALESSIA CARA ‘WILD THINGS’ (Def Jam) – 2 Million TWENTY ONE PILOTS ‘MY BLOOD’ (Atlantic) – 500k TOBYMAC ‘I JUST NEED U.’ (Capitol CMG) – 500k CHARLIE PUTH THE ‘WAY I AM’ (Atlantic) – 500k BRYCE VINE ‘DREW BARRYMORE’ (Warner Bros.) – Platinum Selena Gomez Turns Sour on Social Media Selena Gomez is one of the most popular singers on Instagram with 150 million followers. She posts regularly but urges others to take a break if it feels overwhelming. “For my generation specifically, social media has been terrible,” Gomez told Cannes. “I understand that it’s amazing to use as a platform but it does scare me when you see how exposed these young girls and boys are. I think it’s dangerous for sure.” She further elaborated… I’m grateful I have a platform. I don’t do a lot of pointless pictures. For me, I like to be intentional with it. I see these young girls … I’ll meet them at meet-and-greets, and they’re just devastated by bullying and not having a voice. Gomez is currently working on a new album. She revealed that there will be no collaborations on the album. “Working on this new record, I just wanted it to be me, all me,” she said. “Every song is a story I’ve experienced.
cc/2019-30/en_head_0021.json.gz/line1731745
__label__wiki
0.660812
0.660812
U.S. Term Limits issued the following announcement on July 10. U.S. Term Limits (USTL), the leader in the non-partisan national movement to limit terms for elected officials, praises Republican Wes Morgan, 2020 U.S. Senate candidate from Kentucky, for signing the pledge for an amendment to term limit Congress. Previously, Democrat Amy McGrath committed support to term limits by signing the USTL pledge. Morgan is set to challenge 35 year incumbent Mitch McConnell in the primary in May. If McGrath earns the Democratic Party nomination, she will face either Morgan or McConnell in the general election in November 2020. Currently, U.S. Term Limits has the support of nearly 70 pledge signers in Congress. USTL President Philip Blumel commented on the pledge saying, “This strong support of term limits in Kentucky shows that there are individuals who are willing to put self-interest aside to follow the will of the people. America needs a Congress that will be served by citizen legislators, not career politicians.” The U.S. Term Limits amendment pledge is provided to every announced candidate for federal office. It reads, “I pledge that as a member of Congress, I will cosponsor and vote for the U.S. Term Limits amendment of three (3) House terms and two (2) Senate terms and no longer limit.” The U.S. Term Limits constitutional amendment has been introduced in both the U.S. Senate by Senator Ted Cruz (SJR1) and the U.S. House by Representative Francis Rooney (HJR20). Blumel noted, “We have seen a dramatic increase in supporters wanting term limits on Congress. More than 82% of Americans have rejected the career politician model and want to replace it with citizen leadership. The way to achieve that goal is through congressional term limits.” According to the latest nationwide poll on term limits conducted by McLaughlin & Associates, conducted in January 2018, term limits enjoy wide bipartisan support. McLaughlin’s analysis states, “Support for term limits is broad and strong across all political, geographic and demographic groups. An overwhelming 82% of voters approve of a constitutional amendment that will place term limits on members of Congress.” Blumel concluded, “America is in trouble. Our career politicians have let the people down. It is time to return control of our nation to the people. It is time for a constitutional amendment limiting congressional terms.” The term limits amendment resolutions would require a two-thirds majority in the House and Senate, and ratification by 38 states, in order to become part of the U.S. Constitution. Congressional term limits is the one bipartisan issue supported by both President Trump and former President Obama. Want to get notified whenever we write about U.S. Term Limits ? Sign-up Next time we write about U.S. Term Limits, we'll email you a link to the story. You may edit your settings or unsubscribe at any time. U.S. Term Limits Thank you for signing up for Kentucky Business Daily Alerts! Please select the organization you wish to subscribe to.
cc/2019-30/en_head_0021.json.gz/line1731748
__label__cc
0.736846
0.263154
LA10’s Goal of Breaking Into the Top Teams Continues March 30, 2019 (Los Angeles, Calif.) Following their shutout victory against FC Santa Clarita this past Sunday, LA10 seeks to continue their momentum and build a winning streak on their home turf.... LA10 Look to Take 3 Points Against the Reigning Champions In the second match of the season, LA10FC look to score their first victory since their promotion as they take on the reigning champions of the UPSL Pro Premier SoCal North Division, Cal FC... LA10 Looking Forward to Bigger Challenges in the UPSL Pro Premier Division February 22, 2019 (Los Angeles, Calif.) Crowned So-Cal North Championship Division Champions in their United Premier Soccer League debut, the players of LA 10 FC are eager to return to the pitch and pick up right where they left off—continuing undefeated in their promotion to the Pro Premier Division....
cc/2019-30/en_head_0021.json.gz/line1731749
__label__cc
0.673664
0.326336
Paul D’Amato: The States Project: Illinois by Kelli ConnellSeptember 22, 2016 ©Paul D’Amato You will hear a lot about Paul D’Amato’s long term project We Shall in the coming year. Be on the lookout for a new monograph of Paul’s work coinciding with an exhibition at Daiter Gallery during the 2017 season. Paul D’Amato (American, 1956- ) was born in Boston where he attended Boston Latin School during the height of the racial unrest, civil rights, and bussing. He moved to Oregon to attend Reed College and claims to have learned as much from traveling cross-country four times a year, often by hitchhiking and hopping freight trains, as he did in class. After receiving an MFA from Yale, he moved to Chicago where he discovered the communities of Pilsen and Little Village. The pictures and writing D’Amato produced over the next fourteen years were made into the book Barrio. Paul teaches at Columbia College and is currently photographing in the African-American community on the west side for a project called HereStillNow, which was made into a book in the fall of 2013. He has been awarded numerous grants and fellowships including a Guggenheim Fellowship, a Pollock-Krasner Grant, and a Rockefeller Foundation Grant to Bellagio, Italy, and his work is in the collections of the Museum of Modern Art, The Metropolitan Museum of Art, and The Art Institute of Chicago. There is nothing particularly unique, emblematic or historic about the west side of Chicago. The significance of this work has little to do with the fact Dr. King, for a short time, used to reside here, or that it nearly burnt to the ground after he was assassinated, or that it was once home to the most infamous housing project in the United States. It’s not the poorest, the oldest, the largest, or the most African-American of African-American communities in the U.S. In so many ways, the west side is typical. We know because sociologists tell us so. They have rates and percentages for measuring places like the west side: percentages of families living below the poverty line; rate of unemployment; rate of violent crime; percentage of teenage pregnancy etc. And, according to these metrics, the west side is just like every other swath of poverty in and around every single city in the U.S. We are all well aware of these neighborhoods because every day we routinely drive around them. Whether it’s Lower 9th Ward, Roxbury, Watts, Ferguson, East St Louis and Englewood, we are lulled in into ignoring their existence, as the people who live there become they and them, instead of he and she. We are led to also believe that the only time these communities are in crisis is when something occurs that lands on a front page. The real crisis, however, is on-going and it’s one of acceptance – acceptance of the conditions, day in day out, all year long, that lead to something that journalists only occasionally pay attention to. Yet, when I’m there, when I’m visiting someone I know, or simply stopping someone I’ve never met, something besides a concern for poverty takes shape. This is what I photograph. It varies from picture to picture. It can be about a kind of grace or beauty; or perhaps it can be just about the opportunity to do something out of the ordinary—to pose for a picture, and help make something that otherwise wouldn’t have existed. When these subjects agree to be photographed, they stand for the best and only example of who they are. At that moment, they are the center of the universe, right here, holding still, right now. What follows – these photographs – won’t change these neighborhoods but each of these interactions and the pictures that are a consequence, can do something that statistics and sensational news stories can’t. They remind us that we are all connected, that the individuals in the images aren’t they or them, they are he and she and matter as much as any one of us. Tags: Paul D'Amato NEXT | John Opera: The States Project: Illinois > < Krista Wortendyke: The States Project: Illinois | PREV Myra Greene: The States Project: IllinoisSeptember 25th, 2016 Jessica Labatte: The States Project: IllinoisSeptember 24th, 2016 John Opera: The States Project: IllinoisSeptember 23rd, 2016 Paul D’Amato: The States Project: IllinoisSeptember 22nd, 2016 Krista Wortendyke: The States Project: IllinoisSeptember 21st, 2016
cc/2019-30/en_head_0021.json.gz/line1731753
__label__wiki
0.611853
0.611853
Library Acquisition Patterns: Preliminary Findings By Katherine Daniel, Roger C. Schonfeld and Joseph J. Esposito, 22 Aug 2018 Several years ago, we set out to better understand how both library acquisition practices and the distribution patterns of publishers and vendors were evolving over time.[1] Within the academic publishing community, there is a sense that academic libraries are acquiring fewer and fewer books and that university presses are struggling amid declining sales. The latter may certainly be true—a recent UK study found that between 2005 and 2014, retail sales of academic books dropped by 13 percent[2]—but what if the academic libraries that constitute part of that market were in reality not making fewer purchases? As new vendors and acquisition methods disrupt customary means of acquiring books, Joseph Esposito, Ithaka S+R’s frequent collaborator and consultant, was inspired to ask whether book sales were actually depressed, or if they only appeared to be because academic libraries were bypassing the traditional wholesale vendors whose metrics are used by university presses to assess sales to libraries for companies like Amazon.[3] To address this question, Ithaka S+R’s Roger Schonfeld and Liam Sweeney developed a data collection method that involved obtaining acquisitions data through an integrated library system (ILS).[4] With the help of Betsy Friesen and Michael Johnson at the University of Minnesota, we created a canned report and query that academic institutions using Ex Libris’s Alma could easily implement to extract their data and supply us with a complete list of acquisitions by fiscal year. A pilot conducted with four academic libraries in 2016 proved that this method not only yielded viable data but was also scalable.[5] Last year we received funding from The Andrew W. Mellon Foundation, and the Library Acquisition Patterns (LAP) project was able to expand into a large-scale, national study that also incorporated data from OCLC’s WorldShare Management Services (WMS).[6] This preliminary analysis examines book acquisitions from 54 libraries—ranging from small private liberal arts colleges to public research universities—that use WMS.[7] We asked participants for data on their acquisitions between fiscal years 2013 to 2017. Because start and end dates for fiscal years vary by institution, we coded fiscal years as the year when the fiscal period ends for the purpose of this analysis. While some institutions were able to provide data for all five years, most were not, and we were therefore unable to perform a meaningful longitudinal analysis of acquisition patterns in the aggregate and within sectors using WMS data alone. As a result we are focusing our findings on fiscal year 2017, the most recent year for which all participants were able to provide data on their acquisitions. Material Format In the 2017 fiscal year, participating institutions acquired a total of 178,120 books. Of these, approximately 96 percent were acquired as tangible print books and the remaining four percent as electronic books (see Figure 1). Figure 1. Percentage of Print vs. Electronic Books Acquisition Method Print books were overwhelmingly acquired through a firm, one-time purchase, with 95 percent obtained in this manner. Only a little more than three percent of books were acquired through an approval plan, and half of that number were through a standing order. Electronic books, however, were acquired in drastically different ways. Firm purchases of ebooks fell to a little less than 60 percent, while approvals rose to 11 percent. Ebooks acquired through “unknown” means shot up to 31 percent (see Figure 2 and Figure 3). Although we do not know what these unknown acquisition methods are, one thing to note is that integrated library systems often have no systematic way of capturing items obtained as demand-driven acquisitions (DDA). It is therefore possible that these unknown acquisition methods include DDA. These preliminary findings are unexpected and represent an area that we would like to delve into with greater detail in the next stages of the analysis. Are these findings consistent with other library’s buying practices? Figure 2. Percentage of Print Books by Acquisition Method Figure 3. Percentage of Electronic Books by Acquisition Method The median price of electronic and print books by their acquisition method also varies to a wide extent (see Figure 4). Print books were acquired for a substantially lower median cost than electronic books, especially for print books and ebooks obtained through standing orders. While these figures suggest that electronic books generally tend to have their prices set at substantially higher rates, this could also mean that the specific books that institutions choose to acquire in electronic format simply cost more to obtain. Figure 4. Median Price of Print and Electronic Books by Acquisition Method Institutional Type Differences We also examined the number of book acquisitions by institutional characteristics. When examined in relation to their sector, we found that public institutions at the masters and doctoral level acquire a substantially higher number of books on average (see Figure 5). However, because we only have data for private baccalaureate schools, we were unable to assess whether this trend applies to public baccalaureate schools as well. Furthermore, because each category contains a relatively small number of schools, these findings should not be considered representative of acquisition patterns at institutions on the whole. We hope that further data gathering, especially from Alma participants, will bring greater balance to our participants in terms of institutional types. Figure 5. Average Number of Acquired Books by Carnegie Classification and Sector Book Vendors Among vendors, GOBI Library Solutions (formerly YBP) encompasses nearly half the market share of book acquisitions made in FY2017 by libraries in our sample, while Amazon has become the second largest book distributor with a quarter of the market (see Figure 6). Other top vendors have no more than six percent of the overall market. Participating institutions spent $9,407,190 on books during the 2017 fiscal year, with median prices among the top ten vendors ranging from close to $18 to just under $35 (see Figure 7). Figure 6. Market Share of Top 10 Book Vendors Figure 7. Median Book Price of Top 10 Vendors By discipline, GOBI and Amazon remain the top vendors across books in the humanities, social sciences, STEM, and other disciplines, although GOBI’s market share increases to 56 percent within the social sciences, while Amazon holds nearly 34 percent of the STEM market (see Figure 8). However, we question how much of these vendors’ market share is driven by the libraries themselves and their decisions to obtain books in different disciplines from particular vendors. As our research continues, and as we incorporate acquisitions data from significantly more schools, we will be interested to see whether these vendors remain the largest distributors. Amazon’s substantial presence is extremely notable among the libraries in our sample as well, and we look forward to seeing whether it has an equally substantial presence among Alma participants in the next phase of work on this project. Figure 8. Market Share of Top 10 Book Vendors by Discipline (%) Our findings indicate that print books dominated book acquisitions in 2017 at the 54 participating institutions in our data set. Most of these were acquired through a firm purchase in contrast to ebooks, of which nearly half were acquired through other methods and at significantly higher prices. The average number of book acquisitions was substantially higher among public universities as well. Amazon has come to capture 25 percent of the market, making it the second largest book vendor for these institutions. By discipline, titles focused on the humanities made up roughly half of all book acquisitions in the last fiscal year. These findings provide a snapshot of library acquisition patterns among universities that utilize OCLC’s WorldShare Management Services. While the findings in this preliminary report should not be viewed as representative of the acquisition patterns present in all academic libraries, they nevertheless yield important insights into current practices employed in acquiring books and illuminate which areas may be of most interest to dive into for a deeper analysis. The next step will be to incorporate acquisitions data from as many Ex Libris Alma participants as possible. Because we expect to add many larger research universities to our sample, it should give us the opportunity to examine patterns more broadly and at institutions with larger and potentially more diverse acquisitions. This amount of data and the greater number of schools will also allow us to take a closer look at the different patterns that may exist within different sectors of the academy and over time. Throughout the summer we will continue to gather data to ensure a large number of acquisition records from a diverse group of institutions. The next stage of this analysis will see us answering questions that include but are not limited to: How many books are academic libraries acquiring on average per year, and is there any notable trend in the number of acquisitions? In which formats and through which methods are academic libraries acquiring books? Have these patterns seen any change from 2013 to 2017? How do acquisition patterns vary by institution type and sector and how are these patterns changing over time? From which publishers are libraries acquiring books and through which vendors? We will present our findings in a final report in fall 2018. [1] Katherine Daniel, “Understanding Library Acquisition Patterns: Large-Scale National Study Launches,” Ithaka S+R (blog), September 6, 2017, http://www.sr.ithaka.org/blog/understanding-library-acquisition-patterns/. [2] Michael Jubb, “Academic Books and Their Futures: A Report to the AHRC and the British Library” (London: 2017), https://academicbookfuture.files.wordpress.com/2017/06/academic-books-and-their-futures_jubb1.pdf. [3] Joseph Esposito, “Researching Amazon and Libraries,” The Scholarly Kitchen (blog), November 12, 2014, https://scholarlykitchen.sspnet.org/2014/11/12/researching-amazon-and-libraries/. [4] Roger C. Schonfeld and Liam Sweeney, “Analyzing Library Acquisitions: Vendors, Publishers and Integrated Library Systems,” Ithaka S+R (blog), March 3, 2016, http://www.sr.ithaka.org/blog/analyzing-library-acquisitions/. [5] Liam Sweeney, “Library Acquisitions Pilot: Looking at the Data,” Ithaka S+R (blog), March 23, 2016, http://www.sr.ithaka.org/blog/library-acquisitions-pilot-looking-at-the-data/. [6] We would like to express our gratitude to the participants for agreeing to supply us with their acquisitions data, and especially OCLC’s Jonathan Blackburn for extracting it. [7] The study included 46 private institutions (27 at the baccalaureate level, 17 at the masters level, two at the doctoral level) and eight public institutions (five masters level, three doctoral level). Editor’s Note: DOI: https://doi.org/10.18665/sr.307940 Copyright 2018 Ithaka S+R. This work is licensed under a Creative Commons Attribution/NonCommercial 4.0 International License. To view a copy of the license, please see http://creativecommons.org/licenses/by-nc/4.0/. Posted in: E-Commerce, Electronic Subscriptions, Information Management, Libraries & Librarians, Reference Resources
cc/2019-30/en_head_0021.json.gz/line1731759
__label__cc
0.666812
0.333188
Bank pays €22 mn for Luxembourg tax evasion activities German financial institution HSH Nordbank reportedly reached a 22-million-euro settlement with prosecutors in Cologne over setting up offshore companies through Luxembourg to hide client assets from tax authorities. (CS) German financial institution HSH Nordbank reportedly reached a 22-million-euro settlement with prosecutors in Cologne over setting up offshore companies through Luxembourg to hide client assets from tax authorities. Newspaper “Süddeutsche Zeitung” and broadcasters NDR and WDR first reported on the deal on Tuesday. Allegedly, HSH Nordbank approached the prosecutor's office to report the activities of its former Luxembourg subsidiary, following a search at Commerzbank for similar offences. According to media reports, HSH Nordbank helped clients hide money through its Luxembourg branch, by setting up dummy companies in Panama between 2005 and 2011, when the subsidiary was sold. However, HSH Nordbank continues to be active in the Grand Duchy. Neither the prosecution nor the bank have commented on the settlement, citing ongoing proceedings. “Süddeutsche Zeitung”, however, reports that the bank intended to inform its board about the deal on August 27. The majority shareholders of HSH Nordbank are the City State of Hamburg and the State of Schleswig-Holstein, two of Germany's 16 federal states. The German Hypo-Vereinsbank (HVB) several weeks ago reportedly agreed to a 20-million-euro settlement for helping clients evade taxes through Luxembourg. According to “Süddeutsche”, in addition to HSH Nordbank, HVB and Commerzbank, three further large financial institutions, two of them in state hands, are under investigation.
cc/2019-30/en_head_0021.json.gz/line1731761
__label__wiki
0.759693
0.759693
Hellboy: The Third Wish #2 Hellboy: The Third Wish Hellboy battles various and sundry horrors of the deep! A giant fish-woman explains that in order for the world to survive, Hellboy must die; meanwhile, fairies, elves, and a chicken discuss the fate of the universe. Supernatural/Occult Horror Action/Adventure Vol. 6: Strange Places Hellboy is one of the most celebrated comics series in recent years. The ultimate artists' artist and a great storyteller whose work is in turns haunting, hilarious, and spellbinding. Mike Mignola has won numerous awards in the comics industry and beyond. When strangeness threatens to engulf the world, a strange man will come to save it. Sent to investigate a mystery with supernatural overtones, H B.P.R.D. The Hollow Earth, by Mike Mignola, Chris Golden, Tom Sniegoski, and Ryan Sook, reveals the Bureau for Paranormal Research and Defense's struggle to save agent Liz Sherman, and their struggle to deal with life without Hellboy. That story is collected here with rare Hellboy related stories, long sought after by fans of the Mignola's hit comic, which is soon to be a major motion picture! Reprinted he Hellboy and the B.P.R.D. A bizarre series of murders and rumors of something worse lead Professor Bruttenholm to send a young Hellboy to a Brazilian village on his first mission. Hellboy and a small group of agents uncover something terrible in the shadows of a sixteenth-century Portuguese fortress . . . Hellboy creator Mike Mignola teams with acclaimed artist Alex Maleev. A century ago, paranormal investigator Edward Gray fought and destroyed a powerful warlock off the coast of the island of Saint-Sébastien. In the early 1980s, the B.P.R.D.'s newest agent was sent to retrieve the warlock's remains. But Abe Sapien is ill prepared for the dark forces that block his way. Written by Hellboy creator Mike Mignola, and featuring the haunting art of Jason Shawn Alexander B.P.R.D.: Hell On Earth A story that began in the first issue of Hellboy concludes with the B.P.R.D. team set to permanently wipe out the subterranean colony of frog monsters that have been a story-driving plague. With Memnan Saa dead, agents Liz and Abe take on the powerful King of Fear,who ultimately reveals that it is, in fact, the B.P.R.D. members themselves who will lead the world to apocalypse, not the supernatural
cc/2019-30/en_head_0021.json.gz/line1731762
__label__cc
0.711453
0.288547
Reducing Carbon Emissions from Landfill and Carbon Credit Trading 04/08/2014 News One Comment Reducing Carbon Emissions from Landfill is important to reduce the impact of waste disposal on climate change, the Carbon Credit Trading scheme has been introduced to help the poorer countries fund this change. It is all about methane. Methane, the second most prevalent greenhouse gas after carbon dioxide, is emitted in large quantities from modern engineered landfills unless it is collected and flared (burnt). For this reason educing carbon emissions from landfill is important in any effort to minimise the effects of climate change. Under the Kyoto Protocol was first agreed in 1997. Each of the the developed nations participating, set their own a target reduction in greenhouse gas emissions at achieving a reduction of 20 percent below 1990 levels for 2010. A longer term goal of 60 percent below by 2050 was also agreed. The EU set an eight percent target by 2008-2012 and introduced the EU Emissions Trading Scheme (ETS) in 2005. The idea of the ETS is to try and achieve this. The target for 2010 was met in general, and by the UK. The signatory EU nations have implemented two forms of measures on their industries, punitive and incentive, to ensure that greenhouse gas emissions will continue to be reduced, and in particular in respect of landfills. Incentive for Collecting Landfill Gas and Using it to Generate Electricity to Reducing Carbon Emissions from Landfill To reduce emissions of landfill gas into the atmosphere, the EU Landfill Directive seeks to reduce the production of methane gas from landfills in the home nation, and establishes a legal requirement for landfill gas control (collection and flaring as a minimum) in all EU Countries. So, by this measure damaging, methane emissions from landfills have been substantially reduced and the government incentives provided by subsidy of the unit rate paid for the electricity, have been effective. Similar bonuses which vary between the EU nations, have allowed landfill gas collection and electricity generation to become a profitable activity in throughout the EU nations. For example, in the United Kingdom there was a government scheme called ROCS, which provided the main incentive initially. But, that offer has now been closed to new applicants. It now needs to be replaced for new projects by the enhanced rates paid under the Feed-in-Tarrif scheme, and the renewable heat initiative (RHI). [Last Updated: 2017] Whereas, the Climate Change Levy continues to provide a form of economic dis-incentive for large companies who continue to produce high carbon emissions. Since 2002, the first renewable obligation certificates (ROCs) were auctioned by the government energy quango ‘Ofgem’. This was done at prices of around 7p/KWh for landfill gas. This price has been maintained as electricity prices havce risen since, at around three times the normal tariff price for electricity (which was 2.5p/KWh in 2002). EU Emissions Trading Scheme (EU ETS) In the Indian sub-continent for example the incentive to Indians to install landfill gas emissions reduction “Energy from Waste schemes” (EfW) has come from the EU Emissions Trading Scheme (EU ETS), called ‘cap and trade’ by some, through the beneficiary nation’s “National Allocation Plans” (NAP). The introduction of ROCs helped increase the UK generation capacity from 1,200GWh per year of landfill gas capacity in 1998, to 3,200GWh per year in 2003. The EU ETS was introduced in 2005 and it originally set a price for additional allowances at €40/t CO2 for Phase 1 from 2005 to 2007, and €1 00/t CO2 for Phase 2 from 2008 to 2012. It is intended that emission allowances are traded in a free market. Prices were expected to be near €5/t CO2 at the start of Phase 1, €9/t CO2 at the start of Phase 2, rising to €5-30/t CO2 by 2012. For the nations of the the world which have chosen to participate in the Clean Development Mechanism (CDM) it allows industrialised countries to invest in developing countries to reduce greenhouse gases and qualify for “Certified Emission Reductions” (CER). CDM applies to landfill gas where landfill gas is subject to regulation to combat methane concentration (i.e. migration), but capture of the gas is not normally mandatory under law in those coutries. Electricity generated by landfill gas has much lower carbon emissions than the electricity generated from fossil fuels such as oil, coal and natural gas. Conclusion – Reducing Carbon Emissions from Landfill There is, as a result of the actions described above, now a wonderful opportunity for the UK and Europe-wide landfill gas industry to be successfully reducing carbon emissions from landfill. This needs to be done together with UK financial institutions, to initiate landfill gas combustion and generation schemes in the developing countries including and help reducing carbon emissions from landfill. Related Waste Management Articles: Tags: carbon dioxide, carbon emissions, Carbon Emissions from Landfill, Certified Emission Reductions, Clean Development Mechanism, climate change, Climate Change Levy, emission allowances, Emissions Trading Scheme, EU Countries, EU Emissions Trading, EU ETS, EU Landfill Directive, Europe, Europe-wide landfill gas, government energy quango, greenhouse gas emissions, high carbon emissions, Landfill Directive, landfill gas collection, landfill gas combustion, landfill gas control, landfill gas emissions, lower carbon emissions, methane emissions, modern engineered landfills, prevalent greenhouse gas, reducing carbon emissions, renewable heat initiative, renewable obligation certificates, UK generation capacity Landfill Site Environmental Resource Centres 05/08/2014 No Comments How Waste Management Licensing Became Environmental Permitting in the UK Corey Woodward Reducing Carbon Emissions is happening and no doubt is also a work-in-progress for landfillers from Landfill and you cannot fault Carbon Credit Trading. But, much better is for all people who live in wooded areas with local fuel, to burn that local wood in their stoves. There you are. A simple easy solution and we can all have nice warm homes. Think about it… Landfill (25) Landfill Engineering (10) Landfill Management Services (2) Landfill PIctures (2) Landfill Problems (3) Landfill Safety (1) Waste Decomposition (3) Top 20 Contractor Lists (5) Tyre Bales (3) Waste Management (27) Contaminated Land (2) Environmental Permitting (3)
cc/2019-30/en_head_0021.json.gz/line1731764
__label__wiki
0.639231
0.639231
Graeme MacKay's Editorial Cartoon Archive March 6, 2019 by Graeme MacKay Editorial Cartoon by Graeme MacKay, The Hamilton Spectator – Wednesday February 27, 2019 Has Jagmeet Singh As NDP Leader Been A Total Flop? When Jagmeet Singh won the federal party’s leadership back in 2017, there was a wave of optimism when people thought of the possibility that Canada could elect its first non-white, Sikh-Canadian prime minister. The then-Brampton MPP defeated more established, experienced NDP veterans to win the leadership decisively with 54 per cent of the vote. For awhile it seemed the hope and optimism espoused by the late Jack Layton was alive again. To be honest, when I went to cover Singh’s leadership launch, I felt that kind of feeling as well. But it seems the reality of politics settles in and Singh, like others before him, is not looking as impressive as he once was. Part of this has to do with his lack of real presence in Ottawa. Singh was an Ontario MPP and once he left that position, he had no seat in the House of Commons which made it harder for him to get noticed at all…by anyone. All of Brampton’s ridings are currently held by Liberals, and even the embattled MP from Brampton East, Raj Grewal, decided to stay put after his scandalous situation, thus not allowing Singh a pathway to get elected in more familiar political terrain. Animated! This prompted Singh to move all the way to British Columbia to contest a by-election in the riding of Burnaby South, left vacant after the previous NDP MPwas elected Vancouver’s new mayor. Singh may yet win in a riding that only went NDP by about 500 votes in the 2015 election, as the Liberals had to suddenly switch candidates after the first one made what many called racially insensitive comments about the NDP leader. Coupled with the Liberals own handling of pipelines (a hot button issue in BC) and the current scandal surrounding former justice minister Jody Wilson-Raybould and SNC Lavalin, there may be enough disenchantment with the Liberal brand to allow Singh to win and get himself into the House of Commons so Canadians can actually see him face off against Justin Trudeau. Singh’s leadership pretty much hinges on this by-election win. The leader’s absence from Ottawa on a regular basis has led to some questionable decisions on his part. One example was removing a veteran NDP MP from a committee for voting with the Conservatives on a motion protesting Liberal changes to the Canada Summer Jobs program regarding abortion protests. Although the MP, David Christopherson from Hamilton, was pro-choice, he voted for the motion over concerns churches and other religious groups would have to disavow their beliefs to qualify for funding. Since the NDP is a pro-choice party and this MP effectively voted for a motion that reflected a pro-life position, Singh simply went and ‘disciplined’ the man amidst protest from his own MPs. Christopherson was subsequently reinstated to the committee, although later he announced he would not be running for reelection in 2019. (Continued: In Brampton Editorial) Posted in: Canada Tagged: 2019-08, by-election NDP, Canada, Jack Layton, Jagmeet Singh, Orange Crush, Quebec, Thomas Mulcair April 14, 2014 by Graeme MacKay By Graeme MacKay, The Hamilton Spectator – Tuesday, April 15, 2014 Flaherty’s state funeral to be held at Toronto’s St. James cathedral Jim Flaherty’s state funeral is being held at Toronto’s St. James Cathedral on Wednesday. Canadian Heritage is inviting Canadians to pay their respects to the former finance minister who died suddenly in his Ottawa condo last week. Visitation will take place at the Abilities Centre at 55 Gordon Street in Whitby, Ont., on Tuesday from 12:30 p.m. to 4 p.m. and from 6:30 p.m. to 8 p.m. Flaherty’s funeral will be held at 3 p.m. on Wednesday at St. James cathedral at 65 Church Street in downtown Toronto. Canadian Heritage says Flaherty’s family appreciates all the expressions of support and condolences and asks that, in lieu of flowers, donations be made to the Abilities Centre. Flaherty died of a heart attack late last week, less than a month following his retirement after serving as Prime Minister Stephen Harper’s finance minister since 2006. He’ll become the latest in a tradition of Canadian state funerals that began in 1868 with Thomas D’Arcy McGee, an Irish-born nationalist who became an MP and was assassinated on the streets of Ottawa after a late-night House of Commons debate. Jack Layton, the late NDP leader who was opposition leader when he died in August 2011, was also given a state funeral. It is an honour normally reserved for current and former governors general, prime ministers and sitting members of cabinet — although a state funeral may be offered to any eminent Canadian at the discretion of the prime minister. McGee, Layton, and now Flaherty, are the only three Canadians accorded a state funeral since Confederation beyond the prescribed list, according to a list provided by Canadian Heritage. Lincoln Alexander, former lieutenant-governor of Ontario and Canada’s first black MP, received a rare provincial state funeral in 2012. (Source: CBC News) Posted as the cartoon of the day on Wednesday, April 16, 2014, and Yahoo News Canada. Funerals are for the living but would Jim Flaherty really want a state funeral? #cdnpoli http://t.co/ahudvtToOF pic.twitter.com/2aKZu32cXJ — mackaycartoons (@mackaycartoons) April 15, 2014 Posted in: Canada Tagged: austerity, Budget, Canada, Editorial Cartoon, expenses, Jack Layton, Jim Flaherty, restraint, spending, State Funeral November 28, 2013 by Graeme MacKay By Graeme MacKay, The Hamilton Spectator – Thursday, November 28, 2013 Chow and Mulcair fume after Trudeau uses Layton’s dying words to denounce NDP in victory speech Liberal Leader Justin Trudeau is under fire for echoing the dying words of Jack Layton to denounce the NDP following Monday night’s byelection victories, which left Layton’s widow, NDP MP Olivia Chow, “surprised and disappointed.” Despite no change in seats (Liberals and Conservatives both kept two) Trudeau was resoundingly declared the winner of Monday’s four byelection races because of the large uptick in overall support for the Grits. The young Liberal leader claimed a positive approach to politics was behind his party’s resurgence, which he said was being countered by a negative campaign by the NDP in the contested ridings of Toronto Centre and Bourassa. “Make no mistake, the NDP is no longer the hopeful, optimistic party of Jack Layton. It is the negative, divisive party of Thomas Mulcair. It is the Liberal party tonight that proved hope is stronger than fear, that positive politics can and should win out over the negative,” Trudeau said Monday night. In a letter to Canadians days before his death in August 2011, Layton famously penned: “Love is better than anger. Hope is better than fear.” Chow insisted Tuesday that the NDP is “the party of love, hope and optimism,” but also said her party should remain focused on the ruling Conservatives. “If we are to have a better country, and certainly Canadians deserve a lot better, we need to focus on Stephen Harper. Yes, we are the party of love, hope and optimism and let’s be hopeful. Let’s not be fearful of each other, but let’s train our eyes on the real problem, which is Stephen Harper’s government,” the Toronto MP (and expected 2014 mayoral candidate) told reporters. The comment would seemingly put her at odds with NDP Leader Tom Muclair, who has increasingly taken shots at Trudeau, whose popularity in Quebec could wipe out the NDP’s historic gains in the 2011 election. (Source: National Post) Posted in: Canada Tagged: Canada, Editorial Cartoon, Jack Layton, Justin Trudeau, Parliament, statue, Stephen Harper, Thomas Mulcair July 27, 2011 by Graeme MacKay I arrived at work to an anonymous phone message left on my voice mail from an angry senior telling me I’m going to hell for drawing the cartoon above. Another hoped I would one day become stricken with cancer. Soon after a colleague picked up a call from a church minister almost saying the same thing. My colleague offered to transfer the call to me but didn’t want to talk to me. Then, the Spectator’s comment board displayed these tidbits: Jul 27, 2011 9:58am – by dajguy – The spec should be embarassed this is terrible and in bad taste. And I’m not an NDP supporter. Jul 27, 2011 10:34am – by YelloLine – I’m trying to think of a time when Mackay published a cartoon that was in good taste, or indeed was in some way meaningful. Or even funny. I’m drawing a blank. This editorial cartoon from Mackay, as with all the others before it, offers valuable insight into the Hamilton Spectator’s editorial relevance. Jul 27, 2011 11:29am – by Zoetta – Disgusting The Spec editorial team could do fine without Mackay. Making fun of a man with a probably terminal illness and his connection to duly elected new parliamentarians is despicable, but what I have come to expect from this master of bad taste. Mr. Layton and his party deserve an apology. Jul 27, 2011 11:36am – by Allan Taylor – Although I abhor the NDP and see the problems the cartoon alludes to as real this cartoon is disgusting and everyone involved in the decision to print it should be fired. Jul 27, 2011 1:25pm – by CallMeAxe – @Allan Taylor. Agree completely. The unemployment line should be a few people longer, occupied by those who made the decision to print this. Jul 27, 2011 1:28pm – by CallMeAxe – MacKay should be 1. FIRED (click agree) 2. Suspended indefinitely without pay (click Disagree) or 3. Encouraged to do more tasteless cartoons (click Offensive). Really – fired? I thought after the whole Danish cartoon controversy a few years back the world got a good series of lessons on freedom of expression and how far we editorial cartoonists could go. How soon some of the anonymous around us forget and are prepared to issue Canadian fatwas against cartoonists which dare to illustrate a revered leader in something not resembling a get well soon Hallmark card. There have been quite a few nice Jack Layton fighter cartoons drawn by my friends in field, examples are these drawn by Mike deAdder and Mike Graston. All very observant towards Layton’s fight which lies ahead with some thought to his achievements in the past. The added element or stinger in the above cartoon may be the sight of his party as peewee hockey players left learning how to skate. While a metaphorical group of babies, children, or teens has often been used, and even overused, in the last couple of months to illustrate the bulk of the newly elected NDP caucus, the concern truly exists of inexperienced MPs leading the opposition charge. I think that’s a hard fact for many NDP supporters to face as they look down the the road without their great saviour at the helm, or without their best player scoring goals. Or, maybe it is the plain sight of a political leader taken off the ice that stings them the most and prompting calls for my head. I don’t know. What I do know is that there’s a lot of truth to this cartoon, and while it has caused people to react angrily, which is what a cartoon is supposed to do, it’s obvious that the truth hurts, but there’s no need to apologize for drawing it. Posted in: Canada Tagged: election, Feedback, Hockey, Jack Layton July 7, 2011 by Graeme MacKay There have been quite a few nice Jack Layton fighter cartoons drawn by my friends in field, examples are these drawn by Mike deAdder, Malcolm Mayes, and Mike Graston. All very observant towards Layton’s fight which lies ahead with some thought to his achievements in the past. Posted in: Canada Tagged: commentary, Feedback, Jack Layton The Hamilton Spectator Artizans Syndicate Association of Canadian Cartoonists Wes Tyrell Martin Rowson Guy Bado’s Blog You Might be From Hamilton if… Intellectual Property Thief Donkeys National Newswatch Your one-stop-MacKay-shop… T-shirts, hoodies, clocks, duvet covers, mugs, stickers, notebooks, smart phone cases and scarfs Follow Graeme's board My Own Cartoon Favourites on Pinterest. Archives Select Month July 2019 June 2019 May 2019 April 2019 March 2019 February 2019 January 2019 December 2018 November 2018 October 2018 September 2018 August 2018 July 2018 June 2018 May 2018 April 2018 March 2018 February 2018 January 2018 December 2017 November 2017 October 2017 September 2017 August 2017 July 2017 June 2017 May 2017 April 2017 March 2017 February 2017 January 2017 December 2016 November 2016 October 2016 September 2016 August 2016 July 2016 June 2016 May 2016 April 2016 March 2016 February 2016 January 2016 December 2015 November 2015 October 2015 September 2015 August 2015 July 2015 June 2015 May 2015 April 2015 March 2015 February 2015 January 2015 December 2014 November 2014 October 2014 September 2014 August 2014 July 2014 June 2014 May 2014 April 2014 March 2014 February 2014 January 2014 December 2013 November 2013 October 2013 September 2013 August 2013 July 2013 June 2013 May 2013 April 2013 March 2013 February 2013 January 2013 December 2012 November 2012 October 2012 September 2012 August 2012 July 2012 June 2012 May 2012 April 2012 March 2012 February 2012 January 2012 December 2011 November 2011 October 2011 September 2011 August 2011 July 2011 June 2011 May 2011 April 2011 March 2011 February 2011 January 2011 November 2010 October 2010 September 2010 August 2010 July 2010 June 2010 May 2010 March 2010 February 2010 January 2010 December 2009 November 2009 October 2009 July 2009 June 2009 May 2009 April 2009 March 2009 February 2009 January 2009 December 2008 November 2008 October 2008 September 2008 August 2008 July 2008 June 2008 May 2008 April 2008 March 2008 February 2008 January 2008 December 2007 November 2007 October 2007 September 2007 August 2007 July 2007 June 2007 May 2007 April 2007 March 2007 February 2007 January 2007 December 2006 November 2006 October 2006 September 2006 August 2006 July 2006 June 2006 May 2006 March 2006 January 2006 December 2005 October 2005 August 2005 March 2005 February 2005 January 2005 December 2004 October 2004 September 2004 August 2004 June 2004 May 2004 March 2004 February 2004 January 2004 December 2003 November 2003 October 2003 September 2003 August 2003 May 2003 March 2003 February 2003 January 2003 November 2002 October 2002 September 2002 July 2002 June 2002 May 2002 April 2002 February 2002 January 2002 October 2001 September 2001 August 2001 July 2001 April 2001 March 2001 January 2001 December 2000 October 2000 September 2000 June 2000 May 2000 March 2000 February 2000 January 2000 December 1999 October 1999 September 1999 August 1999 June 1999 May 1999 April 1999 March 1999 February 1999 January 1999 November 1998 November 1997 September 1997 August 1997 July 1997 Copyright © 2016 mackaycartoons.net Powered by Wordpess and Alpha.
cc/2019-30/en_head_0021.json.gz/line1731774
__label__wiki
0.830701
0.830701
Trulaske College of Business The Robert J. Trulaske Sr., College of Business, established in 1914, educates students for professional opportunities and responsibilities in the private and public sectors. The college includes the School of Accountancy (the first established at a major public university) and the departments of Finance, Management and Marketing. The college offers an undergraduate degree in business administration, a combined bachelor’s and master’s degree program in accountancy, master’s degrees in business administration, and doctoral degrees in accountancy and business. Majors in School or College Accountancy, BSAcc Business Administration, BSBA Business Administration (Economics), BSBA Business Administration (Finance and Banking), BSBA Business Administration (International Business-Economics), BSBA Business Administration (International Business-Finance), BSBA Business Administration (International Business-Management), BSBA Business Administration (International Business-Marketing), BSBA Business Administration (Management), BSBA Business Administration (Marketing), BSBA Business Administration (Real Estate), BSBA Undeclared Business Explore by Interests All Majors Communication, Journalism, Writing and Media Education and Helping Professions Health, Wellness, and Medical Natural, Environmental, and Life Sciences Other Ways to Explore By Career Path By School or College Pre-Professional Undecided/Exploring MU Graduate Programs MU Online Programs
cc/2019-30/en_head_0021.json.gz/line1731776
__label__cc
0.704512
0.295488
Cotton, Bolton, Hoychick & Doughty, LLP 607 Madeline St, Rayville, LA 71269, USA COTTON, BOLTON, HOYCHICK & DOUGHTY, LLP, is a law firm that combines the traditional values of the past with an innovative vision for the future. The Firm was established in 1946 by W. Davis Cotton and George W. Bolton, Jr. shortly after their homecoming from World War II as decorated war heroes. Their vision was to establish a thriving law practice founded on the principles of service, integrity, knowledge and dedication to putting the interests and needs of the client first. Adherence to these principles has resulted in a growing Firm with offices in Rayville and Monroe that is considered to be one of the finest in Northeastern Louisiana. While its roots are firmly planted in Richland Parish, the Firm offers a full array of services to an impressive list of clients, handling and litigating complex matters in State and Federal Courts all over North Louisiana. To ensure its ability to effectively and efficiently litigate these matters, the Firm has invested in making sure its attorney’s and staff are fully equipped with the latest technology needed to meet the needs of the Firm’s current and future clients. The strength and heart of the firm lies in its members. General practice attorney
cc/2019-30/en_head_0021.json.gz/line1731778
__label__cc
0.668353
0.331647
Home › Blog › Fantastic Beasts and How to Clone them Fantastic Beasts and How to Clone them By Emily Wiesendanger An artist’s depiction of a late Pleistocene landscape in northern Spain with woolly mammoths, equids, a woolly rhinoceros, and European cave lions with a reindeer carcass. Image by Mauricio Antón used under a CC BY 2.5 license from Wikimedia commons. Who wouldn’t love the opportunity to borrow a time-machine, go back in time and see some of the incredible species sadly extinct today? The idea of de-extinction – bringing extinct species back to life – offers a way to reverse the extinction process and counteract these past species losses. But how exactly might scientists achieve this? Woolly Mammoth. Image by Flying Puffin used under a CC BY-SA 2.0 license from Wikimedia commons. The Woolly Mammoth has truly become the poster child for de-extinction. Debate continues as to whether human hunting or the abrupt climatic changes that occurred during the Holocene era, which began 10,000 years ago, were the true cause of their extinction. Either way, they seem to stir something in the public imagination as soon as the word ‘cloning’ is mentioned, and who can blame them? Every well-preserved carcass pulled from the Siberian permafrost conjures the image of these magnificent creatures, wandering their grassland ecosystems in a ‘Jurassic Park’-style camera shot. But who am I to talk? Naturally, I own the cuddly toy version. This fame is something the Woolly Rhinoceros doesn’t seem to quite live up too. Yet both species are viable for de-extinction, along with the Aurochs, and the more recently extinct Dodo, Quagga, Thylacine and Passenger Pigeons. Woolly Rhinoceros (left) and Quagga (right). Public Domain Images by H. Osborn and Frederick York from Wikimedia Commons In terms of the Woolly Mammoth, teams in both the USA and South Korea are currently at work on this mammoth task. Yet the interesting thing is, they are using different methods. As I’m in no way a geneticist, this is something that has often felt like an abstract concept. But as evolutionary biologist Beth Shapiro has helpfully explained in recent publications1,2 there are three main approaches which may be taken to make de-extinction possible. One quick point though. All three methods emphasise the fact that unfortunately they will not produce a living, identical copy of an extinct individual, so let’s see instead what they could produce. Aurochs Cave Art. Image by Prof saxx used under a GNU Free Documentation license from Wikimedia commons. 1. Back-Breeding is a form of selective breeding. This means that where an extinct species is closely related to a species still living today, extinct characteristics may be brought back by selecting for desired physical features or behaviours when breeding the living population. Such features are called phenotypes, and represent the observable characteristics formed through the interaction of an individual’s genetic composition and their environment. Unfortunately, the phenotypes of the living species may be determined by different genes to those of the extinct species. This essentially means that offspring are not identical to the extinct individuals we are trying to re-create. This happened in the 1920s when a German Zoo tried to recreate the Aurochs, which has been extinct for 2,000 years. Despite using back-breeding from closely related domestic cattle, the Heck cattle they produced lacked key traits of true Aurochs. 2. Interspecies cloning is the route opted for by the South Korean team, which hopes to produce exact genetic copies of the extinct Woolly Mammoth. Following a process known as ‘Somatic cell nuclear transfer’ (SCNT), cells of the extinct individual are fused with egg cells of a closely related donor, and reprogrammed so that the extinct genome is represented. SCNT Process. Image by Dr. Jürgen Groth used under a GNU Free Documentation license from Wikimedia commons. One of the big limitations here is that intact cells are required. As soon as an individual dies, DNA will begin to decay. Low-temperature environments such as permafrost provide the best conditions for DNA preservation, but cloning is still a much more difficult prospect for long-extinct species. If the SCNT process is successful, a maternal surrogate is then required to carry the ‘clone’, an aspect which faces much criticism. If we take the example of the Woolly Mammoth, their closest living relative, the Asian Elephant, undergoes a 22-month pregnancy – high risk for both mother and calf. What’s more, during the rearing of young calves, the elephant’s diet and social behaviours may lead to the development of different phenotypes, again making the cloned offspring and the extinct species non-identical. 3. Finally, genetic engineering is the technique which Shapiro and the American scientists have the most faith in for de-extinction successes. Living species genomes can be edited to incorporate extinct species genes, by finding the differences between the two. Again, this process can be limited by incomplete ancient DNA samples – a full genome sequence of the extinct organism is needed. Once the living cells have been edited, the SCNT process can be applied. The amount of editing required is linked to how closely related species are. It is easy to see just what a task this is when you consider recent work from Harvard University. Compared to the Asian Elephant, Woolly Mammoth genes code for reduced sensitivity to heat, with at least 14 genes recognised for cold tolerance4. This is perhaps why some argue that it would be simpler to engineer an elephant capable of surviving cold temperatures, than a fully-grown mammoth. Woolly Mammoth Cuddly Toy. Photograph and Toy Author’s own. This does beg the question, why are we attempting to bring species back from extinction, especially if they would be a modified version? The loss of species worldwide is not a phenomenon that is confined to the past – we are losing species now in what scientists are calling Earth’s 6th Mass Extinction event. When already struggling endangered species like the Asian Elephant or potentially even the Sumatran Rhinoceros are required for the surrogate process, would it not be a better idea to concentrate on conserving our currently endangered species? Yet, this is unlikely to happen if the general conscious shifts to view extinction as no longer final but reversible4! Just perhaps then, the Woolly Mammoth is best left as a cuddly toy. [1] Shapiro, B. (2015) How to Clone a Mammoth: The Science of De-Extinction, Princeton, 240 pp. [2] Shapiro, B. (2016) ‘Pathways to De-extinction: How Close can we get to Resurrection of an Extinct Species?’, Functional Ecology, DOI: 10.1111/1365-2435.12705 [3] Callaway, E. (2015) ‘Mammoth Genomes Provide Recipe for Creating Arctic Elephants’, Nature, Vol. 251, pp. 18-19. [4] Iacona, G. (2016) ‘Prioritizing revived species: what are the conservation management implications of de-extinction?’, Functional Ecology, DOI: 10.1111/1365-2435.12720 Tagged with: Climate change • Conservation • De-extinction • Endangered Species • Mammoth See more posts by Emily Wiesendanger « Where there’s a whale, there’s a way – rebuilding a Victorian whale Welcome to Cohort 4 »
cc/2019-30/en_head_0021.json.gz/line1731780
__label__wiki
0.991994
0.991994
Love Ghost Shop About Music Shows Videos Press Contact ShopAboutMusicShowsVideosPressContact Winner of the 2017 Hollywood Music in Media Award for Alternative Artist Love Ghost is an Indie/Alternative/Hard Rock band from Los Angeles consisting of Finnegan Bell (guitar and vocals), Mya Greene (viola and keyboard), Ryan Stevens (bass and background vocals) and Samson Young (drums and background vocals). In 2019 they have toured Ireland (playing Whelan’s, Crane Lane, The Spirit Store and Roisin Dubh amongst others), Japan (11 shows in Tokyo, Osaka, Kobe and Kyoto), and were one of the mainstage bands at Festivalfff in Ambato, Ecuador. The band’s latest single "Mr. Blue" was produced by Carl Restivo(Tom Morello’s “The Atlas Underground”). The lyrics (by Finnegan Bell) are about depression- a youth's inner struggle with relationship's and finding his place in society. The band is currently working on a new album with legendary producer Danny Saber(The Rolling Stones, Alice Cooper, Seal, Marilyn Manson, etc.). Love Ghost has won numerous awards including Best Alternative Rock Band (Hollywood Music in Media Award), The Jean Luc Goddard Award (a yearly award from Cult Critic Magazine), and their music videos have won awards at: New York Film Awards, LA Shorts Awards, Paris Music Video Underground, NYC Indie Film Awards, Los Angeles Film Awards, Oniros Film Awards (Italy), Top Shorts, Festigious, London Independent Film Awards, The European Independent Film Awards, Independent Shorts Awards, IndieFest Film Awards,The Actor’s Awards, Virgin Spring Cinefest, Mindfield Film Festival, Royal Wolf Film Awards, Pinnacle Film Awards, Latitude Film Awards, and Los Angeles Film Awards. Love Ghost has played in Tar Fest, The Our Life Festival, Make Music Pasadena and Echo Park Rising. They have been the opening act for Irish singer-songwriter Mundy, Smash Mouth, Fuel, The Young Dubliners, Buckcherry, Berlin, Ozomatli and The Tubes. Their performance of "Forgive Me" on Balcony TV is currently the number 1 voted video of all-time. They were named in Music Connection’s Hot 100 Unsigned Bands. Finnegan Bell Guitar & Lead Vocals Always interested in songwriting, at the age of 13 Finnegan began playing solo shows at clubs in Los Angeles. About 4 months after his first gig (at Room 5 in LA) Finnegan met Mya Greene and Love Ghost was born. Finnegan also has a strong interest in filmmaking and has written scripts for the band’s music videos for “Forgive Me”, “Parasitical Identity”, “9mm” and “Girl Pusher”. He recently won several awards for the “Parasitical Identity” music video – Best Screenplay at the Pinnacle Film Awards and Mindfield Film Festival, Best Music Video at the Pinnacle Film Awards, Royal Wolf Film Awards, and Mindfield Film Festival, and Best Director (along with animator Dave Long) at the Pinnacle Film Awards, Royal Wolf Film Awards, and Mindfield Film Festival. Mya Greene Mya has played Viola since the age of 11. She was a member of the National Youth Orchestra and has played at Carnegie Hall in New York, Royal Albert Hall in London, and toured the world playing music in Russia, China, and Austria to name just a few. She is an original member of Love Ghost along with Finnegan Bell. She currently attends USC on a music merit scholarship. Ryan Stevens Bass & Backing Vocals Ryan started playing bass at 11. He sang in choir in elementary school and listened to a lot of hard rock music growing up which influenced him artistically and as a person. He has his first original song “In My Head Again” on Love Ghost’s upcoming album Lobotomy. Samson Young Samson Young started drumming at age 8. His father is a well-known jazz guitarist and his mother is a vocalist who has worked with many great musicians including Stevie Wonder. His musical influences range from jazz, funk, Latin and hard rock. Sign up to receive updates on all things Love Ghost!
cc/2019-30/en_head_0021.json.gz/line1731783
__label__cc
0.741758
0.258242
Home SEC Filings TABULA RASA HEALTHCARE,INC (NASDAQ:TRHC) Files An 8-K Entry into a Material Definitive... TABULA RASA HEALTHCARE,INC (NASDAQ:TRHC) Files An 8-K Entry into a Material Definitive Agreement On October19, 2018 (the “Closing Date”), TRHC MEC Holdings, LLC, a Delaware limited liability company (“Purchaser”) and wholly-owned subsidiary of Tabula Rasa HealthCare,Inc., a Delaware corporation (“TRHC”), entered into, and consummated the transactions contemplated by, a Stock Purchase Agreement (the “Purchase Agreement”) by and among Purchaser, each stockholder (each, a “Seller” and collectively, the “Sellers”) of Cognify,Inc., a California corporation (“Cognify”), and Mace Wolf, solely in his capacity as the Sellers’ Representative. to the Purchase Agreement, each Seller assigned, transferred and sold to Purchaser, and Purchaser purchased from the Sellers, all of the issued and outstanding capital stock of Cognify (the “Transaction”). Capitalized terms used herein and not otherwise defined have the meaning set forth in the Purchase Agreement. At the closing of the Transaction, TRHC paid (i)$10.8 million in cash consideration, subject to adjustments set forth in the Purchase Agreement, and (ii)issued 93,579 shares of TRHC common stock (valued at $76.94 per share) (together, the “Closing Consideration”). A portion of the cash consideration is being held in escrow to secure potential claims by Purchaser for indemnification under the Purchase Agreement and in respect of adjustments to the Purchase Price. In addition to the Closing Consideration, the Sellers will be eligible to earn additional consideration, payable one-half in cash consideration and one-half in shares of TRHC common stock, with an aggregate value of up to a total of $14,000,000 (the “Contingent Consideration”) based on the financial results of the acquired business and certain other factors as more fully described in the Purchase Agreement. Additionally, to the terms of the Purchase Agreement, the Contingent Consideration may be accelerated in certain circumstances. The Purchase Agreement includes customary terms and conditions, including provisions that require the Sellers to indemnify the Indemnified Purchaser Parties for certain losses incurred, including as a result of a breach by any Seller of such Seller’s respective representations, warranties or covenants under the Purchase Agreement. The foregoing description of the terms and conditions of the Purchase Agreement does not purport to be complete and is qualified in its entirety by reference to the full text of the Purchase Agreement. TRHC expects to file a copy of the Purchase Agreement with its Annual Report on Form10-K for the year ended December31, 2018. The representations, warranties and covenants of the parties contained in the Purchase Agreement have been made solely for the benefit of the parties thereto. In addition, such representations, warranties and covenants (i)have been made only for purposes of the Purchase Agreement, (ii)have been qualified by confidential disclosures made by the Sellers and Cognify to Purchaser in connection with the Purchase Agreement, (iii)are subject to materiality qualifications contained in the Purchase Agreement which may differ from what may be viewed as material by investors, (iv)were made only as of the date of the Purchase Agreement or such other date as is specified in the Purchase Agreement and (v)have been included in the Purchase Agreement for the purpose of allocating risk between the contracting parties rather than establishing matters as facts. Investors should not rely on the representations, warranties or covenants, or any descriptions thereof, as characterizations of the actual state of facts or condition of the parties or any of their respective subsidiaries or affiliates. Item 1.01 Completion of Acquisition or Disposition of Assets The disclosures set forth in Item 1.01 above are incorporated by reference into this Item 1.01. Item 1.01 Creation of a Direct Financial Obligation or an Obligation under an Off-Balance Sheet Arrangement of a Registrant The disclosures set forth in Item 1.01 above with respect to the Contingent Consideration are incorporated by reference into this Item 1.01. Item 1.01 Unregistered Sales of Equity Securities The disclosures set forth in Item 1.01 above are incorporated by reference into this Item 1.01. TRHC issued common stock in connection with the closing of the Transaction in a private placement exempt from registration to Section4(a)(2)of the Securities Act of 1933, as amended. TRHC relied on representations made by the individuals who received TRHC common stock to the effect that they were acquiring the TRHC common stock for investment purposes and not with a view to, or for resale in connection with, the distribution of such securities in violation of applicable securities laws and that they had sufficient knowledge and experience in business and financial matters to be capable of evaluating the merits and risks of an investment in such securities. The following risk factors are provided to update the risk factors of TRHC previously disclosed in TRHC’s periodic reports filed with the Securities and Exchange Commission (the “SEC”), including its Annual Report on Form10-K for the year ended December31, 2017: We face additional risks as a result of the Transaction and may be unable to integrate our businesses successfully and realize the anticipated synergies and related benefits of the Transaction or do so within the anticipated timeframe. On October19, 2018, we completed our acquisition of Cognify. As a result of the Transaction, the Company faces various additional risks, including, among others, the following: · failure to achieve the anticipated benefits of the acquisition in a timely manner, or at all; and · adverse outcome of litigation matters or other contingent liabilities assumed in or arising out of the acquisition. Notwithstanding the due diligence investigation we performed in connection with the Transaction, Cognify may have liabilities, losses, or other exposures for which we do not have adequate insurance coverage, indemnification, or other protection. While we performed significant due diligence on Cognify prior to signing the Purchase Agreement, we are dependent on the accuracy and completeness of statements and disclosures made or actions taken by Cognify and its representatives when conducting due diligence and evaluating the results of such due diligence. We did not control and may be unaware of activities of Cognify before the acquisition, including intellectual property and other litigation or disputes, information security vulnerabilities, violations of laws, policies, rulesand regulations, commercial disputes, tax liabilities and other liabilities. Our post-closing recourse is limited under the Purchase Agreement. The Sellers’ obligations to indemnify us is limited to, among others, breaches of specified representations and warranties and covenants included in the Purchase Agreement and other specific indemnities as set forth in the Purchase Agreement. In the event that any Seller breaches a representation or warranty other than a Fundamental Representation (as defined in the Purchase Agreement), we cannot recover in respect of a claim for indemnification to the Purchase Agreement with respect to such non-Fundamental Representation unless and until the indemnifiable losses exceed $90,000, and we cannot make an indemnification claim against the Sellers for a breach of a non-Fundamental Representation after the date that is 18 months after the date of closing of the Transaction. If any issues arise post-closing, we may not be entitled to sufficient, or any, indemnification or recourse from the Sellers, which could have a material adverse impact on our business and results of operations. About TABULA RASA HEALTHCARE,INC (NASDAQ:TRHC) Tabula Rasa HealthCare, Inc. (Tabula Rasa), formerly CareKinesis, Inc., is a provider of patient-specific, data-driven technology and solutions that enable healthcare organizations to optimize medication regimens to improve patient outcomes, reduce hospitalizations and manage risk. The Company delivers its solutions through a suite of technology-enabled products and services for medication risk management, which includes bundled prescription fulfillment and adherence packaging services for client populations with complex prescription needs. It also provides risk adjustment services, which help its clients to properly characterize a patient’s acuity, or severity of health condition, and optimize the associated payments for care. The Company serves approximately 100 healthcare organizations that focus on populations with complex healthcare needs and extensive medication requirements. Its products and services are built around the Medication Risk Mitigation Matrix, or MRM Matrix. NASDAQ:TRHC TABULA RASA HEALTHCARE INC
cc/2019-30/en_head_0021.json.gz/line1731784
__label__cc
0.683732
0.316268
Student Government Campaign Season Underway Posted on March 26, 2018 by The Quadrangle in News, Top Stories by TAYLOR BRETHAUER & JOE LIGGIO, Editor-in-Chief & Asst. Editor The annual student government campaign season is underway. For the next week, students should expect to see three major parties running for the student body executive board, up until online elections on Tuesday, March 27 and Wednesday, March 28. The three parties, B.E.S.T of the Bronx, The Jasper Shore: The Lasallian Experience and the Jasper Student Union, are led by presidential candidates Jaycie Cooper, Alex Constantine and Liam Moran, respectively. Cooper is running with Jara Giner as her executive vice president, while Constantine has selected MaryKate Himmelberg and Moran has selected Samantha Wilson. The entirety of each party can be seen on the chart below. The campaign season is held in the months of March and April of the spring semester every year. The winning members will hold their positions from the following fall semester until the next spring semester, when the cycle starts over again. In order to be eligible to run for student government, interested students were required to fill out an application and obtain 50 signatures from Manhattan College students. Applications were due Thursday, March 22, a day later than planned, due to the snow day on Wednesday. Once deemed eligible by Student Engagement, the teams will participate in a public debate, held Monday, March 26 in Locke’s Loft from 1 p.m. to 2 p.m. Candidates will yield questions from the student body during the lunch hour. The three students are running on separate platforms, each with their own ideas of making the college better for the student body and leaving their legacy on student government as a whole. The idea of running for this position became clear to junior biology major Constantine, after serving as freshman and sophomore class representatives. Last year, he ran as executive vice president with candidate LisaMarie Nilaj on the “Campus That Never Sleeps” ticket. This year, he wants to take what he learned from running and use it to his advantage when getting his word across. “I wanted to run again because I wanted to be able to implement printers in dorm halls. I wanted to expand commuter space. Not only me, my entire party– we all share the same goals. We want to find some space that we can claim as a commuter lounge, somewhere on campus that can assimilate them with the residents. We also want to revamp the common rooms in the dorm halls. That entails putting kitchen supplies, dish soap, paper towels in these places so people can use these common rooms,” said Constantine. On the opposing side, junior government and public relations major Cooper has many ideas of her own. Her focus lies on the idea of connectivity on campus between departments, clubs and offices while being an unbiased representative. Jaycie Cooper B.E.S.T. of the Bronx “This school has changed who I am upon entering. I got involved, I want to say the end of my freshman year, and I have been evolving into the student I am ever since. I am actively in a bunch of different clubs, and I see issues on campus that I think I could fix and also I think I could be a good representative; I’m unbiased and I want to represent the student body,” said Cooper. Lastly, junior government and philosophy major Moran has been a part of student government since his freshman year as well. He thinks the Bishop administration has done a good job this year and wants to continue what they have done, while adding what he sees fit to change. “Through my experience in student government, I began to see how many issues students face. I particularly felt the need to get more involved. I think the Bishop administration has done a wonderful job tackling a lot of issues and I think we can continue that going forward, specifically with quality of issues. So that includes dorms, range of problems from maintenance. It’s making sure that the student’s voices matter and they’re actually being heard,” said Moran. It is custom of student government parties to come up with fun, creative names to gain the attention of students while campaigning around campus. This year’s groups are no different. Jasper Shore stemmed from the comeback of the popular MTV show, Jersey Shore. It’s not a coincidence that some of the members of the party also live in that area. Alex Constantine Jasper Shore: The Lasallian Experience “Jersey Shore is coming back and we have two people in our party from that area and at first it was a joke, but then we thought ‘oh that’s pretty good.’ […] [Jasper Shore: The Lasallian Experience] came from Jersey Shore: Family Vacation, it’s like a play on that,” said Constantine. The B.E.S.T. of the Bronx has a deeper meaning than what it appears. The acronym for B.E.S.T. actually highlights each major point of the party’s values. “B is ‘Bridging the Gap,’ which means bridging the gap between students, which means residents and off-campus commuters, it means bridging the gap between athletes and non-athletes, it means bridging the gap between students and faculty, students and administration, students and public safety […] E is ‘Educational Success,’ we have a few ideas, the level of what we can implement is questionable […] but as of right now we really want to make campus resources for educational success more accessible to students, we really want to promote that to students, make students feel comfortable going to these resource centers, that they don’t feel that they’re behind because they are seeking out help […],” said Cooper. She continued. “S is ‘Sustainability on Campus,’ so we really want to work on being mindful of garbage consumption, we want to be more mindful of recycling on campus, we really want to promote fair trade practices. The T is ‘Together by Association.’ So this is one of the Lasallian values. Together by Association basically means we, not just me, it means working as a team, working together, working in fellowship […] The more relationships we can build on campus with other organizations, other students, we’ll get more done working together instead of alone. So that’s kind of our platform as of now.” Jasper Student Union, on the other hand, did not use an acronym. Rather, they used three simple words to drive their point home. “We figured we want something that would bring our mission home. Jasper, our community. Student, being the voice of that community and the focus is on that community and union because we want to have not only a unified voice but also a union-like approach so we can tackle the issues efficiently and effectively,” said Moran. Overall, each student has a strong platform in which they will use to run on and get students to be on their side. Constantine’s platform is all about a collaborative group of students coming together to service the greater population of the Manhattan College campus, all while keeping it light and fun. “I just want to say on record that I will not transfer if a squirrel becomes the new mascot,” said Constantine, referencing a Voices on the Quad from issue 6, in which he said he would do just that. “I will stay a loyal president and me and my party will try to help the student body as the Jasper Shore.” Cooper’s platform is an extension of her and her party’s own personalities: striving for connection with students and ending the segregation between specific organizations on campus. “I think I have a really open mind, I don’t think I have all the answers. I’m supposed to be representing the students so I’m not gonna micromanage at all. As I said, I wanna reach out to as many students as possible, If I’m just keeping issues between our e-board then nothing that is really an issue is gonna get done, so that means I’m really gonna make an effort to go to each of the club meetings, see what clubs I’m not associated with, what their needs are, see what students needs are,” said Cooper. Moran was able to lay out his three tenets in a concise manner. He is able to handle and understand what student government needs due to his involvement with the group. Liam Moran Jasper Student Union “My platform is based around what I consider three tenets. Quality of life, making sure that students in their dorming life and commuting life are heard. Whether it be issues of Horan’s elevators or issues of dorm maintenance. Transparency within the government, both with its budgets and what it’s doing. As a member of student government I don’t feel we’ve done enough to reach out to our constituents. I think that biggest issues that we have right now so I’m hoping on addressing that more. And the third tenet being financial reform and making sure that things were done properly. Both in this past administration and other past administrations and for the future,” said Moran. Students are encouraged to attend the debate, along with reaching out to the candidates to learn about their platforms before making their decision on who will be running student government come next fall. The voting period starts on Tuesday, March 27 and ends the following day. For more election coverage, continue following The Quadrangle.
cc/2019-30/en_head_0021.json.gz/line1731791
__label__wiki
0.929283
0.929283
Director : Gary Trousdale, Kirk Wise Stars : Paige O'Hara, Robby Benson Writers : Based on Beauty and the Beast by Jeanne-Marie Leprince de Beaumont Genres : Romance, Animated, Musical, Fantasy, Release Date : 22 Nov, 1991 G84 Minutes22 Nov, 1991 Plot - Beauty and the Beast is a romantic musical animated fantasy film about Belle, whose father is detained by the Beast, offers herself rather than her dad, uninformed her captor to be a enchanted prince. Produced By : Don Hahn IMDB8.0/10 Metascore95/100 Rotten Tomatoes93% "Beauty and the Beast Movie" Story With full of attitude and selfishness, a young prince is reviled by a mysterious enchantress as he he will transform into a monstrous beast. His exclusive hope is to figure out how to love a young lady and acquire her love consequently in order to redeem himself. A long time later, his chance demonstrates to itself when a youthful lady named Belle offers to comes to take the place of her ill father whom the beast had captured. With assistance from the palace’s enchanted staff, Belle start to value her captor and promptly falls in love with the beast. But back in the village a hunter have made all preparation to fight the beast. "Beauty and the Beast Movie" Trailer & Video Supporting Cast : Richard White, Jerry Orbach, David Ogden, Stiers Angela, Lansbury Bradley, Michael Pierce, Rex Everhart, Jesse Corti, Hal Smith, Jo Anne Worley Writer : Based on Beauty and the Beast by Jeanne-Marie Leprince de Beaumont Music By : Alan Menken Studio : Walt Disney Pictures, Walt Disney Feature Animation Awards & Nominations Won by "Beauty and the Beast Movie" Date of ceremony Recipients and nominees Academy Awards March 30, 1992 Best Picture Don Hahn Nominated Best Sound Mixing Terry Porter, Mel Metcalfe, David J. Hudson & Doc Kane Best Music, Original Score Alan Menken Won Best Music, Original Song Alan Menken & Howard Ashman For the song "Be Our Guest" Nominated Alan Menken & Howard Ashman For the song "Beauty and the Beast" Won For the song "Belle" Nominated Chicago Film Critics Association February 1992 Best Picture Nominated Dallas–Fort Worth Film Critics Association 1992 Best Film Won Best Screenplay Linda Woolverton Best Animated Film Golden Globe Awards January 18, 1992 Best Motion Picture – Musical or Comedy Don Hahn Best Original Score – Motion Picture Alan Menken Best Original Song – Motion Picture Alan Menken and Howard Ashman Alan Menken and Howard Ashman Grammy Awards February 18, 1993 Album of the Year Nominated Record of the Year Celine Dion and Peabo Bryson For the song "Beauty and the Beast" Nominated Best Album for Children Won Best Pop Performance by a Group or Duo With Vocal For "Beauty and the Beast" Song of the Year For "Beauty and the Beast" Nominated Best Instrumental Composition Written for a Motion Picture Alan Menken Won Best Song Written Specifically for a Motion Picture or for Television For "Beauty and the Beast" Best Pop Instrumental Performance For "Beauty and the Beast" Los Angeles Film Critics Association December 14, 1991 Best Animated Film Gary Trousdale and Kirk Wise Producers Guild of America March 4, 1992 Darryl F. Zanuck Award for Outstanding Producer of Theatrical Motion Pictures Don Hahn Nominated Box Office Earning of "Beauty and the Beast" Budget : $25,000,000 Opening Weekend : Will be updated soon.
cc/2019-30/en_head_0021.json.gz/line1731795
__label__cc
0.565276
0.434724
The navigation menu has been collapsed. Videos & Tools About MedlinePlus Search MedlinePlus Medical Encyclopedia → Incontinence - resources URL of this page: //medlineplus.gov/ency/article/003978.htm To use the sharing features on this page, please enable JavaScript. The following organizations are good resources for information on incontinence. Fecal incontinence: International Foundation for Functional Gastrointestinal Disorders -- www.aboutincontinence.org National Institute of Diabetes and Digestive and Kidney Diseases -- www.niddk.nih.gov/health-information/digestive-diseases/bowel-control-problems-fecal-incontinence The Simon Foundation for Continence -- simonfoundation.org/fecal-bowel-incontinence/ Urinary incontinence: National Institute of Diabetes and Digestive and Kidney Diseases -- www.niddk.nih.gov/health-information/urologic-diseases/bladder-control-problems The Simon Foundation for Continence -- simonfoundation.org/category/types-of-incontinence/ Resources - incontinence Male urinary system Review Date 10/21/2018 Updated by: Jennifer K. Mannheim, ARNP, Medical Staff, Department of Psychiatry and Behavioral Health, Seattle Children's Hospital, Seattle, WA. Also reviewed by David Zieve, MD, MHA, Medical Director, Brenda Conaway, Editorial Director, and the A.D.A.M. Editorial team. NIH MedlinePlus MagazineRead more Health Topics A-ZRead more Easy-to-Read MaterialsRead more A.D.A.M., Inc. is accredited by URAC, also known as the American Accreditation HealthCare Commission (www.urac.org). URAC's accreditation program is an independent audit to verify that A.D.A.M. follows rigorous standards of quality and accountability. A.D.A.M. is among the first to achieve this important distinction for online health information and services. Learn more about A.D.A.M.'s editorial policy, editorial process and privacy policy. A.D.A.M. is also a founding member of Hi-Ethics and subscribes to the principles of the Health on the Net Foundation (www.hon.ch). The information provided herein should not be used during any medical emergency or for the diagnosis or treatment of any medical condition. A licensed physician should be consulted for diagnosis and treatment of any and all medical conditions. Call 911 for all medical emergencies. Links to other sites are provided for information only -- they do not constitute endorsements of those other sites. Copyright 1997-2019, A.D.A.M., Inc. Duplication for commercial use must be authorized in writing by ADAM Health Solutions. MedlinePlus Connect for EHRs U.S. National Library of Medicine 8600 Rockville Pike, Bethesda, MD 20894 U.S. Department of Health and Human Services National Institutes of Health
cc/2019-30/en_head_0021.json.gz/line1731797
__label__wiki
0.966318
0.966318
25th June 1984, Prince released his sixth studio album Purple Rain the first to feature his band the Revolution, and the soundtrack to the 1984 film of the same name. The first two singles from the album, 'When Doves Cry' and 'Let's Go Crazy', topped the US singles charts, and were hits around the world, while the title track went to No.2 on the Billboard Hot 100. https://www.thisdayinmusic.com/stairway-to-heaven/prince/ Prince was named after his father, a jazz pianist and songwriter whose stage name was Prince Rogers, and his mother, singer with the Prince Rogers Trio. The young Prince, (whose childhood name was “Skipper”) wrote his Tagged as Prince
cc/2019-30/en_head_0021.json.gz/line1731799
__label__wiki
0.887639
0.887639
Restaurant bomber jailed for life metrowebukmetroFriday 30 Jan 2009 2:40 pm A Muslim convert who blew himself up in a restaurant during a failed suicide attack has been jailed for life with a minimum of 18 years. Nicky Reilly accidentally set off a home-made nail bomb in a toilet cubicle as he prepared to target dozens of innocent customers. The 22-year-old – who was described in court as the “least cunning person ever to have been charged with terrorism” – injured only himself in the blast in May last year. Reilly, of King Street in Plymouth, Devon, suffers from Asperger’s syndrome and has learning difficulties. He later pleaded guilty to attempted murder and preparing an act of terrorism. Sentencing him at the Old Bailey, Mr Justice Calvert-Smith said: “The offence of attempted murder is aggravated by the fact that it was long-planned, that it had multiple intended victims and was intended to terrorise the population of this country. It was sheer luck or chance that it did not succeed in its objectives.” The court was told Reilly decided to carry out his attack on the Giraffe restaurant in Exeter after being encouraged by others on the internet. He had intended to run out into the packed dining area holding three bottles, filled with caustic soda, kerosene, and nails, to his stomach. But he got stuck in the toilet as he prepared the blast, leaving one of the bottles to go off before he could get out of the cubicle. The explosion sent dozens of restaurant customers fleeing in panic and the bomber staggered out suffering serious facial injuries. Woman so badly behaved flight had to be escorted by fighter jets gets £85,000 bill
cc/2019-30/en_head_0021.json.gz/line1731804
__label__cc
0.526174
0.473826
Ḥotam Kehal Reygensburk Bibliography: Altmann, 1913, fig. 3; I. Meyer, 1913, fig. 3; Herlitz and Kirschner, 1927–30, s.v. “Regensburg”; Diamant, 1928; Straus, 1939; Monumenta Boica, 1956, No. 196; Schwarz, 1963, fig. 8; Encyclopedia Judaica, 1972, s.v. “Regensburg.” This handsome and well-preserved seal is unusually large. Within a double-line beaded border are the Hebrew letters, preceded by a five-pointed star. The field shows a crescent moon to the right and a six-pointed star to the left, the star so close that its right side fits into the arc of the moon. The seal is affixed to a document dated June 8, 1356, illustrated here. Reverse side of denarius of Emperor Hadrian, I25–28 A.D. Note should be made of the repetition of the symbols of moon and star, which appear on the earlier Regensburg seals of Petter and Gaedel (Nos. 83–84) and are also seen on antique coins such as the second-century Roman coin illustrated here. This seal is interesting because the leading Jewish principal of the document to which it is appended is a woman, Chändel, called Chändlein in the Jewish records, who was commissioned by the city to assess the taxes due from Jews newly settling in Regensburg. We have here an excellent example of the independent financial power of Jewish women in the Middle Ages. (Chändlein was murdered a few years later in a crime which was never solved.)
cc/2019-30/en_head_0021.json.gz/line1731807
__label__cc
0.623794
0.376206
» Techblog » Case study: How Ascent Solutions achieved success by going digital Case study: How Ascent Solutions achieved success by going digital With Singapore’s commitment to move towards a Smart Nation, it is clear that SMEs are in a prime spot to take advantage of the support available and develop their digital capabilities. We speak to Ascent Solutions, which has excelled by tapping into technology for their operations. Singapore is ideally positioned to benefit from its investments in technological innovations, reported the World Economic Forum in July. In other words, the country is well-prepared to reap the benefits of existing and emerging technologies created by digital innovation and disruption. Ascent Solutions, a Singapore SME specialising in logistics solutions, has done just that. During the 2016 National Day Rally, Prime Minister Lee Hsien Loong made mention of Ascent’s use of digital innovation to enhance its capabilities in the logistics sector. Of note, the company has developed iSpot, an end-to-end solution that incorporates Ascent’s electronic cargo-tracking system as well as a fleet management system. After developing groundbreaking products like iSpot, the company has expanded rapidly outside of Singapore and are now well-entrenched in African markets. Ascent’s CEO and co-founder Lim Chee Kean, who is also the vice-chairman of Singapore’s Internet of Things Technical Committee said: “With the company, I am constantly looking into various technology like Bluetooth low-energy devices, GPS, GPRS and satellite communication to create new digital solutions for existing problems. As an SME, that is how I seek to stand apart.” Use digital tools to further optimise your business Ascent's CEO and co-founder Lim Chee Kean, who is also the vice-chairman of Singapore's Internet of Things Technical Community, has been aggressively trying to expand overseas. He said: “Singapore is a small market so it is important to develop innovative solutions. Otherwise, it’s going to be very difficult,” he said. SMEs need to take advantage of existing tools and technology to help grow their exposure overseas. In addition to digitally enhanced products and solutions that is relevant for overseas markets, he stresses that SMEs must make full use of tools such as Google Analytics, which can provide a great deal of information about online engagement. The web analytics tool helps give Ascent Solutions a deeper insight into the enquiries and the type of services and products foreign visitors are interested in. Mr Lim said: “When we used Google Analytics, we knew specifically which countries the enquiries were coming from and which products and services they were interested. This helped us further refine our strategies for the different markets.” This helps us improve and optimise our company’s strategies to expand into overseas markets.” Lim attributes Ascent’s success in part to the proper use of such digital tools like Google Adwords. “Now, we are at a stage to expand aggressively. Using search engine marketing platforms like Google AdWords which helps us identify, refine and use the proper keywords for our campaigns and website, has helped our sales pipeline grow by five to six times. Without tools like AdWords, most companies wouldn’t have heard of Ascent and our products. So it is not all about coming up with these brilliant solutions. It is important to make yourself heard as well.” It is also vital that the top management understands these tools and is able to interpret the data gathered, said Lim. “This is so that management can map out their global strategy.” He added: “The best part about these tools is that they often do not require a big budget.” AdWords has also helped Ascent Solutions make the bidding process more efficient. “With Google Analytics, we know if there are tenders coming up, as we will receive an influx of inquiries from the same country and the ability to have an insight into the demographics really helps us,” he explained. “This helps us better prepare for a bid in an unfamiliar market,” said Lim. Lim noted that in the past, Ascent had to have staff fly to these remote markets personally, to verify if the enquiries were real, after which they would have had to figure out what the clients might be interested in. “Now, with Analytics, I know what they are looking for so we are much more targeted and this helps us in our productivity as well.” In short, it is essential that SMEs not only come up with solutions for a digital economy, but also use available digital tools to be heard, and to expand outside of Singapore. As Ascent has clearly illustrated, an extravagant budget is not always necessary for global success. Take advantage of Singapore’s digital infrastructure and come up innovative solutions to stay ahead. Besides developing solutions, make sure that your customers and clients know about your products or services. Use digital tools like Google AdWords or Analytics to make more informed decisions and map out your strategy. Get updates emailed to you Sign up to receive the latest myBusiness techblog articles every Friday. Its free!
cc/2019-30/en_head_0021.json.gz/line1731810
__label__cc
0.671628
0.328372
Axisware PCIM Manual: FactoryLink driver for GE Fanuc PCIM Genius Bus Uploaded by Axisware LLC Axisware PCIM Manual: FactoryLink driver for GE Fanuc PCIM Genius Bus. See the Axisware Utility manual for installation and configuration details. saveSave Axisware PCIM Manual: FactoryLink driver for GE Fa... For Later Micrium Catalog 2014 PIB4169_EAM211.pdf ANYCUBIC Mega Manual V2.3 English Enter USB TV Stick Manual log___2015-12-02_21-06-04 Axisware SYLK Manual: FactoryLink driver for Square D SY/LINK manual Synopsis Format Book - Introduction to Arduino - A.G. Smith (2011) myokent How to Install FTDI Drivers - Learn.sparkfun Instal USB tarjeta grafica.txt ICUT Manual usb psoc Comb2v5_e 212465_Chapter_1 GE Fanuc PCIM Driver for FactoryLink Axisware GE Fanuc PCIM Driver for FactoryLink 1 1 Overview......................................................................................................1 1.1 Software License.....................................................................................................1 1.2 Introduction.............................................................................................................1 1.3 Historical Note........................................................................................................1 1.4 PCIM Card Installation...........................................................................................1 1.5 Software Installation...............................................................................................1 2 Factorylink Application Configuration......................................................3 2.1 External Device Definition.....................................................................................3 2.1.1 Logical Port.............................................................................................3 2.1.2 Device Name...........................................................................................3 2.1.3 Function...................................................................................................3 2.1.4 Memory...................................................................................................3 2.1.5 Comment.................................................................................................4 2.2 Axisware GE PCIM Read/Write Control................................................................5 2.2.1 Table Name.............................................................................................5 2.2.2 Unsolicited Read.....................................................................................5 2.2.3 Exception Write......................................................................................5 2.2.4 Block Read Priority.................................................................................6 2.2.5 Block Read Trigger.................................................................................6 2.2.6 Block Read Disable.................................................................................6 2.2.7 Block Read Complete.............................................................................6 2.2.8 Block Read State.....................................................................................6 2.2.9 Block Write Priority................................................................................7 2.2.10 Block Write Trigger..............................................................................7 2.2.11 Block Write Disable..............................................................................7 2.2.12 Block Write Complete..........................................................................7 2.2.13 Block Write State..................................................................................7 2.3 Axisware GE PCIM Read/Write Information Table...............................................8 2.3.1 Tag Name................................................................................................8 2.3.2 Logical Station........................................................................................8 2.3.3 Data Region.............................................................................................8 2.3.4 Memory Offset (Address).......................................................................8 2.3.5 Bit # or Length........................................................................................9 2.3.6 PLC Data Type........................................................................................9 2.3.7 No Current Function...............................................................................9 2.3.8 Program Task Name................................................................................9 2.3.9 Program Block Name..............................................................................9 2.4 Axisware GE PCIM Logical Station Control.......................................................10 2.4.1 Logical Port...........................................................................................10 2.4.2 Timeout (Tenths)...................................................................................10 2.4.3 Card Memory Address (Hex)................................................................10 2.4.4 I/O Port Address (Hex).........................................................................10 2.4.5 Global Reference...................................................................................11 2.4.6 Global Length........................................................................................11 2.4.7 Configure Redundancy..........................................................................11 2.4.8 Redundancy Status Tag.........................................................................11 Axisware LLC support@axisware.com www.axisware.com 2.4.9 Message Tag..........................................................................................12 2.5 Axisware GE PCIM Logical Station Information.................................................13 2.5.1 Error/Status Tag Name..........................................................................13 2.5.2 Logical Station (Decimal).....................................................................13 2.5.3 Device Type..........................................................................................13 2.5.4 Station Address.....................................................................................14 2.5.5 Comment...............................................................................................14 3 Appendices................................................................................................15 3.1 Appendix A: Installation of PCIM Card..............................................................15 3.1.1 Original PCIM with DB-9P and 6 pin connector..................................15 3.1.2 Single Slot PCIM with dual 4 pin connectors.......................................17 3.2 Appendix B: Software Installation - OS/2...........................................................20 3.2.1 Before Starting Installation (OS/2 version)..........................................20 3.2.2 Driver Installation Instructions (OS/2).................................................20 3.2.3 Modifying the CONFIG.SYS File (OS/2)............................................22 3.3 Appendix C: (Reserved).......................................................................................23 3.4 Appendix D: Software Installation - Windows 95/NT........................................24 3.4.1 Before Starting Installation (Windows 95/NT version)........................24 3.4.2 Driver Installation Instructions (Windows 95/NT)...............................25 3.4.3 Modifying FLRUN.BAT File (Windows 95/NT).................................27 3.5 Appendix E: (Reserved).......................................................................................28 3.6 Appendix F: Driver Status Codes........................................................................29 3.6.1 Application startup errors.....................................................................29 3.6.2 Run-time startup errors.........................................................................31 3.6.3 SoftKey protection errors......................................................................33 3.6.4 Run-time errors.....................................................................................33 3.6.5 Unsolicited message processing errors.................................................35 3.7 Appendix G: (Reserved)......................................................................................37 3.8 Appendix H: Data Types and Conversions..........................................................38 3.9 Appendix I: Table Names....................................................................................41 3.10 Appendix J: Global Data....................................................................................42 3.11 Appendix K: Datagrams.....................................................................................45 3.12 Appendix L: (Reserved).....................................................................................48 3.13 Appendix M: (Reserved)....................................................................................49 3.14 Appendix N: Unsolicited Reads.........................................................................50 3.15 Appendix O: (Reserved).....................................................................................56 3.16 Appendix P: FactoryLink Version Upgrade Procedures...................................57 3.17 Appendix Q: Sample Application......................................................................58 4 Glossary.....................................................................................................59 5 Contact information:.................................................................................60 This document contains proprietary information of Axisware LLC (Axisware). This document is based on information available at the time of its publication. While efforts have been made to be accurate, the information contained herein does not purport to cover all details or variations in hardware or software, nor to provide for every possible contingency in connection with installation, operation, or maintenance. Features may be described herein which are not present in all hardware and software systems. Axisware assumes no obligation of notice to holders of this document with respect to changes subsequently Axisware makes no representation or warranty, expressed, implied, or statutory with respect to, and assumes no responsibility for the accuracy, completeness, sufficiency, or usefulness of the information contained herein. No warranties of merchantability or fitness for purpose shall apply. All trademarks are the property of their respectve owners. All trademarks acknowledged. Copyright 1995-1996 NOVA Technologies Copyright 1997-2000 Bullet Software Copyright 2000-2004 Axisware LLC 1.1 Software License Axisware LLC grants you a non-exclusive license to use the Software programs and related documentation for this product on a single processing unit. For each processing unit that executes the Software programs for this product you must have a unique serial number and Proof of License statement. No one other than a current Axisware employee or agent is permitted to modify or tamper with in any way the executable computer files(s) associated with this product. This license applies solely to the software contained in this product, and does not include any additional software or documentation provided by Axisware or other parties required for the proper operation of this product. This product uses a SoftKey protection method. Please consult the SoftKey manual for a discussion of the procedures to validate the SoftKey for this product. This manual describes the installation and configuration of the FactoryLink GE Fanuc PCIM communication driver software. The driver currently supports the 90-70, Series-6, GCM+ (90-30 module for Genius network), and all the currently available Genius blocks. Unsolicited messages from the 90-70 and Series-6 are supported. Diagnostic information may be read from Genius blocks. Also, configuration data can be read from or written to Genius blocks. 1.3 Historical Note This product was previously a Nova Technologies product and is now an Axisware product. The manual is correct in all technical detail except install instructions, which are detailed in the Utilities manual. Axisware has assumed all responsibilities for this product; if you see a reference to Nova Technologies consider it a reference to Axisware. 1.4 PCIM Card Installation The installation and setup of the PCIM card is briefly described in Appendix A, but you should also refer to your hardware manuals for complete information. 1.5 Software Installation If installing over a previous version of this driver, perform a multi-platform save of the FactoryLink application before the install and restore the application after installation. Please refer to FactoryLink documentation for details on multi-platform save and restore. In the appendix section are appendices describing the software installation for this product on specific platforms. Please read the appropriate appendix before installing this product. Platform Appendix OS/2 B Windows NT D When the driver software installation is completed, please refer to the SoftKey Manual for the instructions on running the Validate program. Failure to run Validate by the end of the 15-day grace period will result in a non- functioning driver. After this communications driver has been installed, updating to a newer version of FactoryLink may appear to cause operational problems. Please refer to Appendix P before updating FactoryLink. 2 Factorylink Application Configuration 2.1 External Device Definition Access this table by selecting External Device Definition from the Configuration Manager main menu. This is one of the five configuration tables that must be configured The other tables are accessed by selecting Axisware GE PCIM Driver from the Configuration Manager main menu. This table identifies the computer’s ports and I/O cards through which the devices will communicate with FactoryLink. In this table identifiers are declared which make the external devices recognizable to FactoryLink. This panel contains seven fields. Use the Tab key to move among the fields. 2.1.1 Logical Port Number assigned by the user to indicate a particular communication path. This number must be unique for each EDI driver used in the application. Valid entries: 0-999 Physical Card & Physical Port These fields are not used by this driver. 2.1.2 Device Name The four-character device name for the EDI driver that will use the related Logical Port. Valid entry: "PCIM" 2.1.3 Function Type of communication used by the EDI driver for the related Logical Port. This field refers to the different types of EDI communication modes. Valid entry: "SYSPRG" 2.1.4 Memory The amount of memory in K-bytes used for the block storage size of the read and write information entered by the user. This entry refers only to the memory used by the driver for data storage for the related Logical Port. Valid entries: 4-63 2.1.5 Comment (Optional) Description for the current Logical Port. Used only for application documentation. Valid entry: 14 alphabetic or numeric characters 2.2 Axisware GE PCIM Read/Write Control This table specifies the tags used to control the reading and writing of the values specified in the Read/Write Information table (the controlling tags are the Read Trigger, Read Disable, Write Trigger, Write Disable). It also defines the tags that will report the status of reads and writes (the status tags are the Read Complete, Read State, Write Complete, Write State). Each line in this table refers to one Read/Write Information After these fields have been configured, select "Next" or Ctrl-N to edit the Read/Write Information Table corresponding to the Control table selected by the cursor. 2.2.1 Table Name User assigned name of the Read/Write Information Table to be defined or modified. Appendix I contains additional information for the naming conventions that must be followed to configure Fault/Diagnostic or Configuration tables for Genius blocks. Valid entry: ASCII string incorporation up to 16 of the following character set: A-Z,a-z,@,$,_, or 0-9 2.2.2 Unsolicited Read Allows you to select whether or not the current table will be considered in the processing of an unsolicited message received from the PLC. Standard addressing is used to correlate the message from the PLC with the tags configured in the table. Please refer to Appendix N for additional information and examples. Valid entries: Descriptions: Yes Normal write to the real-time database Force Forced write to the real-time database No No unsolicited reads are processed 2.2.3 Exception Write Option determining whether or not a specific tag in the related Read/Write Information Table is written to the selected logical station whenever the real-time database value for that tag changes. Valid entries: Description: Yes A change of status of any element in the table generates a write of that element's value. No No exception processing. 2.2.4 Block Read Priority Priority influencing the order in which the EDI task handles the queuing of block read requests. If two requests are received simultaneously by EDI, the request with the highest priority (lowest number) is processed first. Valid entries: 1 - 4 (default = 1) 2.2.5 Block Read Trigger Digital tag whose value, when forced to 1 (ON), initiates a block read of the values specified in the related Read/Write Information Table. This trigger allows the block read operation to be initiated by some other task. Valid entry: FactoryLink digital tag 2.2.6 Block Read Disable Digital tag used to determine whether or not a block read table will be processed. If the tag value is 0, the table is permitted to function normally; however, if the value is 1, the table will not respond to the Block Read Trigger defined above. 2.2.7 Block Read Complete Digital tag whose value is force written to 1 (ON) by the EDI task whenever any block read operation for this table is completed. If this tag is specified then when the EDI task initializes, its value is force written to 1 (ON). Note: Block Read Complete tags are valid only if a different table is used for each logical port. 2.2.8 Block Read State Digital tag whose value is 0 (OFF) when a block read of the tags specified in this table is in progress and 1 (ON) otherwise. If this tag is specified then when the EDI task initializes, its value is force written to 1 (ON). Note: Block Read State tags are valid only if a different table is used for each logical port. 2.2.9 Block Write Priority Priority influencing the order in which the EDI task handles the queuing of block write and exception write requests. If two requests are received simultaneously by EDI, the request with the highest priority (lowest number) is processed first. Valid entries: 1-4 (default = 1) 2.2.10 Block Write Trigger Dgital tag whose value, when forced to 1 (ON), initiates a block write of the values specified in the related Read/Write Information Table. This trigger allows the block write operation to be initiated by 2.2.11 Block Write Disable Dgital tag used to determine whether or not a block write table will be processed. If the tag value is 0, Block Write Trigger defined above. 2.2.12 Block Write Complete Dgital tag whose value is force written to 1 (ON) by the EDI task whenever any block write operation for this table is completed. If this tag is specified then, when the EDI task initializes, its value is force Note: Block Write Complete tags are valid only if a different table is used for each logical port. 2.2.13 Block Write State Dgital tag whose value is 0 (OFF) when a block write of the tags specified in this table is in progress and 1 (ON) otherwise. If this tag is specified then, when the EDI task initializes, its value is force written to 1 (ON). Note: Block Write State tags are valid only if a different table is used for each logical port. 2.3 Axisware GE PCIM Read/Write Information Table The Read/Write Information Table links FactoryLink tags to specific addresses in the PLC represented by the Logical Station. Values are either read into the tags from the device or written from the real-time database tags to the device. These tables are sometimes referred to as overlay panels, or ovr panels. Each table has one entry (line) for it in the Read/Write Control Table. Note: Please verify that the table name displayed at the bottom of the panel correctly shows the table to be modified. After these fields have been completed, select "Next" or Ctrl-N to edit the Logical Station Control Table. 2.3.1 Tag Name Name of the FactoryLink tag to be updated as a result of the read operation or the tag from which information is taken to be written to the device. Valid entry: FactoryLink tag (DIGITAL, ANALOG, LONGANA, FLOAT, MESSAGE) 2.3.2 Logical Station Number from the Logical Station Table identifying the particular combination of physical attributes that will define and govern the data transfer to and from the real-time tag. Valid entries: 0-999 2.3.3 Data Region Mnemonic defining area of device memory to be accessed, or manner in which device is to be addressed, e.g., AI, AQ, G, R, ... Sometimes called “Data Table” or “Reference Table”. Valid entries: Please refer to Appendices J (Global Data) & K (Datagrams) for further information. 2.3.4 Memory Offset (Address) Numeric portion of device address. Sometimes referred to as “Element”. May be word, byte, or bit address depending on the selected device and Data Region. Valid entries: Please refer to Appendix J (Global Data) & Appendix K (Datagrams) for further information. 2.3.5 Bit # or Length If a digital tag is used and a byte or word oriented data region has been selected, this field is zero base and is used to specify the bit offset in the selected byte or word. If a message tag is used, the field specifies the number of bytes that are to be transferred between the message tag and the Logical Station. Valid entries: Digital tags 0 - 7 (Byte addressing) 0 - 15 (Word addressing) Message tags 1 - 127 2.3.6 PLC Data Type Data type for information being read/written from/to the Logical Station. Valid entries: Please refer to Appendix H for further information. 2.3.7 No Current Function This field has been included to maintain compatibility with the GE SNP driver tables. The entry must be left as the default. Valid entry: XX 2.3.8 Program Task Name Used only for the 90-70 Bus Controller and specifies the program task name required for the data regions "L" and "P". Valid entries: Alphabetic string of up to 7 characters with no embedded spaces 2.3.9 Program Block Name Used only for the 90-70 Bus Controller and specifies the program block name required for data region "L". Axisware GE Fanuc PCIM Driver for FactoryLink 10 2.4 Axisware GE PCIM Logical Station Control This table is used to configure each logical port and its associated stations in the Logical Station Information table. It specifies which specific port is connected to the external device being defined. After completing these fields, select "Next" or Ctrl-N to edit the Logical Station Information Table corresponding to the table selected by the cursor. Number specified in the External Device Definition Table which represents a particular communications path. This number must also be referenced in the External Device Definition panel. 2.4.2 Timeout (Tenths) Number of tenths of seconds permitted for the driver to process a request. Valid entries: Actual value in tenths of seconds. 20 to 30 (or 2 - 3 seconds for most applications). 2.4.3 Card Memory Address (Hex) Address for memory shared by the PCIM card and the FactoryLink CPU. This number must match the address configured for the PCIM daughter board. Valid entries: Hex memory address between A000 and F800 (E000 suggested) Example: A000, A800, B000, ..., E800, F000, F800 Please refer to Appendix A for further information. 2.4.4 I/O Port Address (Hex) I/O port address as configured for the PCIM daughter board. Valid entries: Hex port address as allowed by PCIM card (3E0 hex suggested) 2.4.5 Global Reference Global Data Reference Address used by some devices on the Genius network. Check documentation for specific device to determine if and how it is used. This value is not used directly by the PCIM driver; however, the integer value is written to the card and is available to other devices on the network. Valid entries: 0 - 32000 2.4.6 Global Length Number of bytes broadcast as global data and directed outputs and number of bytes received as global data and directed inputs. Note: The number of bytes broadcast as global data can drastically affect the speed of the Genius Valid entries: 0 - 128 bytes 2.4.7 Configure Redundancy Specifies whether redundant bus controllers exist on the Genius network as devices 30 and 31. YES Redundant bus controllers have been configured on the Genius network. All writes directed toward device 31 will also be sent to device 30. All reads directed toward device 31 will be redirected to device 30 if 31 is no longer on the network or fails to respond. NO No special operations are desired. 2.4.8 Redundancy Status Tag (Optional) Analog tag to which the redundancy status will be written during run-time. The following codes may be returned by the driver: 0 - Both devices running properly 1 - Device 31 down but 30 is running properly 3 - Both devices are down Valid entry: FactoryLink analog tag 2.4.9 Message Tag (Optional) Message tag to which a text string will be written in the case of any error encountered in the processing of an EDI request. Valid entry: FactoryLink message tag 2.5 Axisware GE PCIM Logical Station Information This table defines the logical station(s) accessible through a specific logical port defined in the Logical Station Control Table. Each logical station is tied to its physical station address and device type. This logical station information structure allows communications to multiple devices on a network using one logical port. Note: Please verify that the table name displayed at the bottom of the panel is showing the table to be After these fields have been completed, "Exit" or F3 will allow you to return to the Configuration Manager main menu. 2.5.1 Error/Status Tag Name (Optional) Analog tag to which all error codes for this logical station are to be written. Valid entries: FactoryLink analog tag 2.5.2 Logical Station (Decimal) Number entered by user to represent a particular combination of a logical port (PCIM card) and physical device (PLC). This number is referenced in the Read/Write Information Table to correlate specific addresses and tags with a physical device (PLC). This number must be unique for each four-letter device ID (PCIM). 2.5.3 Device Type Type of device on Genius network with which communications are to be established. "90-30" 90-30 bus controller "Series5" Series-5 bus controller (Possible future revision) "Series6" Series-6 bus controllera "GCM" 90-30 GCM+ "GDIO_8" Standard 8-circuit I/O block "GIIO_8" Isolated 8-circuit I/O block "GDI_16" 16-circuit input block "GRO_16" 16-circuit relay output block "GDIO_16" Standard 16-circuit I/O block "GA4I_2O" Analog block with 4 inputs and 2 outputs "GS4I_2O" Source block with 4 inputs and 2 outputs "GS6O" Source block with 6 outputs "GRTD_6I" RTD block with 6 inputs "GTC_6I" Thermocouple block with 6 inputs "GHSCNT" High speed counter block "GPWRTRAC" Power monitor block "PCIM" PCIM card 2.5.4 Station Address Genius network address of device with which communications are to be established. (Optional) Description for the current Logical Station. Used only for application documentation. 3 Appendices 3.1 Appendix A: Installation of PCIM Card There are two types of GE Fanuc PCIM card: the original PCIM with DB-9P and 6 pin connector; the Single Slot PCIM with dual 4 pin connectors. Thedriver supports both cards. This appendix explains how to set up either of these cards to work with the driver. 3.1.1 Original PCIM with DB-9P and 6 pin connector The GE Fanuc PCIM card must be installed in the computer in an open, full length slot. However, prior to the card's installation, the appropriate I/O port address, interrupt, baud rate, serial bus address, shared memory segment address, watchdog timer setting and any application-specific settings must be properly set by jumpers or switches. For more information on installing the GE Fanuc PCIM card then is cover in this section refer to GE Fanuc manual “Genius I/O PCIM User’s Manual” Pub. # GFK-0074A. 3.1.1.1 Jumpers and Switches I/O Port Address The I/0 port address is selected by SW1 on the PCIM card. The eight dip switches on SW1 are set in accordance with what is specified in the PCIM manual (GFK-0074A). An I/O port address setting of 3E0 (hex) is recommended; the following chart illustrates the proper switch settings for this address. I/O PORT ADDRESS 3E0 C C C 0 0 0 0 C = Closed O = Open Interrupt Level The interrupt level is selected by SW4 on the PCIM card. The current version of the driver does not support interrupts; therefore, all six switches must be open. The baud rate is selected by dip switches six (6) and seven (7) on the switch assembly which resides on the PCIM daughterboard (Please refer to the PCIM manual). Both of these dip switches should remain open unless the network requires a lower baud rate because of noise. Please note that all nodes on one Genius network must have the same baud rate Serial Bus Address The serial bus address is selected by the first five dip switches on the switch assembly which resides on the PCIM daughterboard (Please refer to the PCIM manual). This address must be unique from all other nodes on the Genius network. Valid addresses range from zero (0) to thirty-one (31); however, care should be taken to avoid conflicts with the hand held monitor and bus controllers which generally reside at address zero (0) and thirty-one (31), respectively. The following example would configure the PCIM card at serial bus address ten (10). SERIAL BUS ADDRESS 10 Daughterboard Switches C O C O C X X X X = Not used for address Shared Memory Segment Address The shared memory segment address is selected by SW2 and SW3 on the PCIM card. The six dip switches on each of the two switch assemblies are set in accordance with the PCIM manual. Please note that switch one (1) of SW3 must be open for the driver to properly function. A shared memory segment address of E0000 (hex) is recommended; the following chart illustrates the proper switch settings for this address. SHARED MEMORY SEGMENT ADDRESS E0000 C C C O O O O X X X X X X = Not used The watchdog timer MUST be disabled by placing jumper JP2 in the 1-2 position (Please refer to the PCIM manual). If JP2 is left in the 2-3 position, the driver will not complete any requests. Application-Specific Settings Two (2) selections on the board remain which should be configured in accordance with the needs defined by the specific application. JP1 is used to connect or disconnect the terminating resistor; please see discussion in the PCIM manual. Dip switch number eight (8) on the PCIM daughterboard is used to enable or disable outputs from the PCIM card. If outputs are enabled, all devices capable of receiving directed global data will receive their outputs from the PCIM card. If outputs are disabled, only those devices to which writes have been configured in FactoryLink will receive their outputs from the PCIM card. Both of these settings can be selected to meet the needs of the specific application. The required communication cable is discussed in the PCIM manual. The same twisted shielded pair used for other Genius network devices should be used with the PCIM card. The six (6) pin connectors on the back of the PCIM card should be wired as follows: pin 1 is Serial 1, pin 2 is Serial 2, pin 3 is Shield In, and pin 4 is Shield Out. Pin 5 and pin 6 are not used. 3.1.2 Single Slot PCIM with dual 4 pin connectors The GE Fanuc PCIM card must be installed in the computer in an open, full length slot. However, before installing the card the appropriate I/O port address for configuring the board must be set in the DIP switch on the PCIM board. The GE Fanuc PCIM card must be configured with the configuration software “DPCIMCFG.EXE” provided be GE Fanuc. For more information on installing the GE Fanuc PCIM card please refer to the GE Fanuc manual “Single-Slot PC Interface Module (PCIM)” Pub. # GFK-0881. Note: It is important to note that “DPCIMCFG.EXE” is a DOS program. It will run in a DOS window in Windows and also in a DOS window in OS/2 but it will not correctly run in a DOS window under Windows NT. To configure the card on Windows NT the computer MUST be booted in DOS.. Note: The FactoryLink GE Fanuc PCIM Communication Driver WILL support two PCIM daughter boards on the same PCIM card. Simply treat the daughter boards as two separate cards. 3.1.2.1 Switches The default setting for the Board Address DIP switches is 222hex. If there are multiple PCIMs or if the address conflicts with addresses used by other modules, it must be changed to an address in the range 102hex to 3FEhex. Switches 1 and 2 set the high hex digit, 3, 4, 5, and 6 set the middle digit, and switches 7 and 8 set the low hex digit. Switch Positions for 222hex (default): Switch: 1 2 3 4 5 6 7 8 U D D D U D D D U = Up D = Down 3.1.2.2 Configuration Software Use the up and down arrow keys to move to the field labeled I/O base and enter in the desired I/O Port address in HEX. Note: This I/O Port to be entered in the “Axisware GE PCIM Logical Station Control” I/O Port Address field NOT the I/O Port set with dip switches on the card.. Use the up and down arrow keys to move to the field labeled Interrupt. The current version of the driver does not support interrupts; therefore, the Interrupt field must read “Disabled”. Use the left and right arrow keys to toggle the field to disabled. Use the arrow keys to move to the field labeled Baud. Use the left and right arrow keys to select the desired network Baud Rate. The baud rate should remain “153.6K Std” unless the network requires a lower baud rate because of noise. Please note that all nodes on one Genius network must have the same baud rate. Use the up and down arrow keys to move to the field labeled Device and type in the desired Serial Bus Address. This address must be unique from all other nodes on the Genius network. Valid addresses range from zero (0) to thirty-one (31); however, care should be taken to avoid conflicts with the hand held monitor and bus controllers which generally reside at address zero (0) and thirty-one (31), respectively. Use the up and down arrow keys to move to the field labeled Memory base and enter the desired Shared Memory Address. The watchdog timer MUST be disabled. Use the up and down arrow keys to move to the field labeled Watchdog then use the left and right arrows to toggle to the selection disabled. 3.1.2.3 Cable Connections other Genius network devices should be used with the PCIM card. The four pin connectors on the back of the 3.2 Appendix B: Software Installation - OS/2 3.2.1 Before Starting Installation (OS/2 version) Updating From A Previous Version: If the driver software is an update from an older version of the driver, the following procedures must be followed for the software to be properly installed. First, the operator must exit from both the Run Manager and the Configuration Manager. Second, a multiplatform save file should be created. Third, the driver should be installed as described below. Fourth, restore the multiplatform save file created in step 2. Fifth, update the Configuration Manager tables for the NOVA Technologies driver (Logical Station Information). The install command file relies upon the environment variable $FLINK to complete the installation process. ($FLINK is used to refer to the environment variable “FLINK”, which points to the FactoryLink directory.) Before starting the install program you may want to manually set $FLINK if you want to have the files copied to a directory other than the default of C:\FLOS2. If $FLINK has not been defined when the install is started, you will be requested to exit and assign a value to $FLINK, and then restart the install program. $FLINK can be assigned a value by using the SET command (example: set flink=d:\flos2). During the installation, two ASCII text files will be modified by the installation program. The original copies of both files will be copied to a file with the same filename but a .NVA extension. The first file to be modified is $FLINK\AC\TITLES This file is used by the Configuration Manager to determine which tasks to list and also the order in which they are to be listed. The following line will be added to the TITLES file. (The line may be different, depending on your FactoryLink version.) pcim.ac EDI NOVA GE PCIM Driver If you have a backup file named $FLINK\AC\TITLES.NVA (possibly created by a previous install), the program will warn you during the install that it is about to be overwritten and will ask you if you want to exit, and manually save the .NVA file. The second file to be modified is $FLINK\CTGEN\CTLIST. This file is used by the CTGEN utility in the creation of the binary files used by the Run-time FactoryLink. The following line will be added to the CTLIST file. pcim: pcimshdr pcimsovr pcim_hdr pcim_ovr If you have a backup file named $FLINK\CTGEN\CTLIST.NVA (possibly created by a previous install), the program will ask you during the install if you wish to exit, and manually save a copy of this .NVA file before it is overwritten. 3.2.2 Driver Installation Instructions (OS/2) It is important that you have followed the hardware installation procedures described in Appendix A before proceeding with the driver installation instructions. The driver software is loaded by inserting the driver diskette in drive A or B. At the OS/2 command prompt, make the drive containing the diskette the current working drive, type INSTALL and then press Enter. Note: A source other than drive A or B can be used; e.g., from a directory on a hard drive, or across a If a message is displayed stating that the INSTALL program is having difficulty finding the directory containing the FactoryLink program files, press a key to exit and use the set command to reset the FLINK environment variable. The problem may be resolved by clearly stating the drive letter. At the OS/2 command prompt type set FLINK= followed by the drive letter (a-z), a colon (:), a backslash (\) and the directory name (s) giving the path to the FactoryLink program files. Examples: set FLINK=d:\work1\flos2 or set FLINK=t:\sect2\factory. Make sure that the only space in this command is between “set” and “FLINK”. After the “NOVA Technologies” screen appears the FactoryLink Path and FactoryLink Release Version are displayed. Press y and then the Enter (Return) key if the information is correct. The driver Serial Number and Release Type are then displayed. Press y and then the Enter (Return) key to continue. The following message will appear Copying configuration files to hard disk . . . followed by a message relevant to obtaining authorization for the product, if required. The install program checks for a backup file named $FLINK\AC\TITLES.NVA. If found, the following message is displayed: This install program will update your file named $FLINK\AC\TITLES $FLINK\AC\TITLES.NVA (a backup file) already exists. To overwrite it, press y followed by Enter (Return). By pressing n, you may Exit, manually save your .NVA backup file, and restart this program.. Enter either y or n followed by the Enter (Return) key ==> The install program will then go through the same procedure before updating the file $FLINK\CTGEN\CTLIST. The install program checks for a backup file named $FLINK\CTGEN\CTLIST.NVA. If found, this message appears: $FLINK\CTGEN\CTLIST $FLINK\CTGEN\CTLIST.NVA (a backup file) already exists. By pressing n, you may Exit, manually save your .NVA backup file, and restart this program. The messages Updating listing of driver names. . . Updating CTLIST . . . are briefly displayed while the backup (.NVA) versions are being created and the $FLINK\AC\TITLES and $FLINK\CTGEN\CTLIST files are updated. If one of the following error messages appear: !!!! Unable to update $FLINK\AC\TITLES file !!!! Unable to update $FLINK\CTGEN\CTLIST file the lines to be added to these files can be typed in manually using a text editor. Please refer to the section Before Starting Installation (OS/2 version) for the specific lines and where they are to be added. Please notice any additional messages displayed on the screen. When all of the necessary files have been copied the following message will appear on the screen: .....NOVA Installation Program Completed. 3.2.3 Modifying the CONFIG.SYS File (OS/2) The device driver NOVAMEM.SYS must be loaded into memory when your system boots in order for the FactoryLink PCIM driver to function properly. After the INSTALL program is run, the CONFIG.SYS file must be modified manually, using a text editor, such as OS/2’s System Editor. The following line (or one similar) must be added to the OS/2 CONFIG.SYS file. The directory specified for the device driver is created when the software is installed from the installation diskette. Assuming that $FLINK is set to c:\flos2, the line should be: DEVICE=C:\FLOS2\EDI\PCIM\NOVAMEM.SYS It is very important that only one reference to this device driver be made in the CONFIG.SYS file. This driver will support four cards. They may be PCIM cards, or other cards that use the NOVAMEM.SYS Note: The changes you make to your CONFIG.SYS file will not take effect until you reboot your system. 3.3 Appendix C: (Reserved) This appendix is reserved for future use. 3.4 Appendix D: Software Installation - Windows 95/NT 3.4.1 Before Starting Installation (Windows 95/NT version) ($FLINK, is used to refer to the environment variable “FLINK”, which points to the FactoryLink directory.) copied to a directory other than the default of C:\FLNT. If $FLINK has not been defined when the install is started, you will be requested to exit and assign a parameter to $FLINK, and then restart the install program. $FLINK can be assigned a value by using the SET command from a DOS prompt (example: set flink=d:\flnt). modified is $FLINK\AC\TITLES. This file is used by the Configuration Manager to determine which tasks to pcim.ac EDI Axisware GE PCIM Driver 3.4.2 Driver Installation Instructions (Windows 95/NT) The driver software is loaded by inserting the driver diskette in drive A or B. After making the drive containing the diskette the current working drive, type INSTALL at a DOS prompt and press Enter. The installation may also be started by using File… Run…from Windows NT’s Program Manager or File Manager, or by using Start… Run.. environment variable. The problem may be resolved by clearly stating the drive letter. At the DOS command set FLINK=d:\work1\flnt or set FLINK=t:\sect2\factory. Make sure that the only space in this command displayed. Press y and then the Enter (Return) key if the information is correct: The driver Serial Number and Release Type are then displayed. Press y and the Enter (Return) key to %FLINK%\AC\TITLES %FLINK%\AC\TITLES.NVA (a backup file) already exists. $FLINK\CTGEN\CTLIST. The install program checks for a backup file named $FLINK\CTGEN\CTLIST.NVA. If found, this message appears: %FLINK%\CTGEN\CTLIST %FLINK%\CTGEN\CTLIST.NVA (a backup file) already exists. !!!! Unable to update %FLINK%\AC\TITLES file !!!! Unable to update %FLINK%\CTGEN\CTLIST file the lines to be added to these files can be typed in manually using a text editor. Refer to the section Before Starting Installation (Windows NT version) for the specific lines and where they are to be added. When all of the necessary files have been copied the following message will appear on the screen: Restart your computer to ensure that all changes have been properly made. 3.4.3 Modifying FLRUN.BAT File (Windows 95/NT) During the installation process, the NOVAMEM.SYS device driver is registered with the Windows NT system registry. However, an additional step is required to actually start the NOVAMEM.SYS device driver. The NOVAMEM device driver must be loaded for the communications driver to function. This can be accomplished by either of two methods. The first is by adding the following command to the FLRUN.BAT (located in $FLINK\BIN\). The line should be added just beneath the 'setlocal' command line. net start novamem A better method is to open the Control Panel folder located on the Windows NT Program Manager, then start the Devices program using the icon located in that folder. Scroll down the list of services until NOVAMEM is located, then change its startup type to SYSTEM. 3.5 Appendix E: (Reserved) 3.6 Appendix F: Driver Status Codes 3.6.1 Application startup errors The following error codes (alphabetized) may be reported to FactoryLink while the GE PCIM Driver tables are being processed at startup. Bitwise data anomaly Duplicate binary address encountered. Configuration/Fault information may not be accessed for bus controllers / GCM / PCIM The selected device does not support datagrams that read or write configuration/ fault information. If this information is needed for a bus controller, it may be read from the bus controller by the host PLC and then read into FactoryLink from the PLC. Configuration/Fault information may only be returned with types DGBIT, DGBYT, and DGWRD If configuration data is to be read from or written to a Genius block, one of these Data Regions must be used. All other data regions are considered invalid. Data anomaly Indicates that addresses and data types specify overlapping elements. Datagram write not valid for selected Genius block Write operations via datagrams are not valid to the selected Genius block; however, some blocks permit global data writes. Data offset invalid for PCIM card memory When memory accesses are defined in the Read/Write Information Tables, the maximum byte offset is 128. Data offset must be non-zero for selected data table Only GIBYT, GOBYT, DGBYT, DCBYT, WDBYT are zero based. All other data tables (regions) are one based, and, therefore, must have addresses which are greater than 0. Data table invalid for Genius block DGBIT, DGBYT, and DGWRD are the only datagrams supported for Genius blocks. However, global data may also be read from blocks. Data table "L" for 90-70 requires both task and block names The specified data table (region) is not valid unless the program task name and program block name are both given. Data table "P" for 90-70 requires task name The specified data table (region) is not valid unless the program task name is given. DIGITAL tags may not be used with numerical types DIGITAL tags may only be used to read or write discretes. Digital write not allowed for word address The protocol for the 90-70 does not permit digital writes to be directed toward word addresses. (R, AI, AQ, L, P) Digital write not valid for Genius block datagram Datagrams to Genius blocks do not support digital writes. Invalid bit number specified A bit number greater than 15 may not be specified. Specifying the proper byte or word will allow access to all bits without exceeding this limit. Invalid data offset specified for High Speed Counter The addressing for the High Speed Counter is different than any other device. Please refer to Appendix K for the details concerning addresses for this device. Invalid data table specified for X Please refer to Appendix J (Global Data)& Appendix K (Datagrams) for a list and discussion of valid addresses for each device. X represents the specific device selected. Invalid data type encountered Please refer to Appendix H for list of valid data types. Invalid data type selected for device The number of bytes required for the data type specified is greater than the maximum number of bytes returned by the selected device. Invalid data type selected for High Speed Counter Only four bytes of data may be requested from a High Speed Counter. Any data type requiring more than four bytes is invalid. Invalid device type specified The data file is corrupted and contains a device not recognized by the driver. Delete the indicated record and type in the record again, selecting a valid device type. Logical station X not found The logical station X was specified in the current Read/Write Information Table, but this logical station number was never defined in the Logical Station Information Table. MESSAGE tags may not be used with numerical types Only the ASC data type may be used with MESSAGE tags. Negative data offset not permitted No data region supports a data offset of less than zero. Enter a valid positive address for the offset. No tag given The indicated line of the Read/Write Information Table currently being processed does not contain a valid FactoryLink tag name. No tags, read/write packet not made The current Read/Write Information Table contained entries that caused a portion of the table to generate an error and consequently no DCT information was output. Only DIGITAL tags may be used with BIN Binary data may only be accessed with DIGITAL tags. Only GIXXX and GOXXX used with digital blocks, GCM, or PCIM card Please refer to Appendix J (Global Data) & Appendix K (Datagrams) for the details of addressing each device. Only MESSAGE tags may be used with ASC ASCII strings may only be read into MESSAGE tags. Ordering anomaly Indicates that the Read/Write Information Table currently being processed contains addresses such that the driver is unable to properly arrange all the entries. Out of Memory The driver was unable to internally allocate all the necessary memory. Allocate more memory in the External Device Definition Table. Positive string length for MESSAGE tags required If a message tag is used, the Bit # or Length field in the Read/Write Information Table represents the length (in bytes) of the message used in the transaction. This number must be between 1 and 128. Specified configuration/fault offset or data length is too large There are a limited number of configuration and fault bytes available for each Genius block. The requested offset and data type defines a transaction which is beyond the end of the data that can possibly be returned. Unsolicited not permitted for configuration/fault tables Configuration tables and fault tables may not be processed as unsolicited messages. Only standard tables for 90-70 and Series-6 PLCs will be processed and evaluated to resolve incoming unsolicited messages. Writes are not permitted for fault table The operator has configured writes in a fault table. Diagnostic information may not be written to a Genius device. Write not allowed to specified data table Status tables in the 90-70 are configured to be read only. Any writes defined to these regions are considered invalid. 3.6.2 Run-time startup errors The following errors (alphabetized) may be reported when the EDI task is started after all tables have been processed. All the following errors are immediately fatal. Cannot get pointer from card driver (error : X) [OS/2 only] System call failed to return card pointer. Check that the driver NOVAMEM.SYS is specified in the CONFIG.SYS file as indicated in Appendix B. Cannot open device (error: X) [OS/2 only] Unable to open the OS/2 device driver NOVAMEM.SYS. Check that this file is specified in the CONFIG.SYS file as indicated in Appendix B. Invalid global length The global length entered on the Logical Station Control Table must be between 0 and 128. If this error occurs, the driver corrects the value to 128 and continues. Invalid redundancy status tag The redundancy status tag entered on the Logical Station Control Table must be an analog tag. If this error occurs, the driver functions as if no tag was configured. No heartbeat detected after setup complete Check the PCIM card jumpers, dip switches, and that it is properly inserted. Verify that the watchdog timer has not been enabled. Ensure that no shared memory conflicts (including ROM shadowing) exist. PCIM card failed to initialize in allowed time PCIM communications error PCIM configuration error returned PCIM configuration never accepted PCIM OK signal never received from card Specified I/O port address X is invalid The I/O port address must be on a four byte boundary. The address must fall between 200 hex and 6FF hex. Timeout waiting for card reset The PCIM card did not respond as expected. Check all card jumpers, dip switches, and verify that the PCIM card is properly inserted. Verify that the watchdog timer has not been enabled. Ensure that no shared memory conflicts (including ROM shadowing) exist. Unable to allocate needed memory Increase memory allocated to PCIM task. 3.6.3 SoftKey protection errors Messages relating to SoftKey protection may appear after the driver has been initialized by the EDI task. Please refer to the SoftKey manual if they appear. If SoftKey does not detect a problem the following message will be displayed. Serial #: XXXXXXX Single Processor Run Time License This is a normal informational message displaying the product name and your Serial Number. 3.6.4 Run-time errors The following errors may be reported while the driver is processing the EDI requests. The text represents the error message returned to the message tag defined in the Logical Station Control Table. The number in parentheses is returned to the analog tag defined in the Logical Station Information Table. While the following errors are not immediately fatal, recurring errors should be evaluated and eradicated to maintain the integrity of the network. (10) Device X failed to respond The indicated Genius device did not respond to a datagram. Check cabling and the device address. Also check that no restrictions concerning global data are being violated. (11) Buffer manipulation error Internal communication error between DSF and CPT module. Please contact Axisware if the error persists. (12) Datagram may not be sent to host PCIM The configured transaction defined a datagram to the host PCIM card. (13) Station 31 down - Control to redundant CPU! Station 30 down - No backup CPU! Redundancy failure - No CPU response! A redundancy error was detected by the driver. The Redundancy Status Tag should be used to determine the exact status of redundancy. (14) Device X not found on network The indicated Genius device was not found on the network. Check cabling and the device address. Also check that no restrictions concerning global data are being violated. Error may also be seen on the Windows platform if memory is not properly excluded in SYSTEM.INI or CONFIG.SYS. (15) Syntax error occurred on read from/write to device X The transaction defined to the specified device could not be completed because of a syntax error. If the error persists, contact Axisware. (16) Process error occurred on read from/write to device X The transaction defined to the specified device could not be completed because of a process error. Verify that the transaction is valid. This error occurs if an invalid area of memory is being accessed or a device does not accept a datagram. (17) Unknown error Y occurred on read from/write to device X The transaction defined generated an unknown error. Verify that the transaction is valid. Contact Axiswares if the error persists. (18) Lockout table malfunction The PCIM card is not responding as expected. Check that card is configured properly. If error persists, contact Axisware (19) Zero length buffer error A request has been made to the CPT module with a zero byte transaction length. This error should not occur, please contact Axisware. (20) Timeout waiting for clear to transfer Transmit buffer on PCIM card was not free to receive new message before timeout occurred. Check that all messages are valid, that the card is properly configured, and that the timeout value specified in the Logical Station Control Table is greater than the total driver cycle time. (21) Timeout initializing PowerTRAC data PowerTRAC failed to give data ready signal within allowed time. Check block configuration and timeout values. (22) Overcurrent data not available for device X Overcurrent data can only be read from a PowerTRAC block when an overcurrent error has occurred. The status word returned from the PowerTRAC block contains this information. (40) XXXX pcimdsf dsf_read()/dsf_write() error returned from dsf_t_q_mail() Internal queue handling error encountered. Contact Axisware. (41) Calculated memory address out of range The maximum memory offset for global data must be less than the Global Length configured in the Logical Station Control Table. (42) Bytes requested less than one Internal processing error. Contact Axisware if the error persists. (43) Module communication timeout Communication failure between modules. Increase the timeout specified in the Logical Station Control Table. If the error persists, contact Axisware. (44) Datagram write to block not supported The operator attempted to write data to a Genius block. This operation is not supported by the Genius protocol. (45) DSF attempt to write fault information Diagnostic or fault information may only be read. Any attempt to write such information will generate an error. 3.6.5 Unsolicited message processing errors The following errors may be reported while the driver is attempting to process unsolicited message requests. The text represents the error message returned to the message tag defined in the Logical Station Control Table. While the following errors are not immediately fatal, recurring errors should be evaluated and eradicated to maintain the integrity of the network. Unsolicited queue full; messages may have been lost Only 16 unsolicited messages may be queued to the PCIM card at one time. This error indicates that the driver cannot process the messages as quickly as they are received. No unsolicited reads have been defined An unsolicited message has been received over the Genius network; however, no unsolicited messages were defined in the Configuration Manager. If unsolicited messages are to be used, at least one line on the Read/Write Control Table must specify unsolicited message support. Unable to establish unsolicited index Internal software error, contact Axisware. Unable to evaluate unsolicited message An unsolicited message was received over the Genius network with an unexpected format. Please check Appendix N for details concerning the processing of unsolicited messages. X undefined unsolicited message - Y An unsolicited message directed toward device X, address Y was received. This address has not been configured as an unsolicited message in the Configuration Manager. EDI DSF pointer error Software error; contact Axisware. Linked list error Unable to allocate memory for all unsolicited messages Allocate more memory to EDI task. Please note that the current driver limits the number of unsolicited messages configured to about 6500 due to the segment size. If this limit is reached, please contact Axisware. Maximum number of unsolicited reads exceeded A maximum number of 32,000 unsolicited reads may be configured. However, the practical limitation due to memory is about 6500. If this limit is reached, please contact Axisware. Unsolicited message received, but length invalid The length specified in the unsolicited message is greater than 136. Check that the message from the 90-70 or Series-6 is valid. Please refer to Appendix N for more information. Partial byte detected within returned data Due to the 90-70 binary addressing used in the returned message, a configured tag received only a portion of the necessary data required from the PLC. Invalid tag type for unsolicited message Internal software error. Contact Axisware. 3.7 Appendix G: (Reserved) 3.8 Appendix H: Data Types and Conversions The driver supports the following FactoryLink tag types: LONG ANALOG The driver also supports the following PLC data types: BIN (single data bit) BYTE (8 bit unsigned integer) INT2 (16 bit signed integer) BCD4 (16 bit, 4 digit BCD) FLT4 (32 bit floating point - single precision) FLT8 (64 bit floating point - double precision) ASC (ASCII strings) Valid PLC data types for each of the FactoryLink tag types: DIGITAL ANALOG LONG ANALOG FLOATING POINT MESSAGE BIN BYTE BYTE BYTE ASC INT2 INT2 INT2 BCD4 BCD4 BCD4 FLT4 FLT4 FLT4 The following descriptions are from the viewpoint of “read”. A similar transfer occurs on writes. DIGITAL tags may only be converted to and from the BIN data type. If the requested binary PLC data type is on, the DIGITAL tag will be set to one. If the binary element is off, the DIGITAL tag will be set to zero. The 8 bits of this data type are transferred to the lowest 8 bits of the ANALOG tag. The ANALOG tag is a 16 bit signed integer; therefore, no conversion is needed. The lowest 16 bits of the INT4 data type correspond directly with the 16 bits comprising the ANALOG BCD4 After being read from the PLC, the BCD4 value is converted to a 16 bit integer. The value is then directly transferred without conversion into the ANALOG tag. handled as the INT4 data type above. The whole number portion of the floating point number is transferred to the ANALOG tag. This conversion is accurate only if the whole number value is between -32768 and +32767. When converting back to a FLT4, a fractional portion of zero is assumed. The 8 bits of this data type are transferred to the lowest 8 bits of the LONG ANALOG tag. The LONG ANALOG is a 32 bit signed integer; therefore, the 16 bits of the INT2 data type correspond to the lowest 16 bits of the LONG ANALOG tag. No conversion necessary; all 32 bits transfer directly. The whole number portion of the floating point number is transferred to the LONG ANALOG tag. This conversion is accurate only if the whole number value is between -2,147,483,648 and +2,147,483,647. When converting back to a FLT4, a fractional portion of zero is assumed. The BYTE value is converted into a standard IEEE 64 bit floating point value and then transferred directly to the FLOATING POINT tag. The fractional portion of the number is assumed to be zero. The INT2 value is converted into a standard IEEE 64 bit floating point value and then transferred The FLT4 value is converted from a standard IEEE 32 floating point number into a standard IEEE 64 bit floating point number. This value is then transferred directly to the FLOATING POINT tag. The data is transferred directly; no conversion is necessary. All data is read directly into the message tag from the specified device address. No conversion of any kind is employed. 3.9 Appendix I: Table Names The GE PCIM driver incorporates a system of reserved table names which is not generally part of an EDI driver; however, in so doing, this driver maintains all aspects of EDI compatibility. Reserved table names may be used for additional functionality or completely abandoned for a standard configuration. The only data region mnemonics that may be used for special function configuration tables are DGBIT, DGBYT, and DGWRD. Please refer to Appendix K for more information concerning data regions. The first four (4) characters of the table name define the intended purpose of the table. If neither of these table name prefixes are used, the table is assumed to be a standard read or write table. The following two four-character sequences are reserved: _FLT If the first four (4) characters of the table name are "_FLT", the table is considered by the driver to define a fault or diagnostic table. The letters used must be all uppercase and preceded by an underscore. Fault tables are only valid when configured for block reads from Genius blocks. All other attempted operations for fault tables will generate errors from the driver. The specific fault information that can be accessed by a fault table is described in the manuals for each Genius device. The GE manual Genius I/O System and Communications I (GEK 90486D-1) contains the most complete listing of this information for all Genius devices in chapter 5. _CFG If the first four (4) characters of the table name are "_CFG", the table is considered by the driver to define a configuration table. The letters used must be all uppercase and preceded by an underscore. Configuration tables are only valid when configured for any type of writes to or block reads from Genius blocks. All other attempted operations for configuration tables will generate errors from the driver. The specific configuration information that can be accessed by a configuration table is described in the manuals for each Genius device. The GE manual Genius I/O System and Communications I (GEK 90486D-1) contains the most complete listing of this information for all Genius devices in chapter 4. 3.10 Appendix J: Global Data Two types of data transfers are available to the GE PCIM driver. These two methods are Global Data and Datagrams. It is the responsibility of the operator to intelligently select between these two methods. Both methods have positive and negative features; however, the specific application and function will dictate the wise choice. This appendix describes the use of Global Data; Appendix K is dedicated to the use of Datagrams. These two appendices are not intended to be an exhaustive or complete discussion of these topics; therefore, if additional information is desired, please consult the appropriate GE technical manual. A brief description of Global Data and its implementation for each supported Genius device follows. The following description of Global data is included in the Genius I/O System and Communication manual (GEK 90498D-1) page 7-2. "Global Data is data which is automatically and repeatedly broadcast by a bus controller. All other bus controllers on the same bus are capable of receiving the data, although some bus controllers can choose not to. The ability to send Global Data is set up when each bus controller is configured. Once the system is in operation, the only further action required of an application program is to place new data to be sent into the selected memory area as often as needed, and to read incoming Global Data which has been received." The whole of chapter seven (7) is dedicated to the subject of Global Data in the GE manual referenced above; therefore, additional information may be obtained from this source. Of special importance and interest may be the discussion on pages 7-12 and 7-13. The standard FactoryLink configuration tables previously discussed are used to control and access Global Data for the PCIM card. This method of data transfer can be very fast; however, if excessive amounts of Global Data are transferred, the speed of the entire Genius network may be adversely affected. The only data region mnemonics that may be used are GIBIT, GOBIT, GIBYT, GOBYT, GIWRD, and GOWRD. The second character used in the mnemonic indicates whether the transaction is to be directed toward the Input or Output tables on the PCIM card. The last three characters of the mnemonic indicate the method in which the memory offset will be interpreted: BIT indicates that a one-based bitwise addressing will be used. BYT indicates that zero-based byte (8 bits) addressing will be used. Zero-based addressing was used for this selection so that the numeric portion of the address would exactly correspond to the memory maps given in the GE reference manuals. WRD indicates that one-based word addressing is to be used. Please note that the data type determines how the data at a given address will be interpreted; therefore, any addressing scheme may be used with any valid combination of tag types and data types. GIBIT 10 Bit 10 of the Global Data input table GOBIT 10 Bit 10 of the Global Data output table GIBIT 33 Bit 33 (bit 1 of word 3) of input table GIBYT 4 fifth byte of input table (same as above) GIWRD 3 third word of input table (same as above) Discrete Blocks (GDIO_8, GIIO_8, ..., GDIO_32) Each circuit of the block that has been configured as an input may be read directly from the input table (GIXXX). If circuit 14 of a 16 or 32 circuit block was configured as an input, it could be read as any of the following addresses: Table Element Bit GIBIT 14, (bit #13 -- one-based) GIBYT 1 (bit # 5 -- zero-based; i.e, the 6th bit of the second byte) GIWRD 1 (bit # 13 -- one-based) Each circuit of the block that has been configured as an output may be assigned directly by writing to the output table. Care must be taken that more than one device is not attempting to control the outputs for one block. If circuit 31 of a 32 circuit block was configured as an output, it could be written as any of the following addresses: GOBIT 31, GOBYT 3 (bit # 6), GOWRD 2 (bit # 14). Analog Blocks (GA4I_2O, GS4I_2O, ..., GTC_6I) The four (4) or six (6) analog input circuits will be located in consecutive words in the input table. If analog input four is to be read, the following addresses could be used: GIBIT 49, GIBYT 6, GIWRD 4. The two (2) output circuits that exist on some blocks may be controlled by writing directly to the output table. If analog output 1 is to be written, the following addresses could be used: GOBIT 1, GOBYT 0, GOWRD 1. Specialty Blocks (GHSCNT, GPWRTRAC) A wide range of parameters are sent from these devices each bus scan. The inputs, both discrete and analog, are accessed from the input table as the other devices described above. The outputs are written to the output table as described above. The specific values and parameters that may be accessed are described in the manuals for each device. Great care should be taken in writing to PowerTRAC outputs, because they may actually interfere with the return of working and overcurrent data. PLC Data (90-70, Series-6, GCM) Global Data broadcast from these devices is read from the input table with the above described mnemonics rather than the natural addressing for that PLC type. This function is not automatic as it is for the Genius blocks; therefore, each PLC device must be properly configured to broadcast Global Data. The following read examples assume that the GCM+ has been configured to broadcast from %R0001 and the 90-70 to broadcast from % G1001: GCM+ %R0002 GIWRD 2, %R0019 GIBYT 36, %G0010 GIBIN 10, Writing Global Data to these devices is handled a little differently than the other Genius devices discussed so far. These three devices are configured to receive data broadcast by other devices; therefore, the data must be broadcast from the PCIM card rather than being written directly to the Genius device. Data is broadcast from the PCIM card by selecting a logical station defined as a device type "PCIM" and a station address corresponding to that of the card as selected by the dip switches on the PCIM daughterboard. This data will be broadcast to all devices on the network capable of receiving such data and will be placed in PLC memory as configured. All data to be broadcast should be written to the output table for the PCIM card. 3.11 Appendix K: Datagrams choice. This appendix describes the use of Datagrams; Appendix J is dedicated to the use of Global Data. Datagrams and their implementation for each supported Genius device follows. A Datagram is a message sent over the Genius network to obtain or write information. Datagrams are used to directly access all data types in the 90-70 or Series-6, obtain fault information, directly access configuration information, and read input or output information from some Genius blocks. Datagrams are generally slower than Global Data transfers because the required information is not available until it is solicited. However, the speed of the network overall is not affected significantly because messages are not sent continually as with Global Data. Discrete blocks do not support datagrams that access input or output states; however, datagrams must be used for configuration and diagnostic information. The available data region mnemonics for these functions are DGBIT, DGBYT, and DGWRD. The manuals supplied with each device gives the memory map for fault and configuration information. The following entry, assuming the table name was prefixed with "_CFG", would read or write configuration information for circuit five (5): DGBIT 57 DGBYT 8 DGWRD 5 (First byte) The same method would be used to read fault information. These blocks are handled in a fashion very similar to the discrete blocks; however, some real-time information may also be returned. The same three data region mnemonics are used. The GE documentation for each device contains memory maps describing all the information that can be accessed. PowerTRAC Blocks (GPWRTRAC) The PowerTRAC blocks handle datagrams essentially like the analog blocks mentioned above. Information in addition to that which is returned via global data may be obtained through datagrams. A complete listing may be obtained from GE documentation; however, examples of such data would be fundamental VARs, harmonic VARs, fundamental power factor or line frequency. In addition to these standard datagram features, waveform data and overcurrent data may be returned from the block. In general, this information should only be read with a dedicated FactoryLink read table. Waveform data should not be read more frequently than once every 0.5 seconds. Overcurrent data can only be read after an overcurrent condition, and not more frequently than once every 0.5 seconds. Waveform data is accessed using the following data region mnemonics: WDBIT, WDBYT, or WDWRD. Beyond these additional mnemonics, all previous guidelines apply to accessing this data. WDBYT 1024 first byte of channel C current WDBYT 514 third byte of channel C voltage WDWRD 129 first word of channel B voltage WDWRD 896 last word of table Overcurrent data is accessed using the following data region mnemonics: OCBIT, OCBYT, or OCWRD. These values are accessed exactly as the waveform data region. IMPORTANT: The operator must always read the last word from either of these two tables when they are accessed. This would be addressed as OCBYT 1790, WDBYT 1790, OCWRD 896, or WDWRD 896. High Speed Counter (GHSCNT) Configuration and diagnostic information is handled the same way it is with the other blocks. However, the real- time information is read in a very different fashion. The data region mnemonic must be a datagram type, but all three valid mnemonics are treated identically when the tables are processed. The protocol requires the operator to specify a timer number and a data type code. The valid type codes are listed in the manual for the High Speed Counter. Since this addressing is not easily implemented with the current addressing schemes, the following rules are used: 1) The number in the fourth decimal digit represents the timer number, 2) The number in the first, second, and third digits represents the timer data type code. DGBYT 1001 Read accumulator value (code 1) for timer 1 DGBYT 4006 Read counter timer base (code 6) for timer 4 DGBYT 3031 Read counter preload #1 (code 31) for timer 3 Genius Communications Module - Plus (GMC) No datagrams may be written to the GCM+. All data to be transferred must be done via Global Data. No configuration or diagnostic information for a bus controller may be accessed from FactoryLink; however, Datagrams are used to access all the memory types in the 90-70. Valid data region mnemonics are as follows: AI, AQ, G, I, M, Q, R, S, SA, SB, SC, and T. AI, AQ, and R are all word addresses; the remaining types are bit addresses. Digital writes may not be directed to word addresses, but digital reads may be used. All addresses are entered exactly as they are used in the PLC. The following examples list possible FactoryLink addresses. AQ 16 %AQ0016, G 1 %G0001, M 256 %M0256. T 15 %T0015, Series-6 Datagrams are used to access all the memory types in the Series-6. Valid data region mnemonics are as follows: AUXO AUXI O1+ through OF+ I1+ through IF+ O0- through OF- I0- through IF- O and I are byte addresses, and the remaining data regions are accessed with word addresses. The auxiliary data regions and channelized I/O are accessed as they are mapped to the registers by the Series-6. The following examples list possible FactoryLink addresses. Please note that a WINDOW command in the PLC is necessary for the PCIM card to access the PLC memory. R 1 R00001, O 15 O0015, I 16 I0016, AUXI 256 AI0256, IC+ 39 IC+0039, O8- 560 O8-0560. 3.12 Appendix L: (Reserved) 3.13 Appendix M: (Reserved) 3.14 Appendix N: Unsolicited Reads Unsolicited messages can be configured to allow a PLC (90-70 or Series 6) to send data to the FactoryLink real- time database without the PLC being polled by the EDI driver. This can be useful for logging PLC data that is not generated at predefined intervals such as error reporting, diagnostics or data that changes infrequently. Several simple steps are required to configure the system to receive unsolicited messages. The first step is to set the column titled Unsolicited Read in the Axisware GE PCIM Read/Write Control Table to either "Forced" or "Yes". This will allow that specific table to be included in the driver's search for tags with which to associate the incoming data. The table for which unsolicited reads have been enabled may now be edited to associate FactoryLink real-time database elements to addresses in the PLC. The same addressing rules should be followed for unsolicited read tables as for the standard read or write tables. Note: The number of tags that are configured as unsolicited read tags directly affects the time that is required to process incoming requests; therefore, if speed is critical, only include the unsolicited read tags that are essential to the application. The following two sections briefly describe the steps necessary to configure FactoryLink and a 90-70 or a Series- 6 to communicate via unsolicited messages. 90-70 PLC If Logical Station 10 is a 90-70 bus controller, the following would be an example to receive unsolicited TAG LOGICAL DATA DATA NAME STATION TABLE OFFSET tagR1000 10 R 1000 The second step is to configure the PLC to send the messages to the FactoryLink PCIM card. This is accomplished via the 90-70 COMREQ command. The following rung of logic is an example to illustrate this | << RUNG 1 STEP #0001 >> |%M0001 +-----+ +--] [-----------+COMM_| | | REQ | | %R0001 -+IN FT+- | CONST -+SYSID| | 0004 | | | CONST -+TASK | | 00000001 +-----+ Program: TEST C:\LM90\TEST In the above example, contact %M0001 must only be energized for one PLC scan to initialize the data transmission. If it is left energized for multiple, successive PLC scans, the Genius LAN will not be able to transmit the communication commands as quickly as they are being generated. After the message has been received by FactoryLink, the %M0001 may again be energized for one scan to re-transmit the message. The SYSID of 4 specified in the COMREQ command indicates the location of the bus controller card in the PLC rack. The TASK number of 1 must be left unchanged. The register %R0001 is the starting address for the command block which defines the message. The command block information defines the communication request and supplies all necessary addresses and parameters. A COMREQ #14 or Write Device Command, as defined in the Series 90-70 PLC Genius Bus Controller manual (GFK-0398C), should be used. The following example illustrates the command block that could be used with the above line of PLC logic (Rung 1...%R0001) to transmit 20 registers starting at location %R1000 to a PCIM card at a Genius node address of 31: %R0001 33 Command Length %R0002 0 No Wait %R0003 8 Status information stored at %R0100 %R0004 99 %R0005 0 Idle timeout value %R0006 0 Maximum communications time %R0007 12 Command number %R0008 31 Device number (Address of PCIM card) %R0009 8 Address to which data will be sent (%R1000) %R0010 999 %R0011 - 0 Program name and Block name %R0018 %R0019 20 20 words are to be written %R0020 - 20 actual data words as sent to PCIM If the three examples in this appendix are combined and the contact %M0001 is energized as described above, tags tagR1000, tagR1001, tagR1019 would receive the values stored in %R0020, %R0021, and %R0038, respectively. However, no value would be placed into tag tagR1025 since only 20 values are transmitted (% R1000 - %R1019). SERIES-6 PLC If Logical Station 11 is a Series-6 bus controller, the following would be an example to receive unsolicited accomplished via the Series-6 DPREQ command. The rungs of logic on the following page represent an example to illustrate this procedure: | << RUNG 1 >> | R01000 +[ BLOCK MOVE ]-( ) | +00001 +00001 +00001 +00001 +00001 +00001 +00001 | R01000 R01000 O0002 +[WINDOW ADDRESS COMM BLOCK]--------------( ) | O0101 O0100 +--] [---------------------------(OS) | O0100 R00500 +--] [---[ BLOCK MOVE ]-( ) | O0100 R0500 +--] [---[DPREQ]- ( ) In the above example, contact O0100 is only energized for one PLC scan which initializes the data transmission. After the message has been received by FactoryLink, I0100 may be toggled to re-transmit the message. Rungs 1 and 2 set up and execute the WINDOW command which is necessary for the PCIM card to access Series-6 memory. The remaining rungs control and execute the DPREQ command which sends data to FactoryLink. R00500 and the 6 successive registers define the command block. A full description of the command block is given in the GE Series Six Bus Controller manual (GFK-0171B). R00503 should contain the Genius address for FactoryLink as defined in the Logical Station Control Table. R00505 represents the number of bytes that will be sent to FactoryLink; 20 bytes would be transferred in this example. R00510 and all the successive registers represent the data that is actually sent to FactoryLink. The format for this data is described in the Series-6 manual referenced above. Please note that absolute addressing is used; absolute addressing is also described in the Series-6 manual. The above example would send a message to absolute address 576F hex or 22383 decimal. This would represent a register address of 6000 decimal (22383 - 16383 = 6000). If this example is followed exactly, tags tagR6000, tagR6001, tagR6005 would receive the values of 1, 2, and 5, respectively. However, no value would be placed in tag tagR6025 since only 10 registers (20 bytes) were transmitted. 3.15 Appendix O: (Reserved) 3.16 Appendix P: FactoryLink Version Upgrade Procedures BEFORE installing the FactoryLink upgrade you MUST make a multiplatform save of your After installing the driver, upgrading to a newer version of FactoryLink may appear to cause operational problems. This is due to the modifications to certain text files made by installing this product being overwritten during the install of the new FactoryLink version. However, these files can be reconfigured using a text editor AFTER installing the FactoryLink upgrade and BEFORE restoring the multiplatform save file of your application, do the following: Where $FLINK indicates the FactoryLink directory (example: FLINK=C:\FLWIN): 1. Edit the file $FLINK\AC\TITLES and add the following line: 2. Open the file $FLINK\CTGEN\CTLIST and add the following line: 3 Perform a multiplatform restore and conversion of your application. 3.17 Appendix Q: Sample Application The SAMPLE directory of the nstall cd-rom includes compressed multiplatform save files of a sample application for this driver. The sample application can be used to test communications, as well as serve as an example of how to prepare a FactoryLink application to use the driver. The sample application has examples of block reads, block writes, exception writes and unsolicited reads from a single PLC. Please refer to the "README.TXT" file in the SAMPLE directory for instructions on how to use this application. Configuration Tables Where you establish the communication path and specify elements in the database. These tables work together to allow FactoryLink to exchange information from the tag database with the device. Data Region Area of device (e.g., PLC) memory to be accessed. Also called "Data Table" or "Reference Table". External Device Definition Table Configuration table that tells the application what type of devices are connected to the computer's ports and assigns them a logical port number. Logical Port Number specified in the External Device Definition table which represents a particular communication path. Logical Station Number entered by the user to represent a particular combination of a logical port and a physical device (PLC). Correlates specific addresses and tags with a physical device (PLC). Logical Station Control Table Table used to configure each logical port and its associated stations in the Logical Station Information table. The Logical Station Control table specifies which specific port is connected to the external device being defined. Logical Station Information Table Table which defines the logical station(s) accessible through a specific logical port defined in the Logical Station Control table. Each logical station is tied to its physical station address and device type. Proof of License An 8 1/2 by 11 certificate that must accompany the software indicated by its unique serial number when that product is sold or transferred to another company or entity. Read/Write Control Table Each line in this table refers to one Read/Write Information table. Read/Write Information Table Configuration table that links FactoryLink tags to specific addresses in the PLC represented by the Logical SoftKey Axisware software protection system where no hardware key (dongle) is required. The program run after the software is installed that checks for improper use of the product and enables the software to function past the grace period. 5 Contact information: Axisware LLC support@axisware.com http://www.axisware.com 3213 Peppertree Pl. Plano, TX 75074, USA T: 1-(214)-764-1876 F: 1-(214)-764-1878 Device Driver Documents Similar To Axisware PCIM Manual: FactoryLink driver for GE Fanuc PCIM Genius Bus Muhammad Amirudin MaRlos Sian Atlas John Mile Srijemac Indranil Khan Baeit C'lonk felujilu Seamus Donovan Luis José Shubham Kumar Kashyap ruben conde Mario Stoyanov Thangdk Nguyen Ravindra Angal Thenes Kumar ggdfpokgpfdok comp121_3 CS3000_1_ hbahriio Installing WinCC Flexible 2008 SP3 on HP Notebook monter10 Dario Gomez Errores Blue Screen Raul Martin EVK-NINA-B1_UserGuide_(UBX-15028120) José Arnaldo Silva Presentation1 Rakesh tansnvarma SiGNUM Software Users Guide tinchoteles More From Axisware LLC Axisware SNPX Manual: FactoryLink driver for GE Fanuc SNPX Serial Axisware Utility Manual: Installation for Axisware FactoryLink drivers. Axisware ABEI setup manual: FL Allen-Bradley Ethernet driver Axisware ABEI manual: FactoryLink driver for Allen-Bradley Ethernet PLC-5/xxEs & SLC-5/05 Axisware SDKT Manual: FactoryLink driver for Allen-Bradley DH/DH+ via SST 5136-SD Popular in Byte devicenet fanuc Diego Amador Kalpana Selvan 02 InterfaceManual en Markem Imaje 9040 White mech84 Siemens S7-300 analog output module SM332 ansarmech Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering Francesco Lo Schiavo Lec Om036xx Dan001500 Microprocessor Lab IV Sem Vijeo Citect Technical Reference Davy Souvenir GeoStore UserGuide En Sergey Kobelev CiA_DS_201-207 Dongyi Tang JPT Laser Control and Monitor Protocol 2018 - Copy Devyang Patel Connection Fanuc Function Claudia Alejandra Ramirez Rodriguez Labview File Io Larisa Andrei Sheet 02 Ver15-A Arithmetic and Logical Expressions Mohannad Ali 4 Technology 2 Jed Achas Communication Protocol of Contec Pulse Oximeter V7.0 Mike Klopfer COBOL Coding Standards mahesheiruvuri superpuma86 38566021 NET Topology SFB52 e Intermediate Code Generation Salitha Quick Start Tutorial 6 - Huge Dungeons plmanon123 SEEDManual_V2.4 César Augusto Cardona Parra CY232_1304273 xor_45 Bridging Assesment Ibrahim 'Psyko Mohammed 1.1.1 Number Representation MuhammadSaad Machine Language for Beginners camacamaleon A Glossary of Computer Oriented Abbreviations and Acronyms thesingh_0 MM notes v+ Deepak Tirunelveli IEEE 1451d4 Standard Genl Tutorial 090104 maee2 Fanuc 16i 18i 21i Ethernet Settings
cc/2019-30/en_head_0021.json.gz/line1731817
__label__wiki
0.756907
0.756907
Orr v. Orr, 440 U.S. 268 (1979) Uploaded by Scribd Government Docs Filed: 1979-03-05 Precedential Status: Precedential Citations: 440 U.S. 268, 99 S. Ct. 1102, 59 L. Ed. 2d 306, 1979 U.S. LEXIS 65 Docket: 77-1119 Supreme Court Database id: 1978-049 Copyright: Public Domain Download as COURT, PDF, TXT or read online from Scribd saveSave Orr v. Orr, 440 U.S. 268 (1979) For Later The Pitt News v. Gerald J. Pappert, in His Capacity as Attorney General of the Commonwealth of Pennsylvania Frank Koscelnak, in His Capacity as Director, Bureau of Liquor Control Enforcement, Pennsylvania State Police John E. Jones, Iii, in His Capacity as Chairman Pennsylvania Liquor Control Board, 379 F.3d 96, 3rd Cir. (2004) Rathbun v. United States, 355 U.S. 107 (1958) Pierce vs. Society of Sisters (262 US 390) See PAGE 6 Montana v. Imlay, 506 U.S. 5 (1992) Political Law Revie731 Asarco Inc. v. Kadish, 490 U.S. 605 (1989) Order Denying Mtd in Oca Greater Houston Edgar J. Bowser, III v. George A. Vose, Jr., 968 F.2d 105, 1st Cir. (1992) Lydia Aguayo, Appellants-Plaintiffs v. Elliot R. Richardson, Secretary of the United States Department of Health, Education and Welfare, Appellees-Defendants, 473 F.2d 1090, 2d Cir. (1973) Dempsey - Administrative Law Order granting government summary judgment in rockfish case Anak Mindanao vs Executive Edmund S. Taylor, James H. Sikes, Ed Carter, and E. A. Hall, for Themselves Individually, and as Parents and Guardians of Children Attending the Public Schools in Richland County School District Number One, and for All Other Persons Similarly Situated v. Wilbur Cohen, as Secretary of the Department of Health, Education and Welfare and Harold Howe Ii, as United States Commissioner of Education, 405 F.2d 277, 4th Cir. (1968) Thomas More Society Amicus - Brown v. Ind. Bd. of Law Examiners Civil Procedure Doctrines UPDATED Article VIII, Constitution B. G. Murray, Administrator of the Estate of Henry Clyde Adams, Deceased v. Atlantic Coast Line Railroad Company, 233 F.2d 214, 4th Cir. (1956) Samuel Lee McDonald v. Missouri, 464 U.S. 1306 (1984) Philadelphia Indemnity v. Lexington Insurance, 10th Cir. (2017) 99 S.Ct. 1102 William Herbert ORR, Appellant, Lillian M. ORR. Argued Nov. 27, 1978. Decided March 5, 1979. Following a stipulation between appellant husband and appellee wife, in which appellant agreed to pay appellee alimony, an Alabama court, acting pursuant to state alimony statutes under which husbands but not wives may be required to pay alimony upon divorce, ordered appellant to make monthly alimony payments. Some two years thereafter appellee filed a petition seeking to have appellant adjudged in contempt for failing to maintain the alimony payments. At the hearing on the petition appellant, though not claiming that he was entitled to an alimony award from appellee, made the contention (advanced for the first time in that proceeding) that the Alabama statutes, by virtue of their reliance on a gender-based classification, violated the Equal Protection Clause of the Fourteenth Amendment. The trial court, ruling adversely to appellant on that issue, entered judgment against him, which was affirmed on appeal. 1. This Court has jurisdiction over appellant's appeal. Pp. 271-278. (a) Appellant's failure to ask for alimony for himself does not deprive him of standing to attack the constitutionality of the Alabama statutes for underinclusiveness. That attack holds the only promise of relief from the burden deriving from the challenged statutes, and appellant has therefore "alleged such a personal stake in the outcome of the controversy as to assure that concrete adverseness which sharpens the presentation of issues upon which th[is] court so largely depends for illumination of difficult constitutional questions." Baker v. Carr, 369 U.S. 186, 204, 82 S.Ct. 691, 703, 7 L.Ed.2d 663. Pp. 271-273. (b) Had the courts below refused to entertain appellant's constitutional contention on the ground that it was not timely made under applicable state procedures this Court might have lacked jurisdiction to consider the contention; but no timeliness point was raised or considered below and the constitutional issue was decided on the merits. Under these circumstances it is irrelevant whether the decision below could have been based upon an adequate and independent state ground. Pp. 274-275. (c) No point was raised or considered below that appellant by virtue of the stipulation was obliged to make the alimony payments under state contract law. "Where the state court does not decide against [an] appellant upon an independent state ground, but deeming the federal question to be before it, actually . . . decides that question adversely to the federal right asserted, this Court has jurisdiction to review the judgment if, as here, it is . . . final . . . ." Indiana ex rel. Anderson v. Brand, 303 U.S. 95, 98, 58 S.Ct. 443, 445, 82 L.Ed. 685. Pp. 275-278. 2. The Alabama statutory scheme of imposing alimony obligations on husbands but not wives violates the Equal Protection Clause of the Fourteenth Amendment. Pp. 278-283. (a) "To withstand scrutiny" under the Equal Protection Clause, " 'classifications by gender must serve important governmental objectives and must be substantially related to achievement of those objectives.' " Califano v. Webster, 430 U.S. 313, 316-317, 97 S.Ct. 1192, 1194, 51 L.Ed.2d 360. Pp. 278-279. (b) The statutes cannot be validated on the basis of the State's preference for an allocation of family responsibilities under which the wife plays a dependent role. "No longer is the female destined solely for the home and the rearing of the family, and only the male for the marketplace and the world of ideas." Stanton v. Stanton, 421 U.S. 7, 14-15, 95 S.Ct. 1373, 1375-1376, 43 L.Ed.2d 688. Pp. 279-280. (c) Though it could be argued that the Alabama statutory scheme is designed to provide help for needy spouses, using sex as a proxy for need, and to compensate women for past discrimination during marriage, which assertedly has left them unprepared to fend for themselves in the working world following divorce, these considerations would not justify that scheme because under the Alabama statutes individualized hearings at which the parties' relative financial circumstances are considered already occur. Since such hearings can determine which spouses are needy as well as which wives were in fact discriminated against, there is no reason to operate by generalization. "Thus, the gender-based distinction is gratuitous . . . ." Weinberger v. Wiesenfeld, 420 U.S. 636, 653, 95 S.Ct. 1225, 1235, 43 L.Ed.2d 514. Pp. 280-282. (d) Use of a gender classification, moreover, actually produces perverse results in this case because only a financially secure wife whose husband is in need derives an advantage from the Alabama scheme as compared to a gender-neutral one. Pp. 282-283. 3. The question remains open on remand whether appellant's stipulated agreement to pay alimony, or other grounds of gender-neutral state law, bind him to continue his alimony payments. Pp. 283-284. Ala., 351 So.2d 904, reversed and remanded. John L. Capell, III, Montgomery, Ala., for appellant. W. F. Horsley, Opelika, Ala., for appellee. Mr. Justice BRENNAN delivered the opinion of the Court. The question presented is the constitutionality of Alabama alimony statutes which provide that husbands, but not wives, may be required to pay alimony upon divorce.1 On February 26, 1974, a final decree of divorce was entered, dissolving the marriage of William and Lillian Orr. That decree directed appellant, Mr. Orr, to pay appellee, Mrs. Orr, $1,240 per month in alimony. On July 28, 1976, Mrs. Orr initiated a contempt proceeding in the Circuit Court of Lee County, Ala., alleging that Mr. Orr was in arrears in his alimony payments. On August 19, 1976, at the hearing on Mrs. Orr's petition, Mr. Orr submitted in his defense a motion requesting that Alabama's alimony statutes be declared unconstitutional because they authorize courts to place an obligation of alimony upon husbands but never upon wives. The Circuit Court denied Mr. Orr's motion and entered judgment against him for $5,524, covering back alimony and attorney fees. Relying solely upon his federal constitutional claim, Mr. Orr appealed the judgment. On March 16, 1977, the Court of Civil Appeals of Alabama sustained the constitutionality of the Alabama statutes, 351 So.2d 904. On May 24, the Supreme Court of Alabama granted Mr. Orr's petition for a writ of certiorari, but on November 10, without court opinion, quashed the writ as improvidently granted. 351 So.2d 906. We noted probable jurisdiction, 436 U.S. 924, 98 S.Ct. 2817, 56 L.Ed.2d 767 (1978). We now hold the challenged Alabama statutes unconstitutional and reverse. * We first address three preliminary questions not raised by the parties or the Alabama courts below, but which nevertheless may be jurisdictional and therefore are considered of our own motion. The first concerns the standing of Mr. Orr to assert in his defense the unconstitutionality of the Alabama statutes. It appears that Mr. Orr made no claim that he was entitled to an award of alimony from Mrs. Orr, but only that he should not be required to pay alimony if similarly situated wives could not be ordered to pay.2 It is therefore possible that his success here will not ultimately bring him relief from the judgment outstanding against him, as the State could respond to a reversal by neutrally extending alimony rights to needy husbands as well as wives. In that event, Mr. Orr would remain obligated to his wife. It is thus argued that the only "proper plaintiff" would be a husband who requested alimony for himself, and not one who merely objected to paying alimony. This argument quite clearly proves too much. In every equal protection attack upon a statute challenged as underinclusive, the State may satisfy the Constitution's commands either by extending benefits to the previously disfavored class or by denying benefits to both parties (e. g., by repealing the statute as a whole). In this case, if held unconstitutional, the Alabama divorce statutes could be validated by, inter alia, amendments which either (1) permit awards to husbands as well as wives, or (2) deny alimony to both parties. It is true that under the first disposition Mr. Orr might gain nothing from his success in this Court, although the hypothetical "requesting" plaintiff would. However, if instead the State takes the second course and denies alimony to both spouses, it is Mr. Orr and not the hypothetical plaintiff who would benefit. Because we have no way of knowing how the State will in fact respond, unless we are to hold that underinclusive statutes can never be challenged because any plaintiff's success can theoretically be thwarted, Mr. Orr must be held to have standing here. We have on several occasions considered this inherent problem of challenges to underinclusive statutes, Stanton v. Stanton, 421 U.S. 7, 17, 95 S.Ct. 1373, 1379, 43 L.Ed.2d 688 (1975); Craig v. Boren, 429 U.S. 190, 210 n. 24, 97 S.Ct. 451, 463 n. 24, 50 L.Ed.2d 397 (1976), and have not denied a plaintiff standing on this ground. There is no question but that Mr. Orr bears a burden he would not bear were he female. The issue is highlighted, although not altered, by transposing it to the sphere of race. There is no doubt that a state law imposing alimony obligations on blacks but not whites could be challenged by a black who was required to pay. The burden alone is sufficient to establish standing. Our resolution of a statute's constitutionality often does "not finally resolve the controversy as between th[e] appellant and th[e] appellee," Stanton v. Stanton, 421 U.S., at 17, 95 S.Ct., at 1379. We do not deny standing simply because the "appellant, although prevailing here on the federal constitutional issue, may or may not ultimately win [his] lawsuit." Id., at 18, 95 S.Ct., at 1379. The holdings of the Alabama courts stand as a total bar to appellant's relief; his constitutional attack holds the only promise of escape from the burden that derives from the challenged statutes. He has therefore "alleged such a personal stake in the outcome of the controversy as to assure that concrete adverseness which sharpens the presentation of issues upon which th[is] court so largely depends for illumination of difficult constitutional questions." Linda R. S. v. Richard D., 410 U.S. 614, 616, 93 S.Ct. 1146, 1148, 35 L.Ed.2d 536 (1973), quoting Baker v. Carr, 369 U.S. 186, 204, 82 S.Ct. 691, 703, 7 L.Ed.2d 663 (1962). Indeed, on indistinguishable facts, this Court has stated that a party's standing will be sustained. In Linda R. S. v. Richard D., supra, 410 U.S., at 619 n. 5, 93 S.Ct., at 1149 n. 5 (Marshall, J.), we stated that the parent of a legitimate child who must by statute pay child support has standing to challenge the statute on the ground that the parent of an illegitimate child is not equally burdened.3 A second preliminary question concerns the timeliness of appellant's challenge to the constitutionality of the statutes. No constitutional challenge was made at the time of the original divorce decree; Mr. Orr did not interpose the Constitution until his ex-wife sought a contempt judgment against him for his failure to abide by the terms of the decree. This unexcused tardiness might well have constituted a procedural default under state law, and if Alabama had refused to hear Mr. Orr's constitutional objection on that ground, we might have been without jurisdiction to consider it here. See C. Wright, Federal Courts 541-542 (3d ed. 1976). But in this case neither Mrs. Orr, nor the Alabama courts at any time objected to the timeliness of the presentation of the constitutional issue. Instead, the Alabama Circuit and Civil Appeals Courts both considered the issue to be properly presented and decided it on the merits. See 351 So.2d, at 905; App. to Juris. Statement 22a. In such circumstances, the objection that Mr. Orr's COMPLAINT " 'COMES TOO LATE' . . . IS CLEARLY untenable. . . . [s]ince the state court deemed the federal constitutional question to be before it, we could not treat the decision below as resting upon an adequate and independent state ground even if we were to conclude that the state court might properly have relied upon such a ground to avoid deciding the federal question." Beecher v. Alabama, 389 U.S. 35, 37, n. 3, 88 S.Ct. 189, 190 n. 3, 19 L.Ed.2d 35 (1967). This is merely an application of the "elementary rule that it is irrelevant to inquire . . . when a Federal question was raised in a court below when it appears that such question was actually considered and decided." Manhattan Life Ins. Co. v. Cohen, 234 U.S. 123, 134, 34 S.Ct. 874, 877, 58 L.Ed. 1245 (1914). Accord, Harlin v. Missouri, 439 U.S. 459, 99 S.Ct. 709, 58 L.Ed.2d 733 (1979); Jenkins v. Georgia, 418 U.S. 153, 157, 94 S.Ct. 2750, 2753, 41 L.Ed.2d 642 (1974); Raley v. Ohio, 360 U.S. 423, 436, 79 S.Ct. 1257, 1265, 3 L.Ed.2d 1344 (1959). See C. Wright, supra, at 542. 4 The third preliminary question arises from indications in the record that Mr. Orr's alimony obligation was part of a stipulation entered into by the parties, which was then incorporated into the divorce decree by the Lee County Circuit Court. Thus, it may be that despite the unconstitutionality of the alimony statutes, Mr. Orr may have a continuing obligation to his former wife based upon that agreementin essence a matter of state contract law.5 If the Alabama courts have so held, and had anchored their judgments in this case on that basis, an independent and adequate state ground might exist and we would be without power to hear the constitutional argument. See Herb v. Pitcairn, 324 U.S. 117, 125-126, 65 S.Ct. 459, 462-463, 89 L.Ed. 789 (1945); Fox Film Corp. v. Muller, 296 U.S. 207, 56 S.Ct. 183, 80 L.Ed. 158 (1935). And if there were ambiguity as to whether the State's decision was based on federal or state grounds, it would be open to this Court not to determine the federal question, but to remand to the state courts for clarification as to the ground of the decision. See California v. Krivda, 409 U.S. 33, 93 S.Ct. 32, 34 L.Ed.2d 45 But there is no ambiguity here. At no time did Mrs. Orr raise the stipulation as a possible alternative ground in support of her judgment. Indeed, her brief in the Alabama Court of Civil Appeals expressly stated that "[t]he appellee agrees that the issue before this Court is whether the Alabama alimony laws are unconstitutional because of the gender based classification made in the statutes." App. to Juris. Statement 25a. The Alabama Circuit and Civil Appeals Courts reached and decided the federal question without considering any statelaw issues, the latter specifying that "[t]he sole issue before this court is whether Alabama's alimony statutes are unconstitutional. We find they are not unconstitutional and affirm." 351 So.2d, at 905. While no reason was given by the State Supreme Court's majority for quashing the writ of certiorari, the concurring and dissenting opinions mention only the federal constitutional issue and do not mention the stipulation. See 351 So.2d, at 906-910. And Mrs. Orr did not even raise the point in this Court. On this record, then, our course is clear and dictated by a long line of decisions. "Where the state court does not decide against a petitioner or appellant upon an actually entertains and decides that question adversely to the federal right asserted, this Court has jurisdiction to review the judgment if, as here, it is a final judgment. We cannot refuse jurisdiction because the state court might have based its decision, consistently with the record, upon an independent and adequate non-federal ground." Indiana ex rel. Anderson v. Brand, 303 U.S. 95, 98, 58 S.Ct. 443, 445, 82 L.Ed. 685 (1938). Accord, United Air Lines, Inc. v. Mahin, 410 U.S. 623, 630-631, 93 S.Ct. 1186, 1191, 35 L.Ed.2d 545 (1973); Poafpybitty v. Skelly Oil Co., 390 U.S. 365, 375376, 88 S.Ct. 982, 987, 19 L.Ed.2d 1238 (1968); Steele v. Louisville & Nashville R. Co., 323 U.S. 192, 197 n. 1, 65 S.Ct. 226, 229 n. 1, 89 L.Ed. 173 (1944); International Steel & Iron Co. v. National Surety Co., 297 U.S. 657, 666, 56 S.Ct. 619, 623, 80 L.Ed. 961 (1936); Grayson v. Harris, 267 U.S. 352, 358, 45 S.Ct. 317, 319, 69 L.Ed. 652 (1925); Red Cross Line v. Atlantic Fruit Co., 264 U.S. 109, 120, 44 S.Ct. 274, 275, 68 L.Ed. 582 (1924); Rogers v. Hennepin County, 240 U.S. 184, 188-189, 36 S.Ct. 265, 267, 60 L.Ed. 594 (1916). See C. Wright, Federal Courts, at 544.6 Our analysis of these three preliminary questions, therefore, indicates that we do have jurisdiction over the constitutional challenge asserted by Mr. Orr.7 As an Art. III "case or controversy" has been properly presented to this Court, we now turn to the merits.8 In authorizing the imposition of alimony obligations on husbands, but not on wives, the Alabama statutory scheme "provides that different treatment be accorded . . . on the basis of . . . sex; it thus establishes a classification subject to scrutiny under the Equal Protection Clause," Reed v. Reed, 404 U.S. 71, 75, 92 S.Ct. 251, 253, 30 L.Ed.2d 225 (1971). The fact that the classification expressly discriminates against men rather than women does not protect it from scrutiny. Craig v. Boren, 429 U.S. 190, 97 S.Ct. 451, 50 L.Ed.2d 397 (1976). "To withstand scrutiny" under the Equal Protection Clause, " 'classifications by gender must serve important governmental objectives and must be substantially related to achievement of those objectives.' " Califano v. Webster, 430 U.S. 313, 316-317, 97 S.Ct. 1192, 1194, 51 L.Ed.2d 360 (1977). We shall, therefore, examine the three governmental objectives that might arguably be served by Alabama's statutory scheme. Appellant views the Alabama alimony statutes as effectively announcing the State's preference for an allocation of family responsibilities under which the wife plays a dependent role, and as seeking for their objective the reinforcement of that model among the State's citizens. Cf. Stern v. Stern, 165 Conn. 190, 332 A.2d 78 (1973). We agree, as he urges, that prior cases settle that this purpose cannot sustain the statutes.9 Stanton v. Stanton, 421 U.S. 7, 10, 95 S.Ct. 1373, 1376, 43 L.Ed.2d 688 (1975), held that the "old notio[n]" that "generally it is the man's primary responsibility to provide a home and its essentials," can no longer justify a statute that discriminates on the basis of gender. "No longer is the female destined solely for the home and the rearing of the family, and only the male for the marketplace and the world of ideas," id., at 14-15, 95 S.Ct., at 1378. See also Craig v. Boren, supra, 429 U.S., at 198, 97 S.Ct., at 457. If the statute is to survive constitutional attack, therefore, it must be validated on some other basis. The opinion of the Alabama Court of Civil Appeals suggests other purposes that the statute may serve. Its opinion states that the Alabama statutes were "designed" for "the wife of a broken marriage who needs financial assistance," 351 So.2d, at 905. This may be read as asserting either of two legislative objectives. One is a legislative purpose to provide help for needy spouses, using sex as a proxy for need. The other is a goal of compensating women for past discrimination during marriage, which assertedly has left them unprepared to fend for themselves in the working world following divorce. We concede, of course, that assisting needy spouses is a legitimate and important governmental objective. We have also recognized "[r]eduction of the disparity in economic condition between men and women caused by the long history of discrimination against women . . . as . . . an important governmental objective," Califano v. Webster, supra, 430 U.S., at 317, 97 S.Ct., at 1194. It only remains, therefore, to determine whether the classification at issue here is "substantially related to achievement of those objectives." Ibid.10 Ordinarily, we would begin the analysis of the "needy spouse" objective by considering whether sex is a sufficiently "accurate proxy," Craig v. Boren, supra, 429 U.S., at 204, 97 S.Ct., at 460, for dependency to establish that the gender classification rests " 'upon some ground of difference having a fair and substantial relation to the object of the legislation,' " Reed v. Reed, supra, 404 U.S., at 76, 92 S.Ct., at 254. Similarly, we would initially approach the "compensation" rationale by asking whether women had in fact been significantly discriminated against in the sphere to which the statute applied a sex-based classification, leaving the sexes "not similarly situated with respect to opportunities" in that sphere, Schlesinger v. Ballard, 419 U.S. 498, 508, 95 S.Ct. 572, 577, 42 L.Ed.2d 610 (1975). Compare Califano v. Webster, supra, 430 U.S., at 318, 97 S.Ct., at 1195, and Kahn v. Shevin, 416 U.S. 351, 353, 94 S.Ct. 1734, 1736, 40 L.Ed.2d 189 (1974), with Weinberger v. Wiesenfeld, 420 U.S. 636, 648, 95 S.Ct. 1225, 1233, 43 L.Ed.2d 514 (1975).11 But in this case, even if sex were a reliable proxy for need, and even if the institution of marriage did discriminate against women, these factors still would "not adequately justify the salient features of" Alabama's statutory scheme, Craig v. Boren, supra, 429 U.S., at 202-203, 97 S.Ct., at 459-460. Under the statute, individualized hearings at which the parties' relative financial circumstances are considered already occur. See Russell v. Russell, 247 Ala. 284, 286, 24 So.2d 124, 126 (1945); Ortman v. Ortman, 203 Ala. 167, 82 So. 417 (1919). There is no reason, therefore, to use sex as a proxy for need. Needy males could be helped along with needy females with little if any additional burden on the State. In such circumstances, not even an administrativeconvenience rationale exists to justify operating by generalization or proxy.12 Similarly, since individualized hearings can determine which women were in fact discriminated against vis-a-vis their husbands, as well as which family units defied the stereotype and left the husband dependent on the wife, Alabama's alleged compensatory purpose may be effectuated without placing burdens solely on husbands. Progress toward fulfilling such a purpose would not be hampered, and it would cost the State nothing more, if it were to treat men and women equally by making alimony burdens independent of sex. "Thus, the gender-based distinction is gratuitous; without it, the statutory scheme would only provide benefits to those men who are in fact similarly situated to the women the statute aids," Weinberger v. Wiesenfeld, supra, 420 U.S., at 653, 95 S.Ct., at 1236, and the effort to help those women would not in any way be compromised. Moreover, use of a gender classification actually produces perverse results in this case. As compared to a gender-neutral law placing alimony obligations on the spouse able to pay, the present Alabama statutes give an advantage only to the financially secure wife whose husband is in need. Although such a wife might have to pay alimony under a gender-neutral statute, the present statutes exempt her from that obligation. Thus, "[t]he [wives] who benefit from the disparate treatment are those who were . . . nondependent on their husbands," Califano v. Goldfarb, 430 U.S. 199, 221, 97 S.Ct. 1021, 1034, 51 L.Ed.2d 270 (1977) (Stevens, J., concurring in judgment). They are precisely those who are not "needy spouses" and who are "least likely to have been victims of . . . discrimination," ibid., by the institution of marriage. A gender-based classification which, as compared to a gender-neutral one, generates additional benefits only for those it has no reason to prefer cannot survive equal protection Legislative classifications which distribute benefits and burdens on the basis of gender carry the inherent risk of reinforcing the stereotypes about the "proper place" of women and their need for special protection. Cf. United Jewish Organizations v. Carey, 430 U.S. 144, 173-174, 97 S.Ct. 996, 1013-1014, 51 L.Ed.2d 229 (1977) (opinion concurring in part). Thus, even statutes purportedly designed to compensate for and ameliorate the effects of past discrimination must be carefully tailored. Where, as here, the State's compensatory and ameliorative purposes are as well served by a gender-neutral classification as one that gender classifies and therefore carries with it the baggage of sexual stereotypes, the State cannot be permitted to classify on the basis of sex. And this is doubly so where the choice made by the State appears to redoundif only indirectlyto the benefit of those without need for special solicitude. Having found Alabama's alimony statutes unconstitutional, we reverse the judgment below and remand the cause for further proceedings not inconsistent with this opinion. That disposition, of course, leaves the state courts free to decide any questions of substantive state law not yet passed upon in this litigation. Indiana ex rel. Anderson v. Brand, 303 U.S. 95, 109, 58 S.Ct. 443, 450, 82 L.Ed. 685 (1938); C. Wright, Federal Courts, at 544. See South Dakota v. Opperman, 428 U.S. 364, 396, 96 S.Ct. 3092, 3110, 49 L.Ed.2d 1000 (1976) (Marshall, J., dissenting); United Air Lines, Inc. v. Mahin, 410 U.S., at 632, 93 S.Ct., at 1192; California v. Green, 399 U.S. 149, 169-170, 90 S.Ct. 1930, 1940-1941, 26 L.Ed.2d 489 (1970); Schuylkill Trust Co. v. Pennsylvania, 302 U.S. 506, 512, 58 S.Ct. 295, 297, 82 L.Ed. 392 (1938); Georgia R. & Elec. Co. v. Decatur, 297 U.S. 620, 623-624, 56 S.Ct. 606, 607, 80 L.Ed. 925 (1936). Therefore, it is open to the Alabama courts on remand to consider whether Mr. Orr's stipulated agreement to pay alimony, or other grounds of gender-neutral state law, bind him to continue his alimony payments. 13 Mr. Justice BLACKMUN, concurring. On the assumption that the Court's language concerning discrimination "in the sphere" of the relevant preference statute, ante, at 281, does not imply that society-wide discrimination is always irrelevant, and on the further assumption that that language in no way cuts back on the Court's decision in Kahn v. Shevin, 416 U.S. 351, 94 S.Ct. 1734, 40 L.Ed.2d 189 (1974), I join the opinion and judgment of the Court. Mr. Justice STEVENS, concurring. Whether Mr. Orr has a continuing contractual obligation to pay alimony to Mrs. Orr is a question of Alabama law that the Alabama courts have not yet decided. In Part I-B of his opinion, Mr. Justice REHNQUIST seems to be making one of two alternative suggestions: (1) that we should decide the state-law issue; or (2) that we should direct the Supreme Court of Alabama to decide that issue before deciding the federal constitutional issue. In my judgment the Court has correctly rejected both of these alternatives. To accept eitheror a rather confused blend of the twowould violate principles of federalism that transcend the significance of this case.* I therefore join the Court's opinion. Mr. Justice POWELL, dissenting. I agree with Mr. Justice REHNQUIST that the Court, in its desire to reach the equal protection issue in this case, has dealt too casually with the difficult Art. III problems which confront us. Rather than assume the answer to questions of state law on which the resolution of the Art. III issue should depend, and which well may moot the equal protection question in this case, I would abstain from reaching either of the constitutional questions at the present time. This Court repeatedly has observed: "[W]hen a federal constitutional claim is premised on an unsettled question of state law, the federal court should stay its hand in order to provide the state courts an opportunity to settle the underlying state-law question and thus avoid the possibility of unnecessarily deciding a constitutional question." Harris County Comm'rs Court v. Moore, 420 U.S. 77, 83, 95 S.Ct. 870, 875, 43 L.Ed.2d 32 (1975). See Elkins v. Moreno, 435 U.S. 647, 98 S.Ct. 1338, 55 L.Ed.2d 614 (1978); Boehning v. Indiana State Employees Assn., Inc., 423 U.S. 6, 96 S.Ct. 168, 46 L.Ed.2d 148 (1975); Askew v. Hargrave, 401 U.S. 476, 91 S.Ct. 856, 28 L.Ed.2d 196 (1971); Reetz v. Bozanich, 397 U.S. 82, 90 S.Ct. 788, 25 L.Ed.2d 68 (1970); Aldrich v. Aldrich, 378 U.S. 540, 84 S.Ct. 1687, 12 L.Ed.2d 1020 (1964); Dresner v. Tallahassee, 378 U.S. 539, 84 S.Ct. 1895, 12 L.Ed.2d 1018 (1964); Clay v. Sun Ins. Office, Ltd., 363 U.S. 207, 80 S.Ct. 1222, 4 L.Ed.2d 1170 (1960); Meridian v. Southern Bell Tel. & Tel. Co., 358 U.S. 639, 79 S.Ct. 455, 3 L.Ed.2d 562 (1959); Spector Motor Service, Inc. v. McLaughlin, 323 U.S. 101, 65 S.Ct. 152, 89 L.Ed. 101 (1944); Railroad Comm'n v. Pullman Co., 312 U.S. 496, 61 S.Ct. 643, 85 L.Ed. 971 (1941). The Court should follow this principle in the present case. Here there are present two questions of state law, the resolution of which almost certainly will determine the outcome of this litigation, and at the least will substantially alter the issues presented. The Court concedes that Alabama properly might regard this challenge to the terms of the divorce decree as untimely, as it came for the first timemore than two years after the decree became finalin a contempt proceeding to enforce the alimony obligation. Ante, at 275 n. 4. Moreover, appellant had interposed no objection to the entry of the decree and the approval therein of the settlement agreement, nor had he questioned the validity of the Alabama statute. If, in these circumstances, provisions of a divorce decree are subject to collateral attack, grave questions will arise in Alabama and other States. It hardly need be said that the policy of repose embodied in a prohibition of collateral attack has especial importance with respect to divorce and alimony decrees. It is not surprising, therefore, that subsequent to its decision in this case the Alabama Court of Civil Appeals held that a claim identical to appellant's would not be considered, where the husband raised it for the first time on a motion for a new trial. Hughes v. Hughes, 362 So.2d 910, cert. dismissed as improvidently granted, 362 So.2d 918 (Ala.1978), appeal docketed, No. 78-1071. This holding should apply a fortiori to a case where the constitutional claim was not raised until a contempt proceeding. The second question of state law concerns the formal settlement agreement entered into between appellant and appellee, which deals in detail with the "property rights, alimony, and other matters in dispute" between the parties, and which was approved by the divorce court. The agreement requires the husband to pay $1,240 per month for the "support and maintenance, use and comfort" of the wife for her life or until she remarries. It also specifies that the terms and provisions of the agreement "shall inure to and be binding upon the parties hereto and their respective heirs, assigns, executors, administrators and legal representatives." App. 7-15. Although the Court does not view this agreement as any obstacle to reaching the constitutional question, it does acknowledge that appellant "may have a continuing obligation to his former wife based upon that agreement"as a matter of "state contract law" quite apart from the divorce decree. Ante, at 275. If appellant's collateral attack on the terms of the divorce decree could not properly be entertained under Alabama law, or if the alimony obligation assumed by appellant in the settlement agreement remains enforceable under Alabama law, the question whether this Court constitutionally may exercise jurisdiction over the dispute would be close and difficult.1 In addition, it would be unnecessary to consider the constitutionality of Alabama's divorce statute, as the adequate-and-independent-state-ground doctrine then would bar federal review of the judgment against appellant.2 The Court, in order to find a case or controversy present here, necessarily assumes the answer to both of the state-law questions in this case. In some circumstances such assumptions might be appropriate. We cannot anticipate every state-law issue that ultimately could bar the realization of an otherwise substantial federal claim, and the failure of either the state courts or the parties to address an issue ordinarily might indicate that it does not present a problem. But here the Court concedes the substantiality of the identified but unanswered questions. Indeed, in light of Hughes v. Hughes, supra, it could not do The uncertainty and ambiguity surrounding this case is accentuated by the fact that appellant apparently does not contend that the entire divorce decree is invalid; he seeks relief only from so much of the decree as imposes an alimony obligation. But this obligation is only one element of the detailed and comprehensive agreement signed by the parties and witnessed by their respective attorneys. The agreement was not made subject to the approval of the divorce court. Apart from whether the contractual obligation to pay alimony remains binding on appellant, is there a question as to the binding effect of the divorce itself upon appellee? Would she have agreed to divorce appellant without a contest, and without making a record of her grounds for divorce, unless she had the assurance of a valid and enforceable court order providing support and maintenance for her lifetime? Apparently none of these questions was raised in either of the Alabama courts. No explanation has been offered us as to why the case is presented here in this manner.3 In view of the substantiality of the unanswered questions, it must be conceded that serious doubts exist as to either the presence of a judicially cognizable case or controversy or to appellant's obtaining any advantage from his constitutional claim. The failure of the parties to raise the questions in the courts below, and of the courts to raise them sua sponte, cannot bind us. On the record before us it cannot be said with assurance that the interests of these parties before this Court are fully adversary or that they are not seekingfor reasons undiscloseda purely advisory opinion on a constitutional issue of considerable importance.4 In these circumstances, I find the Court's insistence upon reaching and deciding the merits quite irreconcilable with the long-established doctrine that we abstain from reaching a federal constitutional claim that is premised on unsettled questions of state law without first affording the state courts an opportunity to resolve such questions. I therefore would remand the case to the Supreme Court of Alabama. Mr. Justice REHNQUIST, with whom THE CHIEF JUSTICE joins, dissenting. In Alabama only wives may be awarded alimony upon divorce. In Part I of its opinion, the Court holds that Alabama's alimony statutes may be challenged in this Court by a divorced male who has never sought alimony, who is demonstrably not entitled to alimony even if he had, and who contractually bound himself to pay alimony to his former wife and did so without objection for over two years. I think the Court's eagerness to invalidate Alabama's statutes has led it to deal too casually with the "case and controversy" requirement of Art. III of the Constitution. * The architects of our constitutional form of government, to assure that courts exercising the "judicial power of the United States" would not trench upon the authority committed to the other branches of government, consciously limited the Judicial Branch's "right of expounding the Constitution" to "cases of a Judiciary Nature"1 that is, to actual "cases" and "controversies" between genuinely adverse parties. Central to this Art. III limitation on federal judicial power is the concept of standing. The standing inquiry focuses on the party before the Court asking whether he has " 'such a personal stake in the outcome of the controversy' as to warrant his invocation of federal-court jurisdiction and to justify exercise of the court's remedial powers on his behalf." Warth v. Seldin, 422 U.S. 490, 498-499, 95 S.Ct. 2197, 2205, 45 L.Ed.2d 343 (1975) (emphasis in original), quoting Baker v. Carr, 369 U.S. 186, 204, 82 S.Ct. 691, 703, 7 L.Ed.2d 663 (1962). Implicit in the concept of standing, are the requirements of injury in fact and causation. To demonstrate the "personal stake" in the litigation necessary to satisfy Art. III, the party must suffer "a distinct and palpable injury," Warth v. Seldin, supra, 422 U.S., at 501, 95 S.Ct., at 2206, that bears a " 'fairly traceable' causal connection" to the challenged government action. Duke Power Co. v. Carolina Environmental Study Group, Inc., 438 U.S. 59, 72, 98 S.Ct. 2620, 2630, 57 L.Ed.2d 595 (1978), quoting Arlington Heights v. Metropolitan Housing Dev. Corp., 429 U.S. 252, 261, 97 S.Ct. 555, 561, 50 L.Ed.2d 450 (1977). When a party's standing to raise an issue is questioned, therefore, "the relevant inquiry is whether . . . [he] has shown an injury to himself that is likely to be redressed by a favorable decision." Simon v. Eastern Kentucky Welfare Rights Org., 426 U.S. 26, 38, 96 S.Ct. 1917, 1924, 48 L.Ed.2d 450 (1976). Stated differently, a party who places a question before a federal court must "stand to profit in some personal interest" from its resolution, else the exercise of judicial power would be gratuitous. Id., at 39, 96 S.Ct., at 1925. The sole claim before this Court is that Alabama's alimony statutes, which provide that only husbands may be required to pay alimony upon divorce, violate the Equal Protection Clause of the Fourteenth Amendment. Statutes alleged to create an impermissible gender-based classification are generally attacked on one of two theories. First, the challenged classification may confer on members of one sex a benefit not conferred on similarly situated members of the other sex. Clearly, members of the excluded class those who but for their sex would be entitled to the statute's benefitshave a sufficient "personal stake" in the outcome of an equal protection challenge to the statute to invoke the power of the federal judiciary. Thus, a widower has standing to question the constitutionality of a state statute granting a property tax exemption only to widows. See Kahn v. Shevin, 416 U.S. 351, 94 S.Ct. 1734, 40 L.Ed.2d 189 (1974). Likewise, this Court has reached the merits of a retired male wage earner's equal protection challenge to a federal statute granting higher monthly old-age benefits to similarly situated female wage earners. See Califano v. Webster, 430 U.S. 313, 97 S.Ct. 1192, 51 L.Ed.2d 360 (1977). Standing to raise these constitutional claims was not destroyed by the fact that the State of Florida in Kahn, and Congress in Webster, were capable of frustrating a victory in this Court by merely withdrawing the challenged statute's benefits from the favored class rather than extending them to the excluded class. See Stanton v. Stanton, 421 U.S. 7, 17, 95 S.Ct. 1373, 1379, 43 L.Ed.2d 688 (1975). Second, the challenged statute may saddle members of one sex with a burden not borne by similarly situated members of the other sex. Standing to attack such a statute lies in those who labor under its burden. For example, in Califano v. Goldfarb, 430 U.S. 199, 97 S.Ct. 1021, 51 L.Ed.2d 270 (1977), this Court sustained a widower's equal protection challenge to a provision of the Social Security Act that burdened widowers but not widows with the task of proving dependency upon the deceased spouse in order to qualify for survivor's benefits. A similar statute was invalidated in Frontiero v. Richardson, 411 U.S. 677, 93 S.Ct. 1764, 36 L.Ed.2d 583 (1973), at the instance of a female member of the uniformed services who, unlike her male counterparts, was required to prove her spouse's dependency in order to obtain increased quarters allowances and health benefits. The statutes at issue here differ from those discussed above in that the benefit flowing to divorced wives derives from a burden imposed on divorced husbands. Thus, Alabama's alimony statutes in effect create two gender classifications: that between needy wives, who can be awarded alimony under the statutes, and needy husbands, who cannot; and that between financially secure husbands, who can be required to pay alimony under the statutes, and financially secure wives, who cannot. Appellant Orr's standing to raise his equal protection claim must therefore be analyzed in terms of both of these classifications. This Court has long held that in order to satisfy the injury-in-fact requirement of Art. III standing, a party claiming that a statute unconstitutionally withholds a particular benefit must be in line to receive the benefit if the suit is successful. In Supervisors v. Stanley, 105 U.S. 305, 26 L.Ed. 1044 (1882), shareholders of a national bank attacked the validity of a state property tax statute that did not, contrary to federal law, permit deduction of personal debts from the assessed value of their bank stock. With respect to the constitutional claim of shareholders who had failed to allege the existence of personal debts that could be deducted under a valid statute, the Court reasoned: "What is there to render the [state statute] void as to a shareholder in a national bank, who owes no debts which he can deduct from the assessed value of his shares? The denial of this right does not affect him. He pays the same amount of tax that he would if the law gave him the right of deduction. He would be in no better condition if the law expressly authorized him to make the deduction. What legal interest has he in a question which only affects others? Why should he invoke the protection of the act of Congress in a case where he has no rights to protect? Is a court to sit and decide abstract questions of law in which the parties before it show no interest, and which, if decided either way, affect no right of theirs? ". . . If no such right exists, the delicate duty of declaring by this court that an act of State legislation is void, is an assumption of authority uncalled for by the merits of the case, and unnecessary to the assertion of the rights of any party to the suit." Id., at 311-312. It is undisputed that the parties now before us are "a needy wife who qualifies for alimony and a husband who has the property and earnings from which alimony can be paid." 351 So.2d 906, 907 (1977), (Jones, J., dissenting). Under the statute pertinent to the Orrs' divorce, alimony may be awarded against the husband only "[i]f the wife has no separate estate or if it be insufficient for her maintenance." Ala.Code 30-2-51 (1975). At the time of their divorce, Mr. Orr made no claim that he was not in a position to contribute to his needy wife's support, much less that she should be required to pay alimony to him.2 On the contrary, the amount of alimony awarded by the Alabama trial court was agreed to by the parties, and appellant has never sought a reduction in his alimony obligation on the ground of changed financial circumstances. See Davis v. Davis, 274 Ala. 277, 147 So.2d 828 (1962); Garlington v. Garlington, 246 Ala. 665, 22 So.2d 89 (1945). On these facts, it is clear that appellant is not in a position to benefit from a sex-neutral alimony statute.3 His standing to raise the constitutional question in this case, therefore, cannot be founded on a claim that he would, but for his sex, be entitled to an award of alimony from his wife under the Alabama statutes. The Court holds that Mr. Orr's standing to raise his equal protection claim lies in the burden he bears under the Alabama statutes. He is required to pay alimony to his needy former spouse while similarly situated women are not. That the State may render Mr. Orr's victory in this Court a hollow one by neutrally extending alimony rights to needy husbands does not, according to the Court, destroy his standing, for the State may elect instead to do away with alimony altogether. The possibility that Alabama will turn its back on the thousands of women currently dependent on alimony checks for their support4 is, as a practical matter, nonexistent. But my conclusion that appellant lacks standing in this Court does not rest on the strong likelihood that Alabama will respond to today's decision by passing a sex-neutral statute. Appellant has simply not demonstrated that either alternative open to the Stateeven the entire abrogation of alimonywill free him of his burden. The alimony obligation at issue in this case was fixed by an agreement between the parties, and appellant makes no claim that the contract is unenforceable under state law. Indeed, the Court itself concedes that "despite the unconstitutionality of the alimony statutes, Mr. Orr may have a continuing obligation to his former wife based upon [their] agreement." Ante, at 275. The Court casually dismissed the matter, however, as one "which we cannot, and would not, predict." Ante, at 276 n. 5. I cannot accede to the Court's offhand dismissal of so serious an obstacle to the exercise of our jurisdiction. It is not our duty to establish Orr's standing to have his claim decided on the merits. On the contrary, the burden is on him "to meet the minimum requirement of Art. III: to establish that, in fact, the asserted injury was the consequence of the [unconstitutional statute], or that prospective relief will remove the harm." Warth v. Seldin, 422 U.S., at 505, 95 S.Ct., at 2208; Duke Power Co. v. Carolina Environmental Study Group, Inc., supra, 438 U.S., at 72, 98 S.Ct., at 2630; Arlington Heights v. Metropolitan Housing Dev. Corp., 429 U.S., at 260-261, 97 S.Ct., at 560-561, 50 L.Ed.2d 450; Simon v. Eastern Kentucky Welfare Rights Org., 426 U.S., at 38, 96 S.Ct., at 1924; Linda R. S. v. Richard D., 410 U.S. 614, 617, 93 S.Ct. 1146, 1148, 35 L.Ed.2d 536 (1973). That appellant has not carried this burden is clearly demonstrated by the Court's acknowledgment that his alimony obligation may well be enforced under state contract law. The Court's analysis of Mr. Orr's standing is not aided by its attempt to transform the instant case into one involving race discrimination. See ante, at 273. Of course, a state law imposing alimony obligations on blacks but not whites could be challenged by a black required, by operation of the statute, to pay alimony. Invalidation of the discriminatory alimony statute would relieve him of his burden. If, however, his alimony obligation was enforceable under state contract law independent of the challenged alimony statute, he could hardly argue that his injury was caused by the challenged statute. Invalidation of the statute would bring him no relief. Accordingly, the exercise of federal judicial power on his behalf "would be gratuitous and thus inconsistent with the Art. III limitation." Simon v. Eastern Kentucky Welfare Rights Org., supra, 426 U.S., at 38, 96 S.Ct., at 1924. Nor is the Court's conclusion supported by Linda R. S. v. Richard D., supra. At issue in Linda R. S. was a state statute subjecting to criminal prosecution any "parent" failing to support his "children." State courts had consistently construed the statute to apply solely to the parents of legitimate children and to impose no duty of support on the parents of illegitimate children. The mother of an illegitimate child, claiming that the "discriminatory application" of the statute violated the Equal Protection Clause, sought an injunction directing the local district attorney to prosecute the father of her child for violating the statute. This Court held that she lacked standing to raise her claim. While she "no doubt suffered an injury stemming from the failure of her child's father to contribute support payments," she had made "no showing that her failure to secure support payments result[ed] from the nonenforcement, as to her child's father, of [the child-support statute]." Linda R. S. v. Richard D., 410 U.S., at 618, 93 S.Ct., at 1149. "Thus, if appellant were granted the requested relief, it would result only in the jailing of the child's father. The prospect that prosecution will, at least in the future, result in payment of support can, at best, be termed only speculative. Certainly the 'direct' relationship between the alleged injury and the claim sought to be adjudicated, which previous decisions of this Court suggest is a prerequisite of standing, is absent in this case." Ibid. Like appellant in Linda R. S., Mr. Orr has failed to show a "substantial likelihood"5 that the requested relief will result in termination of his alimony obligation. Thus, far from supporting the Court's finding of standing in appellant Orr, Linda R. S. leads inescapably to the opposite conclusion.6 Nor is appellant's lack of standing somehow cured by the fact that the state courts reached and decided the merits of his constitutional claim. Article III is a jurisdictional limitation on federal courts, and a state court cannot transform an abstract or hypothetical question into a "case or controversy" merely by ruling on its merits. In Doremus v. Board of Education, 342 U.S. 429, 72 S.Ct. 394, 96 L.Ed. 475 (1952), this Court held that a taxpayer lacked the requisite financial interest in the outcome of a First Amendment challenge to a state statute requiring Bible reading in public schools. In dismissing the taxpayer's appeal from an adverse ruling in the State's highest court, this Court held: "We do not undertake to say that a state court may not render an opinion on a federal constitutional question even under such circumstances that it can be regarded only as advisory. But, because our own jurisdiction is cast in terms of 'case or controversy' we cannot accept as the basis for review, nor as the basis for conclusive disposition of an issue of federal law without review, any procedure which does not constitute such." Id., at 434, 72 S.Ct., at 397. Appellant's case, having come to us on appeal rather than on writ of certiorari, is much like Marbury's case in that Congress conferred upon each litigant the right to have his claim heard in this Court. But here, as in Marbury v. Madison, 1 Cranch 137, 2 L.Ed. 60 (1803), and Doremus, supra, we are, in my opinion, prevented by Art. III of the Constitution from exercising the jurisdiction which Congress has sought to confer upon us. Article III courts are not commissioned to roam at large, gratuitously righting perceived wrongs and vindicating claimed rights. They must await the suit of one whose advocacy is inspired by a "personal stake" in victory. The Framers' wise insistence that those who invoke the power of a federal court personally stand to profit from its exercise ensures that constitutional issues are not decided in advance of necessity and that the complaining party stand in the shoes of those whose rights he champions. Obedience to the rules of standing the "threshold determinants of the propriety of judicial intervention"7 is of crucial importance to constitutional adjudication in this Court, for when the parties leave these halls, what is done cannot be undone except by constitutional amendment. Much as "Caesar had his Brutus; Charles the First his Cromwell," Congress and the States have this Court to ensure that their legislative Acts do not run afoul of the limitations imposed by the United States Constitution. But this Court has neither a Brutus nor a Cromwell to impose a similar discipline on it. While our "right of expounding the Constitution" is confined to "cases of a Judiciary Nature," we are empowered to determine for ourselves when the requirements of Art. III are satisfied. Thus, "the only check upon our own exercise of power is our own sense of self-restraint." United States v. Butler, 297 U.S. 1, 79, 56 S.Ct. 312, 325, 80 L.Ed. 477 (1936) (Stone, J., dissenting). I do not think the Court, in deciding the merits of appellant's constitutional claim, has exercised the self-restraint that Art. III requires in this case. I would therefore dismiss Mr. Orr's appeal on the authority of Doremus v. Board of Education, supra. The statutes, Ala.Code, Tit. 30 (1975), provide that: " 30-2-51. . . . If the wife has no separate estate or if it be insufficient for her maintenance, the judge, upon granting a divorce, at his discretion, may order to the wife an allowance out of the estate of the husband, taking into consideration the value thereof and the condition of his family. " 30-2-52. . . . If the divorce is in favor of the wife for the misconduct of the husband, the judge trying the case shall have the right to make an allowance to the wife out of the husband's estate, or not make her an allowance as the circumstances of the case may justify, and if an allowance is made, it must be as liberal as the estate of the husband will permit, regard being had to the condition of his family and to all the circumstances of the case. " 30-2-53. . . . If the divorce is in favor of the husband for the misconduct of the wife and if the judge in his discretion deems the wife entitled to an allowance, the allowance must be regulated by the ability of the husband and the nature of the misconduct of the wife." The Alabama Supreme Court has held that "there is no authority in this state for awarding alimony against the wife in favor of the husband. . . . The statutory scheme is to provide alimony only in favor of the wife." Davis v. Davis, 279 Ala. 643, 644, 189 So.2d 158, 160 (1966). There is some uncertainty on this point. It may be that appellant's Circuit Court motion challenging the constitutionality of the statutes could be construed as constituting a claim for alimony. The Appeals Court opinion refers to one of Mr. Orr's arguments as challenging the failure of the statutes to "provide for an award of alimony to . . . males . . .," 351 So.2d 904, 905 (1977), and, in oral argument, appellant's attorney characterized his motion as asserting a claim to such an award. Tr. of Oral Arg. 7-8. Of course, whether or not this was the proper way to assert a claim for alimony may be a question of state law, but the state courts did not challenge appellant's standing on this or any other ground. Careful examination of appellant's allegations reveals that he may not need to rely upon these arguments to demonstrate his standing, for he alleges that he will receive some relief no matter which gender-neutral reform of the statutes Alabama chooses to make. Even if Alabama chooses to burden both men and women with alimony requirements in appropriate circumstances, Mr. Orr argues that a gender-neutral statute would result in lower payments on his part. He argues that the current statutes award alimony to wives based not solely upon need or comparative financial circumstances, but also upon gender-related factorse. g., the State's view that a man must maintain his wife in the manner to which she has been accustomed, Ortman v. Ortman, 203 Ala. 167, 82 So. 417 (1919). He also argues that alimony agreements are not automatically incorporated into court decrees, but rather are usually first reviewed as to their fairness to the wife, but not to the husband, see Russell v. Russell, 247 Ala. 284, 286, 24 So.2d 124, 126 (1945). Given our disposition of the case, we need not resolve these allegations, but they serve to render unassailable appellant's standing to assert the unconstitutionality of the statutes. This does not preclude any other State, or even Alabama in another case, from holding that contempt proceedings are too late in the process to challenge the constitutionality of a divorce decree already entered without constitutional objectionassuming, of course, that the State's prior proceedings permit fair opportunity to assert the federal right, see NAACP v. Alabama, 377 U.S. 288, 84 S.Ct. 1302, 12 L.Ed.2d 325 (1964). Indeed, as our Brother POWELL points out, post, at 286, Alabama apparently has a similar rule. See Hughes v. Hughes, 362 So.2d 910 (Ala.Civ.App.), cert. dismissed as improvidently granted, 362 So.2d 918 (Ala.1978), appeal docketed, No. 78-1071. There is, therefore, no reason for concern that today's decision might nullify existing alimony obligations. But the fact that state courts can decline to hear such tardily raised constitutional challenges does not mean that as a matter of federal law they must do so. And where they decide instead to reach the federal question, this Court has jurisdiction. See Beecher v. Alabama, 389 U.S. 35, 37 n. 3, 88 S.Ct. 189, 190 n. 3, 19 L.Ed.2d 35 (1967), and cases cited in text, supra, this page. Whether Mrs. Orr's contempt judgment would survive on the basis of the stipulation alone depends upon the resolution of somewhat knotty state-law problems. The foremost of these is the fact that the present suit is not a simple action for breach of contract, but rather a contempt proceeding for disobeying the court's divorce decree. Moreover, under Alabama law, the divorce court judge does not automatically approve stipulated settlements, but must review them for fairness. Russell v. Russell, supra. How the Alabama courts would treat Mr. Orr's stipulation after the invalidation of the gender-based alimony statutes is a matter which we cannot, and would not, predict. The fact that the State Supreme Court merely quashed the petition for certiorari, so that the highest state court actually to decide the merits of the case was the Court of Appeals, does not alter this result. In Cicenia v. Lagay, 357 U.S. 504, 507-508, n. 2, 78 S.Ct. 1297, 1299, n. 2, 2 L.Ed.2d 1523 (1958), overruled on other grounds, Miranda v. Arizona, 384 U.S. 436, 479 n. 48, 86 S.Ct. 1602, 1630 n. 48, 16 L.Ed.2d 694 (1966), for example, the New Jersey Superior Court decided the case on federal constitutional grounds, although state grounds might have been available, and the State Supreme Court denied certification without giving reasonsprecisely the situation present here. In fact, the claim that an independent state ground existed was even stronger in Cicenia than here, because there the trial court, the Essex County Court, had rested its decision on state law. Nonetheless, Cicenia held: "Since the Superior Court had dealt with petitioner's constitutional claims ON THE MERITS . . . JURISDICTION EXISTS. . . . [w]e shall not assume that the New Jersey Supreme Court's decision denying leave to appeal was based on th[e] nonfederal ground." 357 U.S., at 507-508, n. 2, 78 S.Ct., at 1299, n. 2. Our Brother REHNQUIST's dissent contends that Doremus v. Board of Education, 342 U.S. 429, 72 S.Ct. 394, 96 L.Ed. 475 (1952), requires dismissal of Mr. Orr's appeal. The quotation from Doremus cited by our Brother REHNQUIST, post, at 299, merely confirms the obvious proposition that a state court cannot confer standing before this Court on a party who would otherwise lack it. But that proposition is wholly irrelevant to this case. Although a state court cannot confer standing in this Court, it can decline to place purely state-law obstacles in the way of an appellant's right to have this Court decide his federal claim. Our Brother REHNQUIST argues that a matter state contract law, albeit unsettled, denies Orr his otherwise clear standing. But that could only be the case if the Alabama courts had construed the stipulation as continuing to bind Mr. Orr something which the Alabama courts do not do. By addressing and deciding the merits of Mr. Orr's constitutional argument, the Alabama courts have declined to interpose this obstacle to Mr. Orr's standing. Our Brother POWELL's dissent makes two objections to our reaching the merits of this case. The first is that this Court should abstain from deciding the constitutional issue until the cause is remanded to afford the Alabama Supreme Court a second opportunity to consider the case. For authority he cites opinions applying the so-called "Pullman abstention" doctrine. See Railroad Comm'n v. Pullman Co., 312 U.S. 496, 61 S.Ct. 643, 85 L.Ed. 971 (1941). But that doctrine is applicable only where the state court to be deferred to has not previously examined the case. Not one of the long string of opinions cited by our Brother POWELL, post, at 285-286, approved abstention in a situation like this one, where the court to which the question would be referred already considered the case. The more surprising, indeed disturbing, objection made by our Brother POWELL is the suggestion that the parties may have colluded to bring the constitutional issue before this Court. Post, at 288-289, and n. 4. No evidence whatever, within or outside the record, supports that accusation. And our Brother POWELL suggests none. Indeed, it is difficult to imagine what possible interest Mrs. Orr could have in helping her ex-husband resist her demand for $5,524 in back alimony. Appellee attempts to buttress the importance of this objective by arguing that while "[t]he common law stripped the married woman of many of her rights and most of her property, . . . it attempted to partially compensate by giving her the assurance that she would be supported by her husband." Brief for Appellee 11-12. This argument, that the "support obligation was imposed by the common law to compensate the wife for the discrimination she suffered at the hands of the common law," id., at 11, reveals its own weakness. At most it establishes that the alimony statutes were part and parcel of a larger statutory scheme which invidiously discriminated against women, removing them from the world of work and property and "compensating" them by making their designated place "secure." This would be reason to invalidate the entire discriminatory schemenot a reason to uphold its separate invidious parts. But appellee's argument is even weaker when applied to the facts of this case, as Alabama has long ago removed, by statute, the elements of the common law appellee points to as justifying further discrimination. See Ala.Const., Art. X, 209 (married women's property rights). Of course, if upon examination it becomes clear that there is no substantial relationship between the statutes and their purported objectives, this may well indicate that these objectives were not the statutes' goals in the first place. See Ely, The Centrality and Limits of Motivation Analysis, 15 San Diego L.Rev. 1155 (1978). We would also consider whether the purportedly compensatory "classifications in fact penalized women," and whether "the statutory structure and its legislative history revealed that the classification was not enacted as compensation for past discrimination." Califano v. Webster, 430 U.S., at 317, 97 S.Ct., at 1194. It might be argued that Alabama's rule at least relieves the State of the administrative burden of actions by husbands against their wives for alimony. However, when the wife is also seeking alimony, no savings will occur, as a hearing will be required in any event. But even when the wife is willing to forgo alimony, it appears that under Alabama law savings will still not accrue, as Alabama courts review the financial circumstances of the parties to a divorce despite the parties' own viewseven when settlement is reached. See Russell v. Russell, 247 Ala. 284, 286, 24 So.2d 124, 126 (1945). Even were this not true, and some administrative time and effort were conserved, "[t]o give a mandatory preference to members of either sex . . . merely to accomplish the elimination of hearings on the merits, is to make the very kind of arbitrary legislative choice forbidden by the Equal Protection Clause," Reed v. Reed, 404 U.S. 71, 76, 92 S.Ct. 251, 254, 30 L.Ed.2d 225 (1971). Indiana ex rel. Anderson v. Brand, 303 U.S. 95, 109, 58 S.Ct. 443, 450, 82 L.Ed. 685 (1938), is dispositive to this effect. There, the Indiana state courts had available two potential grounds for upholding the actions of a public school in dismissing a teacher. One was a matter purely of state law; the other required holding that the dismissal had not violated the Contracts Clause of the Federal Constitution. The Indiana courts chose the latter course and did not pass upon the state question. While recognizing that the state ground could have been relied upon, Anderson held, as we have held here, that the decision of the state court to reach the merits of the constitutional question without relying on the potential state ground gave this Court jurisdiction. As we have done here, the Court in Anderson proceeded to decide the federal question against the State and reversed the judgment below. The case was remanded, the Court noting that the state-law ground was still available as a defense for the school and could be so considered by the state courts. Similarly, the effect of Mr. Orr's stipulation, and any other matter of substantive state law not yet passed upon, may now be considered by the Alabama courts on remand. Even if I could agree with Mr. Justice REHNQUIST's view that Mr. Orr's probability of success on the state-law issue is so remote that we should deny him standing to argue the federal question decided by the Alabama Supreme Court, I still would not understand how he reached the conclusion that the litigation between Mr. and Mrs. Orr is not a "case or controversy" within the meaning of Art. III. The Court confuses the questions of the existence of a case or controversy under Art. III with the application of the adequate-and-independent-stateground doctrine. It is true that the failure of the courts below to rest their decision on a state-law ground means that we are not without power to decide the case for that reason. Cf. Murdock v. Memphis, 20 Wall. 590, 22 L.Ed. 429 (1875). But this does not determine whether the presence in fact of state-law grounds for the decision below bars a federal court from considering this claim under Supervisors v. Stanley, 105 U.S. 305, 26 L.Ed. 1044 (1882). The Court implies that principles of equitable abstention expressed in the Pullman decision never can apply when the court to which the unresolved question of state law will be referred already has considered the case. Ante, at 278 n. 8. But, as the unusual posture of this case illustrates, a state court may have considered a case without having had the relevant state-law questions presented to it. See n. 3, infra. Where this is true, the policies that underlie Pullman should apply with equal force. As the Court notes, in appellee's brief in the Alabama Court of Civil Appeals she stated that "[t]he appellee agrees that the issue before this Court is whether the Alabama alimony laws are unconstitutional because of the gender based classification made in the statutes." Ante, at 276. She made no reference to Alabama authority that already had held that constitutional attacks on the divorce statute would not be heard unless presented at the time the divorce is contested. See Dale v. Dale, 54 Ala.App. 505, 310 So.2d 225 (1975). Even more inexplicable, appellee before this Court has made no reference to Hughes v. Hughes, 362 So.2d 910 (Ala.App.), cert. dismissed as improvidently granted, 362 So.2d 918 (Ala.1978), appeal docketed, No. 78-1071, in spite of that decision's clear relevance to this case. It is pertinent that the initial decision in Hughes was handed down more than seven months before appellee filed her brief before us, and that the final decision of the Supreme Court of Alabama was announced a month before argument in this case. It is curious, to say the least, that neither party in this case has raised these questions. The competency of appellee's counsel is evidenced by the thoroughness of the settlement agreement he negotiated and witnessed. Moreover, the questions not raised are neither abstruse nor difficult. In view of the way in which this case has been presented, we cannot dismiss the possibility of some rapprochement between these parties that could affect the genuineness of a case or controversy. There may well be an innocent explanation for these most unusual circumstances, but the absence of any such explanation appearing from the record suggests the wisdom of not deciding the 2 M. Farrand, The Records of the Federal Convention of 1787, p. 430 (1911). Indeed, on four different occasions the Constitutional Convention rejected a proposal, contained in the "Virginia Plan," to associate Justices of the Supreme Court in a counsel of revision designed to render advice on pending legislation. 1 id., at 21. Suggestions that the Chief Justice be a member of the Privy Council to assist the President, and that the President or either House of Congress be able to request advisory opinions of the Supreme Court were likewise rejected. 2 id., at 328-329, 340-344. The Court suggests that "[i]t may be that appellant's Circuit Court motion challenging the constitutionality of the statutes could be construed as constituting a claim for alimony." Ante, at 271-272 n. 2. The Court further notes that in any event, "the state courts did not challenge appellant's standing on this or any other ground." Ibid. Appellant's motion, made in response to the court's order to show cause why he should not be judged in contempt, provides in pertinent part: "WHEREFORE, your Respondent moves the Court for an order decreeing that: "1. Code of Alabama, Title 34, 31-33 arbitrarily discriminate against male spouses and thus are in violation of the equal protection clause of the United States Constitution and thereby are unconstitutional. "2. A permanent injunction be issued against the continued enforcement of these statutes. "3. The decree ordering your Respondent to pay the Complainant alimony be rendered null and void." App. to Juris. Statement 24a. How this can be construed as constituting a claim for alimony is beyond me. That the state courts did not challenge appellant's standing on his failure to claim entitlement to alimony is wholly irrelevant. We are not here concerned with the question whether Mr. Orr lacked standing under state law to bring this suit in an Alabama court. The Case and Controversy Clause of Art. III is a constitutional limitation on the jurisdiction of federal courts. See Doremus v. Board of Education, 342 U.S. 429, 72 S.Ct. 394, 96 L.Ed. 475 (1952). The Court states that appellant's standing is rendered "unassailable" by his allegations (1) that under Alabama law a man must maintain his wife in a manner to which she has been accustomed, and (2) that alimony stipulations are reviewed as to their fairness to the wife before being incorporated into court decrees. Ante, at 273-274 n. 3. The Court interprets these allegations as an argument by appellant Orr "that a gender-neutral statute would result in lower payments on his part." Ibid. First, appellant nowhere argues that his alimony obligation would have been less under a sex-neutral statute. The allegations cited by the Court are made in support of appellant's contention that the Alabama alimony statutes were inspired by "archaic notions" about the proper role of womena contention going to the merits of his equal protection claim rather than his standing to raise it. Second, since his alimony obligation was fixed by an agreement between the parties, appellant could not have seriously made such an argument in any event. Third, even if he had made the argument attributed to him by the Court, it is patently meritless. A gender-neutral alimony statute, by definition, treats husbands and wives the same. Presumably, therefore, a husband claiming under such a statute would be entitled to an amount sufficient to support him in the manner to which he had been accustomed and would be entitled to judicial review of the fairness of any alimony stipulation before its incorporation into the court decree. Far from rendering Mr. Orr's standing "unassailable," the allegations seized upon by the Court are utterly beside the point. The Court suggests that because the Alabama courts are free to hold that the constitutionality of a divorce decree entered without constitutional objection cannot be challenged in contempt proceedings, there is no reason for concern that today's decision will nullify existing alimony obligations. Alabama males currently under court order to pay alimony, however, need not wait until contempt proceedings are lodged against them to raise their constitutional challenge. Rather, they may simply petition the court for relief from the unconstitutional divorce decree. "Our recent cases have required no more than a showing that there is a 'substantial likelihood' that the relief requested will redress the injury claimed to satisfy the second prong of the constitutional standing requirement." Duke Power Co. v. Carolina Environmental Study Group, Inc., 438 U.S. 59, 75, n. 20, 98 S.Ct. 2620, 2631 n. 20, 57 L.Ed.2d 595 (1978). The Court seizes on our gratuitous observation in Linda R. S. that " 'the proper party to challenge the constitutionality of [the child-support statute] would be a parent of a legitimate child who has been prosecuted under the statute. Such a challenge would allege that because the parents of illegitimate children may not be prosecuted, the statute unfairly discriminates against the parents of legitimate children,' 335 F.Supp. [804], at 806." 410 U.S., at 619 n. 5, 93 S.Ct., at 1149 n. 5. As a statement on standing to challenge a discriminatory criminal statute, the quoted passage cannot be faulted. Clearly, a parent prosecuted under such a statute would satisfy both the injury-in-fact and the causation requirements of standinginvalidation of the statute would totally remove the prosecuted parent's harm. In the instant case, however, the Court itself admits that today's decision may well be gratuitous insofar as appellant Orr is Warth v. Seldin, 422 U.S. 490, 518, 95 S.Ct. 2197, 2215, 45 L.Ed.2d 343 Standing (Law) Equal Protection Clause Fourteenth Amendment To The United States Constitution Documents Similar To Orr v. Orr, 440 U.S. 268 (1979) Carlota Villaroman Kristelle Kua Louisa Matubis Leonidas Angelakos stevenhelton Deckboss xsar_x ArchAngelInstitute Jose Roco Lean Falcutila M. G. Davis & Co., Inc., Lawrence Levine, Walter Wax and Morris Kopel v. Manuel F. Cohen, as Chairman, Byron D. Woodside, Hugh F. Owens, Hamer H. Budge and Francis M. Wheat, as Members and Commissioners of the Securities and Exchange Commission, 369 F.2d 360, 2d Cir. (1966) Belsito Communications, Inc v. Decker, 1st Cir. (2016) CA9Doc 291 Kathleen Perrin 36_36_bombay_court.pdf SSRN-id569821-1 Akhmad Fikri Yahmani Galope Appeal Barclays Petition for Rehearing en Banc 4 14 SL Adocates for Truth in Lending, Inc v Bangko Sentral Monetary Board 688 SCRA 530 sunsetsailor85 United States v. Jacob C. Knupp, 448 F.2d 412, 4th Cir. (1971) Yara Engineering Corporation v. Commissioner of Internal Revenue, 344 F.2d 113, 3rd Cir. (1965) United States v. William v. Haddon, 550 F.2d 677, 1st Cir. (1977) More From Scribd Government Docs United States v. Olden, 10th Cir. (2017) THI of New Mexico at Vida Enca v. Lovato, 10th Cir. (2017) Coyle v. Jackson, 10th Cir. (2017) Harte v. Board Comm'rs Cnty of Johnson, 10th Cir. (2017) Greene v. Tennessee Board, 10th Cir. (2017) Brown v. Shoe, 10th Cir. (2017) United States v. Kieffer, 10th Cir. (2017) Wilson v. Dowling, 10th Cir. (2017) Consolidation Coal Company v. OWCP, 10th Cir. (2017) United States v. Roberson, 10th Cir. (2017) Payn v. Kelley, 10th Cir. (2017) Apodaca v. Raemisch, 10th Cir. (2017) Pecha v. Lake, 10th Cir. (2017) United States v. Garcia-Damian, 10th Cir. (2017) City of Albuquerque v. Soto Enterprises, 10th Cir. (2017) United States v. Kundo, 10th Cir. (2017) United States v. Muhtorov, 10th Cir. (2017) Webb v. Allbaugh, 10th Cir. (2017) United States v. Workman, 10th Cir. (2017) Northglenn Gunther Toody's v. HQ8-10410-10450, 10th Cir. (2017) United States v. Voog, 10th Cir. (2017) United States v. Magnan, 10th Cir. (2017) NM Off-Hwy Vehicle Alliance v. U.S. Forest Service, 10th Cir. (2017) Farrell-Cooper Mining v. DOI, 10th Cir. (2017) United States v. Kearn, 10th Cir. (2017) United States v. Henderson, 10th Cir. (2017) Robles v. United States, 10th Cir. (2017) United States v. Windom, 10th Cir. (2017) Title of the Projects MBA HR F334 JUN 09 ExamStuff EPS PG Programme Handbook Mohammed Shoaib Purchase Management Manjula Ashok 2014 Spring Catalog Pauloymaty eln (1).pdf Divya Das Gravers 2015 Understanding Options edscribe Infrastructure of E-commerce Aisha Akram FCE 231 Lesson 1 Lecture Notes [Compatibility Mode] Patrick Githinji Triangles-Previous-Year-Questions.pdf Mamta Yadav 3. the Nature of Organizational Theory csushant MOTHERS AND OTHERS: The Evolutionary Origins of Mutual Understanding / EXCERPT Kisssoft Tut 003 E Key Luis Testa Rey Caneos Marban Unit2Notesp1_23 leninbtech Hypotonic Infant Rashed Shatnawi DIVERSITY, COMPTABILITY AND NITROGEN FIXATION OF WILD LEGMES RHIZOBIA. IJAR Journal X-Ray Diffraction Methods Nandhan Dhiv Ppt for 1st Review Project sathisha123 The Emergency Transformation of Human Beings - Jason Liosotos Sunnen Philippe Diabetes Mellitus by Dr Relliquete (1) Kenneth Jed M. Robenta 20075325 Principles of Risk Management and Insurance F khush36 The Impact of Maternal Depression During Pregnancy on Perinatal Outcomes astroglia Abegail Anne Nucup
cc/2019-30/en_head_0021.json.gz/line1731819
__label__wiki
0.629157
0.629157
Since the passage of S.115 and the subsequent dramatic override of the governor's veto, I have been working on this piece, first in my mind, and then in the studio. The wonderful wood, with its prominent female genitalia and its skin bark (like a second, embracing woman), was given to me by Jim Lund, and the pieces strongly suggested a loving couple. During this time I read a posting on Daniel Wetmore's blog about his own wedding to Josephine Romano that said all this so much better than I could, and he has given his permission to reprint it below. You can find it on his blog here. The Meaning of Marriage, Revised Standard Version by Daniel Wetmore It had been a six month train ride and it ended here, in the dark, with the stacked-up chairs, the rented canopy, the portable potties, and a pile of fat black plastic trash bags next to the building. Memorial Hall, North Calais. August 17, 1997. The guests had all departed. Our extended families were snaking their way back down County Road, caravanning towards the Inn at Montpelier, my father’s car barely missing a moose that had stepped out of the darkness, and my mother so happy she could die. She actually said that, to my startled younger sister, “You know, Judy, I can die now. Danny is finally married.” Six months earlier, to the day, I had asked Jo to marry me. She said yes and from that moment we were tied to the calendar, to dates, places, people, to decisions that had to be made, where, when, who, how. It came down to the Old West Church, near Kent’s Corner, my old friend and former seminary classmate Tom as minister, and Memorial Hall for the reception, with the same old friend and former classmate as musician and dance master, leading the motley throng in contras, squares, and circles. But now the great day was over, darkness had fallen, the lights and extension cords all coiled and boxed. Tom was the only other person there, collecting his things by the picnic table under the one flood light. Jo and I drank in the cool air coming off Number 10 Pond. “There’s one more thing,” Tom shouted. The train had not quite stopped. The marriage certificate. We still had to sign it. We walked past the garbage bags over to the damp table, the knot returning to my stomach. Another “I do.” The famous “piece of paper from the City Hall” that seals the deal, that makes this real, permanent and binding as permanent can be. I had thought we were done. And then this final detail. But here’s the thing: there were three lines for three signatures - husband, wife, and officiant. We all had to sign. I stared at the paper and hesitated - not because of the knot, but because of the irony, bitter and painful, that Tom, the man who had helped guide us through this process, led the ceremony, delivered the homily, a respected pastor and preacher and dance master, whose signature was necessary on the certificate, could not himself sign on the spouse line in his own wedding. He whose signature made the certificate legal and binding, and who had signed many such certificates at many happy weddings would not be allowed to sign his own. Like so many other people drawn, called to ministry, Tom was, is, gay, an orientation which he had wrestled with most of the years I had known him. He had had to wrestle with it, of course, because it wasn’t “normal,” not accepted by society, because it makes straight people uncomfortable, forcing them to wrestle with things they would rather not think about. But Tom’s wrestling was over, he had found some peace in self-acceptance, had come out, even though it likely meant he would be booted from the Methodist pulpit. For the time being he could continue to minister, to preach, to marry and bury, as long as he was single. He could be gay, but not do gay, as if there was a difference. He had told once about the double bind that gay people have found themselves in, that same-sex relationships have had no legal standing and thus were seen as immoral, and that they are seen as immoral and thus not given legal recognition. A vicious, tight circle that has stifled and crucified countless human beings, fellow citizens, co-travellers on life’s journey. Above the pulpit, where Tom spoke at our wedding, arching across the wall above his head, were large plain black letters spelling out a warning from the Book of Proverbs: “REMOVE NOT THE ANCIENT LANDMARK WHICH THY FATHERS HAVE SET.” The beating rigid heart of conservatism, its essence, yet absurd and laughable. We humans seem to love the idea of eternal verities, of things that don’t change, that must not change. Yet change is everywhere. The divine right of kings has crumbled before the rise of democracy –the “natural order” that places women below men, regards them as weaker, not fully human, has been discredited — fundamental and ancient assumptions about “race” are now discarded– how many of these landmarks have been exposed as walls meant only to keep certain people out, allow certain others in? How many have now been happily pulverized, reduced to gravel and stone dust, put to better use fertilizing our fields? My father used to tell me that while he sympathized with interracial couples who wanted to marry and raise a family he felt it was not a good idea — since the children would suffer, be ostracized, and not know who they were, White or Black. Forty years later, a blink in the eye of history, the United States has a biracial president. Are we not the better for it? Some landmarks need to move, including some really old ones. Some definitions need to change. Any linguist will tell you that the meaning of a word rests ultimately not in dusty dictionaries or obscure Indo-European roots, but on the tongue and in the heart and mind of the living speaker and the living listener. Meanings change. Words change, grow, and shrink, because we change. The scary and wonderful truth of language is that it is continually discovered, rediscovered and recreated. It is our birthright and our duty. We are the authors and arbiters of meaning, as were our ancestors, and we are not bound — unless we choose to be. We all signed the certificate. The evening ended. Our married life began. Tom eventually met someone and got booted from the pulpit. Such a loss to the Methodists. And so unnecessary. It has been a long and generally painful train ride through Western civilization for our gay and lesbian brothers and sisters, people who have added so much to our shared humanity. Changing a few lines on a marriage certificate, expanding the definition of a word, an important word, may not usher in a new world of peace and harmony, but it can be done and I believe we will all be the better for it. Posted by janetvanfleet at 4:24 PM 2 comments Priests presented at Parker Pie, a pizza place Thanks to Liz Nelson for picking up the Priests, hanging them at Parker Pie, and taking these photos.
cc/2019-30/en_head_0021.json.gz/line1731822
__label__cc
0.527761
0.472239
Norman D. Marschke Scholarship Fund at the College of Engineering endowed by Hannah McKenley This fund will provide need-based scholarship support for undergraduate students in the Electrical and Computer Engineering division in the Department of Electrical and Computer Engineering.| Short Read Norman D. Marschke (BSE EE ’63, MSE ’64) has provided a gift to endow the Norman D. Marschke Scholarship Fund at the College of Engineering. This fund will provide need-based scholarship support for undergraduate students in the Electrical and Computer Engineering division in the Department of Electrical and Computer Engineering. This gift qualifies for the Bicentennial Opportunity Matching Initiative. Mr. Marschke has also documented his intention to provide a bequest to College, which will supplement this endowment fund. Raised in St. Joseph, Michigan, Norman Marschke earned both his bachelor’s and master’s degrees in engineering from the University of Michigan. While attending, Mr. Marschke was active in the U-M sailing club, and interned with Whirlpool during his summer breaks. After graduation, Mr. Marschke relocated to Curpertino, California to pursue a job with Hewlett Packard, and continually advanced his career with the company until his retirement. Mr. Marschke currently resides in San Jose, California. Explore:Campus & CommunityEECS: Electrical and Computer EngineeringElectrical Engineering and Computer ScienceGivingCampaignDonorsGifts Toyota funds professorship in AI at U-Michigan The new $2.5 million endowment to support a professorship is the second U-M sponsorship from Toyota| Medium Read George I. Haddad Graduate Fellowship Fund endowed The Fund will provide support to full-time graduate students in the division of Electrical and Computer Engineering| Short Read
cc/2019-30/en_head_0021.json.gz/line1731826
__label__wiki
0.866967
0.866967
Sexsmith receives Roy C. Buck Award for paper on health care access Amy Duke UNIVERSITY PARK, Pa. — Kathleen Sexsmith, assistant professor of rural sociology in Penn State's College of Agricultural Sciences, is the recipient of the college's 2017 Roy C. Buck Faculty Award, which recognizes the best article accepted or published by a refereed scholarly journal in the social sciences within the past two years. Sexsmith will receive the award, which includes a $2,500 stipend and plaque, during the Gamma Sigma Delta Celebration of Excellence to be held on Thursday, March 29, in 112 Forest Resources Building. The celebration begins with a reception in the atrium starting at 4:30 p.m., and the award ceremony begins at 5 p.m. In her paper, titled "'But We Can't Call 911': Undocumented Immigrant Farmworkers and Access to Social Protection in New York" and published in Oxford Development Studies in June 2016, Sexsmith analyzes access to health care for undocumented Mexican and Central American immigrant farmworkers who live and work on New York dairy farms. The study assesses the regulatory framework — the conjuncture of immigration, employment and occupational safety and health laws — that results in workers' exposure to workplace safety and health risks. It also analyzes their health care resource environments, meaning whether and how they gain access to medical services in the public, private, third-party and informal sectors. Based on 43 interviews with undocumented dairy farmworkers and participant observation on farms, Sexsmith found that significant gaps and contingencies exist in undocumented dairy farmworkers' resource environments. The paper suggests that informal networks largely shape their access to the limited available public and third-party health care services. Gary Thompson, the college's associate dean for research and graduation education, applauded Sexsmith for this important and timely research. "The health, safety and well-being of all agricultural workers is of great importance to society's future," he said. "To understand any gaps and barriers that exist in these realms is the first step in helping to safeguard the agricultural community." Sexsmith joined the Department of Agricultural Economics, Sociology, and Education in October 2017. She holds a doctorate in development sociology from Cornell University and a master's degree in development studies from the University of Oxford. Sexsmith's research focuses on gender and agriculture in both domestic and international contexts. Her current projects explore the social integration of immigrant families working in the Pennsylvania mushroom industry and the impacts of foreign agricultural investments on gender equality in developing countries. Roy C. Buck, a professor of rural sociology, retired from Penn State in 1981. In 1999, he established the Roy C. Buck Faculty Award because he felt it was important to support nontenured faculty members to encourage their good work. Kathleen Sexsmith, assistant professor of rural sociology. ajd217@psu.edu Cacao pioneers: Meet Penn State's Colombian Fulbright Scholars World Food Prize: Grad students look forward to expanding knowledge at symposium Project aims to improve food security by enhancing gender aspects of ag research Academics, Faculty Achievement, Society, Arts and Humanities, Sustainability Department of Agricultural Economics Sociology and Education, Kathleen Sexsmith, Research, Roy C. Buck Faculty Award, rural sociology Alumni, Business and Industry, Faculty and Staff, Students, Visitors and Neighbors
cc/2019-30/en_head_0021.json.gz/line1731828
__label__wiki
0.597355
0.597355
The Canadian Forces Snowbirds performing at the 2016 Manitoba Airshow, which Asper MBA students Nadya Baspaly and David Thiele helped organize Asper MBA industry projects spotlight skills and leadership with real-world results August 18, 2017 — For MBA graduates hoping to get hired in today’s competitive job market, success has less to do with who you know—or even what you know—than with showing the world what you can do. Employers need to know that today’s MBAs can start getting results on day one. A track record of real-world experience can be critical to helping a career take off. But building that track record while earning a degree is no easy feat, which is why the Asper MBA program has been offering students the option of pursuing projects with real-world clients in industry. “These industry projects are an ideal opportunity for MBAs to demonstrate the results they can achieve with the skills and knowledge they’ve gained in the classroom,” says Judy Mathieson. As the Asper MBA Executive in Residence (External Projects), Mathieson acts as a bridge between students looking for a real-world management project to sink their teeth into, and businesses and organizations seeking the kind of expertise MBAs have to offer. “The project has to be useful for both our students and our partners,” she says. “My role is make sure the project deliverables are gradable while serving everyone’s needs. Given that we’re dealing with real-world projects and clients, this sometimes involves some flexibility.” The projects she’s lined up over the past several years have run the gamut, from program effectiveness studies for clients in health care, to environmental scans for companies looking to expand into new markets. Clients range from small to large organizations in both the for-profit and not-for-profit sectors. According to Mathieson, the basis of every project is simple: “Our MBAs get a really good understanding of the industry they’re serving and apply recommendations to help their client achieve their goals.” A Great Fit Because the workload is greater and the stakes are higher, students have to apply to Mathieson before they’re approved to participate. “I interview them to ensure they understand the intensity of the commitment they’re making. They need to have demonstrated a high degree of professionalism plus outstanding written and verbal communication skills.” Often, she says, it’s the students who bring ideas for projects to her. Students like David Thiele, who proposed a project with the Manitoba Air Show in 2016. Thiele is Director of Defense Engineering at StandardAero and Commanding Officer at the Brandon Cadet Flying Site. The idea for the project grew out of his conversations with the fledgling air show’s executive director, Jill Oakes, a fellow pilot. Together, they proposed to Mathieson a set of deliverables that would help bring to life Manitoba’s first airshow in over 25 years—in just under seven months. “We were a passionate, enthusiastic team of volunteers trying to build this airshow from nothing,” says Oakes, a professor of environment and geography at the U of M. “Apart from one or two consultants, none of us had done anything like this before. We weren’t even sure at that point what positions needed to be created—we just knew we needed someone to manage some aspects of the show.” That need quickly grew from one to two students. Soon, another Asper MBA student, Nadya Baspaly, signed on. “I was drawn to the project because of past work in and with the military and fundraising,” she says. “It seemed like a great fit.” They began work with the air show’s planning committee in January 2016. The air show was scheduled to take place in July. Learning on the Fly “Dave and Nadya came to our executive meetings and just listened at first, then started shaping their roles based on where they felt we needed the most help,” says Oakes. “From there, they really led the way.” “Seven months didn’t give us a lot of time for strategic planning,” says Dave. “We simply got on board and started doing.” For him, that meant tackling some of the operational challenges of planning and pulling off an air show from scratch. “I researched other airshows and helped develop ticket and sponsorship packages. From there I created a project management timeline for the team to follow.” He even had a chance to put the skills he’d learned in his MBA course on negotiation into practice while lining up the air show’s ATM vendor. He also compiled a handbook with guidelines for running future airshows. Nadya helped Dave on the operations side and eventually took over sponsorships, ticketing, and some of the event’s media relations. She helped manage the show’s finances. She estimates she put in 360 hours to the project over seven months—far more than she’d anticipated when signing up—but what she gained from the experience made the extra commitment worth it. “I was assigned basic project management, but they ended up needing so much more that I was invited to take on a director’s role on the air show board.” What surprised her most about the experience was the attitude of her coworkers towards her. “A lot of people came to me with problems I didn’t have answers to. People seemed to think that because I had an MBA, I would work it out. And I discovered that I always could.” Jill Oakes says she was utterly impressed by the work done by Nadya and Dave. “The training they get in their MBA is absolutely amazing. To bring all those management skills to the job— they weren’t students to us, they were full-out professionals. They knew how to listen, and how to ask the right questions. Whenever they assumed a task, they nailed it every time. They impressed everyone at the table—and we’re talking experts in several fields, including meteorology, aviation, development. This was a huge project—I’d say four to five PhDs worth of work. They were amazing to manage all that while finishing their degrees.” Dave and Nadya’s hard work paid off in a show that exceeded almost every expectation. In spite of torrential rains, unexpected highway construction and traffic congestion on the way to the site in Portage la Prairie, the event raised over $100,000 for charity and sold 19,000 tickets. “None of us had much experience managing such a large event affecting a large number of people and a significant amount of cash flow,” says Dave. For him, the most valuable takeaways from the project were learning how to manage a project that has already begun, and knowing when to step back and reassess strategy. Nadya, who graduated with her MBA in 2016 and now works on the management and financial analysis team for Starbucks in Ottawa, says the experience has helped her manage cross-functional teams effectively. “I’m a more patient leader. I’m not afraid to ask questions.” It also taught her the value of finding perspective in times of stress and chaos. “I remember one morning I was driving out across the airfield. The jets were all lined up, the sun was rising, the grass was sparkling with dew, and I thought, ‘Not every student gets to experience a moment as great as this.’” Ryan McBride Asper MBA Kirsty Duncan, Minister of Science and Sport, announced on July 17 more than $2.5 million in support for 17 research projects at the University of Manitoba Asper student Jared Kozak on finding your niche as an Indigenous programmer Asper undergraduate student Jared Kozak started working with technology in high school, when he offered to build a system to book tutors for his school district’s peer tutoring program. Kozak started to get a hang of building and the system began to shape up. It was then that Kozak realized he had a real interest for programming. Asper School of Business, IBEP, Indigenous, Students University welcomes $10 million gift, new graduate school Transformational gift to Front and Centre campaign will enhance the I.H. Asper School of Business’ role Alumni, Asper School of Business, donor relations, front and centre, Front and Centre - Graduate Student Support, Philanthropy, Stu Clark Centre for Entrepreneurship Developing a Coaching Mindset in the Workplace August 14, 2019 Asper Master of Finance Stu Clark Centre for Entrepreneurship Warren Centre for Actuarial Studies & Research Email: asper_info@umanitoba.ca 181 Freedman Crescent University of Manitoba, Winnipeg, MB R3T 5V4 Canada
cc/2019-30/en_head_0021.json.gz/line1731829
__label__cc
0.610176
0.389824
Home » MAMMALS » Cats Lynx rufus (Order Carnivora; Family Felidae) Diagnosis: The bobcat is a mid-sized feline about twice the size of the average domesticated cat. They have a gray to brownish colored coat sometimes with a spotted or speckled appearance. The bobcat has distinctive black tufts on their ears and a whiskered face. It has black bars on it’s forelegs and a black tipped bobbed tail (for which it is named). Natural History: ​The breeding season for bobcats is from winter to early spring but they often have litters at other times of the year as well. Litters usually yield 1 to 6 kittens with a gestation period of about 2 months. Kittens start to hunt on their own around 5 months old and are evicted from their mother's den and home range between the ages of 8 and 11 months of age. Lynx rufus​ is mostly a solitary creature that is rather territorial of its home ranges using tree clawing as well as urine and feces to claim it's territory. Males have a home range from 25-35 square miles that will sometimes overlap with other male's territory. Females on the other hand, are more territorial and do not overlap their home range with other females; they usually claim around 5 square miles as their territory. Call: http://www.youtube.com/watch?v=9lh5SY_XaDM&feature=related Distribution: The estimate of the current bobcat population is from 725,000 to 1,020,000 individuals. This species ranges from southern Canada to Northern Mexico; this includes most of the United States. Linux rufus Distribution map. Map from Smithsonian National Museum of Natural History - North American Mammals. http://www.mnh.si.edu/exhibits/mammals/Bobcat.HTM& Habitat: The bobcat prefers wooded areas but can be found in semi-desert, urban edge, forest edge and even swamp ecosystems. This species has adapted well to the change of the land by humans. ​Diet: Lynx rufus prefers to eat hares and rabbits but it is an opportunist and will hunt anything from small deer to small rodents and insects. Conservation Status: Populations of the bobcat are healthy and functioning as a whole but it's habitat is becoming increasingly fragmented. The mexican bobcat is listed as endangered but at this time no other subspecies is in danger. Farmers in mexico are uneducated about the role of this species in the environment. They routinely kill bobcats on their land because they perceive them as a threat to their livestock. Defenders of Wildlife. 2011. www.defenders.org/wildlife_and_habitat/wildlife/bobcat.php Litvaitis et. al. 1986. Bobcat Habitat Use and Home Range Size in Relation to Prey Density. Journal of Wildlife Management. 50 (1) pp. 110-117. Rollings C. T. 1945. Habits, foods, and parasites of the bobcat in Minnesota. Journal of Wildlife Management. 9(2) pp. 131-145. Lynx rufus. Photo from Free Predator Pics http://www.free-predator-pics.com/Download/Free_Bobcat_Pictures. Lynx rufus kittens. Photo from Patterson Images http://www.pattersonimages.net/images/M1278_1-Baby-Bobcats-in-Log.jpg Submitted by: Hallie Craycraft, July 2011 Ninnescah Arkansas River ‹ Cats up Coyotes, Foxes › Armadillos Coyotes, Foxes Minks, Badgers Pocket Mice, Kangaroo Rats Rats, Mice, Voles, Lemmings Shrews Squirrels, Chipmunks, Marmots, Prairie Dogs Squirrels, Gophers, Prairie Dogs
cc/2019-30/en_head_0021.json.gz/line1731831
__label__wiki
0.766602
0.766602
AgricultureEconomyProvinces No Iranian Sheep in Syunik: Focus is on Developing Domestic Stocks Vahe Sarukhanyan 14:50, April 18, 2014 In the fall of 2012, reports began appearing in the Armenian news media about a plan to lease pasture land in the country’s southern Syunik Province to Iran for sheep grazing. Under the plan, as reported by the IRNA (Islamic Republic News Agency) some 50,000 head of sheep from Iran would be brought to Syunik. In exchange, Iran promised to provide technical equipment and establish a meat processing plant in Armenia. Many in Armenia, especially environmentalists, were aghast when the read the news. Opponents, noting that the Iranian shepherds would be coming from the country’s East Azerbaijan Province, labeled the plan an environmental as well as national security threat to Armenia. It was revealed that the plan was hatched in Yerevan in October 2012 at a joint inter-governmental Armenia – Iran meeting to discuss economic matters of mutual interest. Iran had proposed that enterprises breeding small livestock animals and slaughterhouses be set up in Armenia. The government in Yerevan agreed and a memorandum of understanding was signed. In January 2013, a delegation from the Syunik Provincial Government left for Iran and an agreement was signed with their East Azerbaijan counterparts. Accordingly, Syunik would lease a minimum of 50,000 hectares of pasture to the Iranians for 5-10 years at $25 a hectare. Samvel Tangyan, head of the Department of Agriculture and Environment at the Syunik Provincial Government who signed the agreement, told Hetq at the time that the document was merely a transcript listing the points agreed to by the parties. Armenia’s Ministry of Agriculture ten expressed its opposition to this cooperative agreement and proposed that the land be used to increase local livestock numbers. Gradually, talk regarding bringing Iranian sheep to Armenia died down. Samvel Tangyan told Hetq that ultimately it would be up to local communities in Syunik to decide whether they wanted to allocate land or not. But this didn’t even come up because the Iranians had lost interest in the plan and failed to pursue it. Tangyan says that there was no follow up by both sides and the plan was forgotten. The official ruled out the possibility that a new agreement with Iran might be reached since, as he put it, the Syunik Provincial Government only wants to develop local sheep raising. This raises the question as to why Syunik officials didn’t pursue the matter back then. Tangyan could only respond that the final decision is up to those communities that own the pastureland. Tangyan added that a slaughterhouse began to operate in the Syunik village community where residents could bring their sheep for processing and receive 850 AMD per kilo. The meat is then exported to Iran. He said that in Syunik Province today there are 114,000 head of sheep, an increase of 14,000 over last year, and that the trend portends future growth. Demonstrators Demand a Halt to Planned Leasing of Syunik Pasture Lands to Iran Political Party Opposes Leasing of Syunik Land to Iran: Plans Protest on February 14
cc/2019-30/en_head_0021.json.gz/line1731834
__label__wiki
0.974856
0.974856
Frank Ocean Says He Won't Use Dating Apps Photo by Jason Kempin/Getty Images. Taylor Bryant And reveals he's been in a relationship for three years In a rare move, Frank Ocean opened up to Gayletter for the publication's 10th issue. Topics ranged from rock climbing (he's been doing it for years), not fucking with major music companies, and dating while famous. On the latter, he says that he's never used dating apps and has been in a relationship for three years. "I don't think I would use dating apps now," he says. "I fuck with Marc Jacob's philosophy on that, so I wouldn't rule it out, but it is a little hectic being a famous person on dating apps." We're not sure what Jacob's exact philosophy is, but we do know that he said goodbye to Grindr back in 2015 after it was revealed he apparently had a 10-person orgy. "It was fun for 'group' get togethers, but, what really excites me is my work!" the designer, who got married earlier this month, wrote in an Instagram post announcing his departure from the app. Anyway, back to Frank. He also shares that he's making an effort to do more interviews and apparently reached out to Gayletter for the opportunity. "I thought, What do I actually like? What do I actually read and connect with? And your guys' magazine is one of those things." He adds: "I don't know if it's terribly calculated, but I'm just trying to put myself more into whatever kind of stream is going on here in culture. I don't think my feelings about press have anything to do with how times are changing. I think it's more a feeling." He also casually drops that he's hung out with the president before (Barack Obama, not the guy in office now) and that he's learning French and spending time in the studio. Ocean then takes the last seconds of the interview to clear up something very important: How tall he is. "Well, my Wikipedia says I'm 5'10", but I'm 6'1", so listen, we have to correct the kids on my height. [Laughs] It's really affecting my future, blocking my shine." We wouldn't want that, now would we. Read the interview in full over on Gayletter's website. frank ocean dating apps entertainment music news life love dating
cc/2019-30/en_head_0021.json.gz/line1731835
__label__wiki
0.698143
0.698143
Previous article : « Timeline of terrorism » Next article : « Britain’s transatlantic romance » > September 2004 THE OPPOSITION SILENCED Venezuela: Chávez is vindicated The Venezuelan opposition continues to deny the result of the 15 August referendum on Hugo Chávez’s presidency, although international observers judged that he had fairly and genuinely won by Paul-Émile Dupret THE centre of Caracas was quiet at dawn on 15 August. But poorer, outlying areas glimmered with thousands of lights. This was the day of the referendum on whether Hugo Chávez was fit to continue as president of Venezuela. The opposition had called the referendum, invoking a clause in the new constitution that allows such a vote to be held after a president has served at least half of his allotted term. As the pro-Chávez campaign had proposed, at 3am a bugle call - called the Diana - resounded across the hillside shantytowns that surround Caracas. It triggered a commotion: bangers and other fireworks were set off on every corner, mixing with barking dogs and other barrio sounds, and with the pro-Chávez chant: “Uh! Ah! Chávez no se va!” (Oh! Oh! Chávez will not go!). The last offensive in the Battle of Santa Inés (1) had started. A few hours later a formidable army of voters could be seen marching down the hillsides to play their part in the popular process. Many were voting for the first time: more than two million new names have appeared on Venezuela’s electoral register in the past year. The unprecedented turnout produced long queues; some had to wait as long as 13 hours to vote. Despite this the referendum felt more like a party than anything else. It was a celebration of democracy, marred by only one serious incident: armed men with machine-guns fired on a crowd in the Petare area, leaving one voter dead and a dozen injured. According to Alirio Uribe, a Colombian lawyer there as an observer, the aim was to scare away voters in this mostly pro-Chávez district: “Some people did leave but most stayed to cast their votes.” Meanwhile in the gated communities of the moneyed quarters of Caracas, canny voters were complaining about the wait while demanding that the anti-fraud fingerprint checks be waived to speed things up. "There are on average 1,000 voters per polling station in the rich areas, against 8,000 voters per polling station in (...) Paul-Émile Dupret Paul-Émile Dupret is a legal expert and staff advisor at the European parliament Translated by Gulliver Cragg (1) The popular 19th-century leader Ezequiel Zamora defeated the Caracas oligarchy in a celebrated struggle, the Battle of Santa Inés. His strategy was to feign weakness to lure the enemy into a situation where it could be crushed. (2) The members of Mercosur are Argentina, Brazil, Uruguay and Paraguay. Bolivia, Chile and soon Peru are associated states. (3) A court found that Mendoza had had 90 P-90 machine-guns with infrared telescopic sights imported shortly before the 1998 elections. Only 40 of these were seized. (4) The NED is a private institution, founded in 1983, that receives a large percentage of its annual budget from the US Congress. One of its funding centres, the International Republican Institute, has an office in Caracas. The NED has funded elements of the Venezuelan opposition, including organisations that participated in the coup of 11 April 2002, and in the economic sabotage campaigns of December 2002. It also helped fund the development of the opposition programme Consenso Pais. (5) The opposition’s claim that the CNE is controlled by Chávez is weakened by the fact that the CNE was appointed by the same Supreme Justice Tribunal that absolved the perpetrators of the 11 April coup on 14 August 2002. français — Fête démocratique au Venezuela Deutsch — Tierfilme um Mitternacht Español — Fiesta democrática en Venezuela « Timeline of terrorism » « Britain’s transatlantic romance »
cc/2019-30/en_head_0021.json.gz/line1731838
__label__cc
0.632082
0.367918
Posts tagged “Train” At 6:00pm, as the sun was moving further away from the sky over Bottle Rock, as the heat of the day faded, and the weather changed to perfect, a favorite local San Francisco band took the main stage. Train, (http://savemesanfrancisco.com) with it’s charismatic lead singer, Pat Monahan, commanded the audience with a confident presence. They love what they do, and it shows! I first saw Train at South By Southwest in Austin, Texas in 2012 (http://sxsw.com,) where they did a phenomenal job performing at the Central Presbyterian Church. Train’s Pat Monahan Tonight’s show was very different, on an outdoor stage in Napa, California’s wine country, as the sun was going down, and a crowd that was ten times larger. Any way you see them, though, they put on a good show. Singing many of their most recognizable hits – Soul Sister, Calling All Angels, Save Me, San Francisco, Meet Virginia, Drops of Jupiter – they easily got the crowd singing and swooning right along, right away. Monahan was all over the stage – and it was a big one – getting up-close and as personal as a singer can in a venue so huge. At one point, he pulled out his cell phone and took pictures of the crowd from the stage, and later in the show, he jumped into the audience and took selfies with people and their phones. Pat plays the sax… Pat Monahan is a crowd friendly performer, no doubt, and it was so very apparent just how much fun he was having. And, not only is he a singer, he is a musician, which he proved when he picked up the saxophone and played along with his band. Whatever your opinion is of the band Train, they have cut out a name for themselves in the music industry. Their songs are catchy, a bit poppy, with sometimes rather odd lyrics (“my heart is bound to beat, right out my untrimmed chest” or “just a shy guy looking for a two-ply Hefty bag to hold love.”) Where they come up with such odd, kind of nerdy, lyrics is beyond me, but it’s not my place to judge. They are good; they are successful; they have made a name for themselves in the world of music, and that’s admirable and honorable. As the evening settled in, and the sun began to fade, Train’s show came to an end. The emotion exuding from the band was felt by, no doubt, everyone in the audience. Monahan’s appreciation to the crowd for their warm response, and the fact that he was overcome with gratitude that practically brought him to tears, was wonderful sight. Sometimes it seems to me like celebrities are untouchables, or on a higher plane that the rest of us mortals (or think they are!) So, to see them in such an obvious state of appreciation and indebtedness, is heartwarming. It shows that they are human, after all. These guys might not be the Rolling Stones, but they are Train, and train rocked Bottle Rock 2013! Up-close and personal with the fans. December 28, 2014 | Categories: Local (NorCal) Vibes | Tags: Bottle Rock Napa, Pat Monahan, South By Southwest, Train | Leave a comment South Bye-Bye Southwest! ***The time came to hoof it on over to Central Presbyterian Church to make sure I got a good seat for Train. I admit, I thought the venue was a bit strange for a rock band, but I had read the reviews for Fiona and they raved over the acoustics. So, it made sense to me, plus churches are old, and they were all about the choirs and singing, and most were probably built before there was decent, if any, amplification. So, I high-tailed my tail to church and got a very nice seat in a pew about six rows back from Jesus. Having been so hell-bent (oops, I’m in church) on seeing Train, I never bothered to notice the rest of the schedule for this venue tonight. But, man oh man, did I have a delightful surprise. A band from Los Angeles – A Fine Frenzy (http://www.myspace.com/afinefrenzy) – had just begun to set up as I was getting myself situated. They were a cute bunch, three guys and two girls, and when they started playing and Alison Sudol started singing, I knew why we were in a church. This girl, blonde, sweet, and angelic, had the voice of an angel! The closest I’ve ever heard to a voice like hers, is when the Celtic Women sing. Wearing a red-orange dress, with a crisp, pristine voice, not only was it hard to take my eyes off Alison and her crew, but she almost put me into a trance. He voice was almost other-worldly, heavenly, ethereal, and she had the look to match. The music this band delivered was folksy and New Agey, but are considered an Alternative, Indie band. They delivered their sound with talent, moving between the keyboard, guitars, drums, while Alison kept the audience entranced as frontman. I was very impressed, and mesmerized by this band, and must say that a church was the perfect backdrop for their angelic sound. **Choo-choo, make way for Train! (http://www.myspace.com/train) At midnight, out they came, charismatic and energetic as they are, and even had a little unofficial fan club group of groupies in one of the front pews, squealing, dancing, and making a small scene. They started off with a bang, singing “Soul Sister,” one of their biggest hits, which set the joyful tone for the rest of their show. Lead singer, Patrick Monahan is a charming frontman with a unique voice and couldn’t be more comfortable performing. He was right at home, entertaining the crowd as if he was singing in the shower. They sang a number of their recognizable hits – Save Me, San Francisco, Drops of Jupiter, Meet Virgina – as well as some new songs off their album that is due out on April 17. At one point, Patrick moved away from his microphone and sang “Calling All Angels” (…if I recall correctly…) a cappella, which couldn’t be more perfect in a church. His voice carried beautifully throughout the place and put a big smile on everyone’s face. This man and his band went the extra mile to put on a good show for their audience. While performing, “Save Me, San Francisco,” Patrick went into the audience and brought up and excited fan. He had her join him in the chorus, and showed his sense of humor when she flubbed the words more than once. He also made sure that one of her friends got a good picture of them without missing a beat while continuing to perform – a very cute touch! (Of course, the girls loved it!) Train's Patrick Monahan singing a capella It was all over way too soon! Since these shows are short showcases, and/or condensed concerts, they go by fast! You get a good taste for the band, but nothing near a complete concert. This works at South By because you can never really OD on music since it is over at the height of the excitement. You’d think this would be frustrating, but there’s no time for frustration in a town where there is more music and bands to possibly see them all. If you like music, it’s like being a kid in a candy shop. To sum up my first experience at South By Southwest, I would say it was fantastically wonderful time! Austin is buzzing with so much creativity, abundant talent, bursting with music, and overflowing with people during this festival. It’s a music lover’s Disneyland!! If music rocks your world, like it does mine, it would be impossible to have a bad time at SXSW. But, go with an open mind. Don’t expect to be able to see or experience everything. Be prepared, do your homework in advance, and have a plan. There’s no time to waste in Austin, because there are so many places to be, see, and do. My little saying of “So much music, so little time!” couldn’t be truer than at South By Southwest! It was a little challenging at times chasing down my entertainment of choice, but it was sure fun trying! April 14, 2012 | Categories: Travels | Tags: A Fine Frenzy, Central Presbyterian Church, SXSW, Train | Leave a comment South By More St. Paddy’s A Texas St. Paddy's ***After the last panel, I was itching to get over to 6th Street, to find a pot o’ gold and leprechauns – or some corned beer and green beer! Being that it was a Saturday, to add to party fever mode, the crowd out on the street was ridiculous! The action started early so I paced myself. Strolling by the ‘Chuggin’ Monkey,’ I was pulled in by the man at the door (who ended up being the dad of one of the kids in the band) and ended up really happy about that. ‘The Neckties’ (all of about 14-15 years old) hooked me instantly! They had a 1970s rock style to them, the lead singer reminding me of a young Mick Jagger/Steven Tyler/Robert Plant; and the guitarist having a Jimmy Page/Joe Perry/Keith Richards style to his playing. This was not at all what I expected out of a band of kids! With all the Death/Heavy Metal, Rap and Hip-Hop influences for youngsters these days, hearing and seeing this talented bunch perform a sound that spawned from my era, was music to my ears! In the middle of one particular song, there was a power outage, but they didn’t miss a beat. They pushed through it calmly and the singer continued on without his mic. It was very impressive! I am a new fan of these boys, plan on following them (quickly ‘Liked’ them on Facebook,) and hope to see them again, cuz I’m betting they’ll be well known some day! Watch out SXSW….the Neckties (https://www.facebook.com/TheNeckties) will no doubt be back to make a BIG name for themselves! The Neckties Over at ‘Friends Bar’ was a local classic rock band, the’ Rachel Crawford Band,’ which was the perfect band to enjoy a St. Paddy’s Day green beer to. Rachel is a very cool, soulful singer with all the right moves. For a few songs, she invited Japanese musician, Motoi Konno, to join the band on stage, which was a kick. Music transcends everything and unites everyone! In search of an Irish bar (it was St. Patrick’s Day, after all!) I found ‘BD Riley’s’ with stick-to-your-ribs food and a healthy dose of Irish music. After getting my fill of corned beef, cabbage, and mashed potatoes-YUM!-I needed to get back to my SXSW experience, since after all, it was the last night of the festival….and, I had my evening schedule planned. Rumor had it that Stubb’s BBQ (http://stubbsaustin.com/about-stubbs) was the place to be tonight. I summed this up by talking to others and doing my research over the past few days. Many names stood out, and two were playing back to back at Stubb’s tonight – Michael Kiwanuka, Justin Townes Earle – before the piece de resistance (for me, at least) TRAIN, who would be playing at the Central Presbyterian Church on 8th. But, no one seemed to know about it. Like I said, everything is kept under the radar, plus there are so many bands to see and places to go, that people are spread out everywhere! And, you’d need to clone yourself to get to even 1/10th of the performances! I arrived everywhere early on this night, so as not to have a repeat performance of my Fiona Apple night. Stubb’s has an excellent outdoor area with a big stage, outdoor bars, and a good ol’ down home concert experience – real music and pure talent. Both bands were thoroughly entertaining, yet completely different from each other. Michael Kiwanuka has a bit of a rootsy, country sound, with a lot of soul. (http://michaelkiwanuka.com) Influenced by Otis Redding and Sly Stone, he was also very inspired by the movie about the Band’s ‘Last Waltz’ farewell concert and through it all, came up with his own sound and style. Justin Townes Earle and his band (http://www.justintownesearle.com) have more of an Americana, bluegrass, Buddy Holly blend (if that’s even possible) and Justin has the look to match. He resembles the most straight-laced nerd you have ever bullied, but according to his bio, was quite the bad boy when he was younger. (He’s all of 30 years old now) and has already been a pretty serious drug addict, arrested for battery, public drunkenness, resisting arrest, and gone through rehab. Once he kicked drugs, he began focussing intensely on his music, and in September 2009, he received an Americana Music Award for ‘Emerging Artist of the Year.’ He’s come a long way in a short time! Well, I’m going to hang out here for awhile before trekking over to the church to see ‘Train.’ Stay tuned… Stubbs BBQ-Austin April 9, 2012 | Categories: Travels | Tags: Justin Townes Earle, Michael Kiwanuka, Stubbs BBQ, The Neckties, Train | 2 Comments
cc/2019-30/en_head_0021.json.gz/line1731843
__label__wiki
0.863482
0.863482
Home People Nashville Moment Nashville Moment: Katie Davis Majors Nashville Moment: Katie Davis Majors Brentwood native Katie Majors recently published her second book about Ugandans who have come to her home to heal. by Kate Parrish Shannon Fontaine Katie Davis Majors, Mother and Philanthropist A mission trip to Uganda during her senior year of high school would forever change Katie Davis Majors' life. After returning to the States to graduate, the Brentwood native deferred college for a year and headed back to Uganda to teach in an orphanage. A decade later, Majors, now 29, still calls Uganda home. In that time, she has also adopted 13 children, gotten married, given birth to a son, and recently published her second book, Daring to Hope. In it, she recounts the painful and beautiful stories of Ugandans who have come to her home to heal. Just the 16 of us: What started out slowlyfunding local children's tuitionturned Majors into a mother when she adopted 13 children. When three sisters, whom Majors was sponsoring, were suddenly left with nowhere to go, she took them in. After fostering the siblings for two years, Majors began the formal adoption process when she was just 21. This same scenario would play out again and again with each new child. "I would say, 'Okay. They can stay here for a little bit,' then, 'Okay. They can stay here a little bit longer,' then, 'Okay, okay, okay,'" Majors recalls, laughing. By 23, she had a family of 14. Soon after, she would meet her husband, Benji, also a missionary, and they would marry in 2015. Majors gave birth to their son, Noah, in 2016. >>> ENTERTAINERS STORME WARREN AND JOE DENIM Raising world changers: Earlier this year, through her nonprofit organization, Amazima Ministries, Majors opened The Amazima School. The Christ-centered secondary boarding school is a path toward success; Majors plans to add 72 new students each year until they reach capacity at 800 students. "I don't really think that I can do anything singlehandedly to change the landscape of Uganda," she says. "But I believe in the power of these children and raising up the next generation to be leaders and world changers in their own communities." A sweet spot: With some of the older girls graduating high school and looking toward university, Majors says, "It's an exciting new season as a family. They're transitioning into adulthood." The oldest of her adopted children, who was only 12 when she first came home to Majors, is now 21, and the youngest, nine. "It's such an amazing thing to raise up these compassionate, kind women. Our family is just in a really sweet spot." Community Editor's Picks Charity Nashville Moment
cc/2019-30/en_head_0021.json.gz/line1731846
__label__wiki
0.757581
0.757581
Deep Throat Comes Out 16906 readings Justice News The anonymous source of intrepid Washington Post reporters, Bob Woodward and Carl Bernstein's earthshaking reports on Watergate, reports that led to the downfall of Richard Nixon's presidency, has remained anonymous for more than thirty years. Today, the insider's name has been revealed. -{lex} C. L. Cook PEJ News- Vanity Fair, a U.S. culture and news magazine has broken the story that eluded both reporters and Washington D.C. insiders for decades. They have revealed the source of the leaks that sunk the presidency of Richard M. Nixon. A mystery more tantalizing to political junkies than U.F.O. conspiracies, the identity of "Deep Throat" has had an enduring appeal. In 1974, with the scandal of the administration's sanctioned burglary and theft of Democratic National Committee party files and strategies prior to Richard Nixon's 1972 re-election bid broken wide-open, Nixon resigned his post to avoid the ignominy of impeachment. He then faded from the American political scene, his accomplishments over-shadowed by the events surrounding the "Watergate" fiasco. The literal mother-of-all-"Gates," today the suffix is synonymous with political dirty tricks. But how did a cunning, and seemingly all-powerful "War-time President"come to be unseated? Even among his enemies, Richard Milhous Nixon was respected for his political acumen, and feared for his ruthlessness. Mentored by the infamous "Tail-gunner" Joe McCarthy of the Witch hunt era, Nixon's obsessive need for secrecy was legendary. So, how then did someone get close enough to "Tricky Dick's" inside circle to do so much damage? And, who could it be? Everyone knew W. Mark Felt was an ambitious guy. The Number 2 in the F.B.I. had ambitions of taking up the recently deceased, J. Edgar Hoover's mantle as the next perennial overlord of the agency. It was Felt's naked avarice that convinced Nixon he was a man they could manipulate. He was desperate to quash the F.B.I. investigation into Watergate, knowing each day that investigation continued brought the truth closer to the Oval Office and its complicity. Felt never got the post he coveted, but he did manage to do irreparable damage to the man who denied him. Long a controversial figure, he was convicted of violating civil rights through authorizing illegal searches of the homes and offices of perceived enemies of the White House, Felt never admitted his now revealed double life. He had been rumoured as the leaker, even accused in print, but he never cracked. Nixon's White House tapes reveal, as early as 1972, Nixon confidante and felon to be, J.R. Haldeman told the president he "knew" the leaks were coming from Felt. For their part, both Woodward and Bernstein refuse to confirm, or deny the Vanity Fair story, saying they will stick to their original agreement not to release the name of their informant while he or she is alive. The revelations take the wind out another theory, identifying George H.W. Bush as the informant, that made the media rounds several months ago. W. Mark Felt is 91, and said to be in failing health. Chris Cook hosts the weekly public affairs program, Gorilla Radio, broad/webcast from the University of Victoria, Canada. [Note: Late Tuesday (31/05) both Woodward and Bernstein confirmed Felt's claims- lex]
cc/2019-30/en_head_0021.json.gz/line1731847
__label__cc
0.697065
0.302935
[L03] Logical connectives Module: Basic logic L00. Introduction L01. What is logic? L02. Statements L03. Logical connectives L04. Logical relations It is all right to say exactly what you think if you have learned to think exactly. Here are a few basic concepts in logic that you ought to be familar with, whether you are studying symbolic logic or not. §1. Negation The negation of a statement α is a statement whose truth-value is necessarily opposite to that of α. So for example, for any English sentence α, you can form its negation by appending "it is not the case that" to α to form the longer statement "it is not the case that α". In formal logic, the negation of α can be written as "not-α", "~α" or "¬α". Here are some concrete examples: Statement (α) Negation (¬α) It is raining It is not the case that it is raining (i.e. It is not raining.) 1+1=2 It is not the case that 1+1=2 (i.e. 1+1 is not 2.) Spiderman loves Mary It is not the case that Spiderman loves Mary. There are two points about negation which should be obvious to you: A statement and its negation can never be true together. They are logically inconsistent with each other. A statement and its negation exhaust all logical possibilities - in any situation, one and only one of them must be true. What is the negation of "God exists"? Is "I must not leave" the negation of "I must leave"? No! It should be "It is not the case that I must leave." This includes the possibility that it does not matter whether I should leave or not. Note that these two statements do not exhaust all possibilities. Is "Tom is very happy" the negation of "Tom is very depressed"? These statements are inconsistent but they are not negations of each other. The negation of the first is "It is not the case that Tom is very happy." This includes situations where Tom is neither happy nor depressed, or where Tom is a little depressed but not very depressed. Remember that a statement and its negation must exhaust all logical possibilities. §2. Disjunction A disjunction is a kind of complex sentence typically expressed in English by the word "or", such as: Either we meet tonight, or we do not meet at all. The sentence has the structure of "either P or Q", where P and Q are statements In logic, we often make a distinction between exclusive disjunction and inclusive disjunction. According to the exclusive interpretation, "P or Q" is true when P is true, or when Q is true, false when P and Q are both true, and also false when P and Q are false. Many people take the exclusive interpretation to be what is intended in for example "You can have tea or you can have coffee", where it is supposed to be implied that you can only have one or the other but not both. On the inclusive interpretation, "P or Q" is false when P and Q are both false, and it is true in all other situations, including when both P and Q are true.
cc/2019-30/en_head_0021.json.gz/line1731853
__label__wiki
0.586602
0.586602
Mumford & Sons @ The Excel Wednesday September 4th was a sold out show at Xcel. They opened with “Lover’s Eyes” the perfect opener, audio mix was still being tweaked. “Broken Crown” was the sixth song in & by then it was sounding pure & clean, the horns really do make this band fun to hear. Very few people were sitting down by middle of the 1st set. There is something about their banjo, fiddle & hard strumming guitar that takes me away from the good old US of A. Sandy & I have been big fans for years, hearing “Little Iron Man” live was a treat. The working class neighborhoods of west London produce some unusual music & musicians, so different from the messages we are used to hearing over here. There is an underlying anger in a few of their songs, Marcus is a great story teller. Hard to believe the Sons might be more popular in UK, Australia & Ireland then here but tonight everyone loved these guys. Difficult to say exactly what kind of music I was hearing, the early material was considered “folk”. some of those early videos & lyrics had a weird John Steinbeck thing that didn’t make sense to me. This tour was promoting Babel. Marcus Mumford did a few songs up on the full drum set and that was a highlight for me. The band reminded us that night that they played the 400 Bar in 2008- damn, I missed that & would have driven through snow, sleet or a summer rain storm to see that show. I’ll call them Celtic thunder accompanied by strings & horns. End of the show they appeared center of the arena & did an acoustic version of Springsteen’s “I’m on fire”.
cc/2019-30/en_head_0021.json.gz/line1731855
__label__cc
0.629617
0.370383
Everything women travelers in Indonesia need to know about health, romance, women’s rights and safety. All the information below is provided by Pink Pangea community members based on their experiences abroad. Add your voice! Feminine Hygienic Products Anna says: It’s difficult but not impossible to find tampons in larger cities. Check out pharmacy chains like Guardian and Century. The boxes (Playtex usually) are small and a bit pricey, though. I generally pay Rp30.000 to Rp50.000 for eight tampons in Palembang, about $3 to $5 and I’ve heard higher prices for the same number in other cities. Otherwise, though, if you’re not in a big city, pads and pantyliners can be found everywhere, convenience stores,pharmacies, groceries, and supermarkets, and are very cheap- a couple of dollars for a dozen or more. Winona says: Pads are about all you’re going to find in Yogyakarta but they’re easily accessible at any convenience, grocery, or general store and there is a pretty decent variety. Anna says: Condoms are available everywhere at supermarkets and convenience stores (there are durian-flavored ones if you’re feeling adventurous). I’ve heard, through expat forums, that birth control pills are available even over-the-counter in pharmacies, but I wouldn’t bet on it, especially for unmarried women. Probably best to bring a large supply if you’re on the pill. Winona says: Bring it with you if possible. Supposedly birth control is only legal if you’re married. I know you can buy condoms at Indomarts and other convenience stores, but there’s not much variety and they’re expensive. Recommended Gynecologists and Doctors Anna says: I’ve never been to one here, so I wouldn’t know! Health care as a whole varies widely. Doctors tend to prescribe a lot of medicine, maybe a bit unnecessarily, to my mind. You should be very aware of what is considered a “good hospital” or “good clinic” wherever you go in Indonesia. It is very cheap, though, to go to the hospital or clinic. I’ve never paid over twenty dollars for anything, even for stitches and antibiotics. Winona says: I haven’t had any experience with gynecologists or doctors yet. Anna says: I wouldn’t breastfeed in public, but women have been pretty relaxed about breastfeeding in front of a group of just women. Dating Locals Anna says: I’ve known of a quite a few mixed Indonesian-foreign, even mixed-religion couples, and interestingly, it’s fairly evenly split between foreign woman-Indonesian man and foreign man-Indonesian woman. Dating in general is fairly circumscribed, at least in my city. While couples aren’t necessarily chaperoned every time they go out and Palembang maybe isn’t as conservative as other areas, Palembang is still fairly sexually conservative. More on Dating Locals I’m careful around my male friends (I try not to be alone with them), so our relationship isn’t misconstrued. And, as a woman of Asian descent, I did get a few strange looks being out with my white American male friends. There is an icky history of somewhat exploitative white man-Asian woman relationships throughout Asia (basically, prostitution and the like), so your race and the race of your male friends and boyfriends can definitely impact how other people view and treat you. That being said, it’s totally possible to date locals, as long as you keep more conservative local customs in mind. And dating in general is probably easier in more urban areas, especially foreigner-heavy cities like Jogjakarta, Bali, and Jakarta. Winona says: No expat or traveler I knew dated locals in the Yogyakarta area. Local Muslim men are usually only interested in hookups and I didn’t get to know enough Christian men to learn anything about their dating culture. Types of Men Anna says: I don’t really think it’s possible to “type” men here. Do I feel like men-women relations are different? Yes, definitely more conservative and constrained overall. Is Indonesia more patriarchal? Yeah, I’d say overall, although some ethnic groups like the Minangkabau are matrilineal. Women and men don’t hug, for instance. Also, it may be the language barrier, but while the harassment isn’t more than I’ve experienced in other countries (but then I’m Filipino-American and my white friends definitely get way more attention), I do get into very awkward conversations with men who are clearly trying to flirt with me. It’s so very stilted and limited to telling me how pretty I am. More on Types of Men Otherwise, the men are all pretty varied, even if seen through the prism of Indonesian culture and a more overt religiosity. Some like sports; some like movies. Some are shy; some are social. Some know a lot of English and about the West, others don’t. If I rack my head for types, I come up short. Winona says: I don’t think I can identify “types.” All the men I got to know were individuals, and I didn’t get familiar with any sort of general stereotypes. LGBTQ Friendly Anna says: LGBT issues aren’t really out in the open. I don’t know of any people who are truly “out” and are in relationships. There are trans people and queer people here, but it’s not easy for them. I’ve read about activism for more acceptance (including a nursing home for trans people!), but it’s not really “safe” to be out in many places. More on LGBTQ Friendly Winona says: The government still sees LGBTQ identity as a disease. If someone is identified as such they have no real protection under Indonesian laws. Despite this, there is definitely a LGBTQ community in Yogyakarta, especially among the trans community. Foreigners are probably safe, although please avoid PDA. The cops occasionally raid common LGBTQ hangout spots and will detain people overnight. Note: PKBI is the Planned Parenthood equivalent in Yogyakarta and Indonesia in general. Contact them if you need help or information on LGBTQ, birth control, or any other women’s health services. They are a legal organization, but are radically liberal for the region. Anna says: This one’s complicated. Indonesia is, in many places, pretty patriarchal. While it can get sticky discussing Islam, women do cover up in ways and behave in ways men don’t have to. Some of it — mainly the modest dress and sitting behind men in the mosque — can be attributed to religious custom. Others seem to be more local, like women — not just Muslim women but Christian and others— typically don’t go out very late in my city or even go out that much alone while men gallivant all over and at all times. More on Women's Rights On the flipside, this depends a lot on where you are. Even if I couldn’t get out that late compared to my male friends, I went out a lot later and more frequently than my female friends in more rural areas. And, I met tons of women throughout my time here, and what do you know? They’re all very different. Most of my friends were university-educated, working, and quite independent. Quite a few of them went out late, drank, smoked, had boyfriends, and argued with their (many) male friends. Other women I met were quieter and more conservative, maybe more family-focused, but they too had university degrees and full-time jobs. Then, there were women like my ex-host-mother who wore hijab, was a devout Muslim, studied Arabic, ran multiple independent businesses, and was seen as a leader in her neighborhood, whom many, including men, deferred to. And, most of my female students, even if they were amazed that I liked to go out by myself and rode ojeks (motorcycle taxis) and traveled a lot independently, generally expected that they would enter university and have careers. So, a mixed bag. Indonesia’s not a feminist utopia, but then I’m not sure one exists. It’s a rapidly changing society that differs wildly, place to place. If you visit, I’d err on the side of conservatism, especially outside foreigner-heavy spots like Bali, Jogjakarta, and Jakarta, but the country may surprise you. Winona says: Generally I don’t think there’s any serious social segregation. All the women I met were very ambitious and felt free to aspire to do what they want. However, I’m sure in rural areas genders are more divided. Local Women Anna says: Indonesia is very communal and religious, so as a introvert and someone who’s mildly religious at best, I definitely stood out. People still have difficult understanding why I like to eat and drink coffee and go to movies alone. Depending on which group of women I was with, my style of dress and behavior could definitely stand out. At work, I was always getting gently reprimanded for my dress (either too tight or too short or revealing skin I wasn’t supposed to — even if I thought I was decent enough in long sleeves and long pants or skirt) and people were shocked by my loud, somewhat clumsy mien and habit of wearing pants and running off on motorcycle taxis. I was called a tomboy a lot. More on Local Women But then, the other women in work could get pretty loud (Palembangers are loud people in general; a lot of conversations sound like screaming. This is normal). EVERYONE drives a motorbike, including middle-aged and elderly housewives (it was just weird that I went off on motorcycle taxis alone all the time). And, with my younger, university friends, I fit in just fine. Winona says: Local women are often Muslim, or at least raised in a Islamic culture. They tend to cover up more and dress more conservatively than foreign women. Women-Specific Environments Anna says: Mosques are separated inside by gender, and I know for some special feasts, if a woman was on her period, she didn’t go to the mosque with the others. I was also cautioned about entering spaces, like certain warungs or activities, that were primarily frequented by men for safety reasons. I made the mistake of going into such a warung on my street, and now the men feel free to catcall me all the time whenever I pass. They haven’t tried anything, but it does make the simple act of walking down my street aggravating. More on Women-Specific Environments There are a few gender-segregated schools, though I have no personal experience with them. Public education is generally co-educational, though some classrooms are pretty separated down the line by gender. It can get awkward if boys work with girls, though my schools haven’t been like that, beyond adolescent awkwardness. There are many spas and salons that are catered only to women, which are wonderful. And generally, people do socialize within their genders, so I spent a lot of time in traditional markets, the pasar, where women definitely reign (even if men are there). I learned to bargain from the female teachers at my school! Winona says: Mosques and prayer halls have separate areas for women and men. Some spas and massage places are women only. Perception of Foreign Women Anna says: Well, I’m not white and am of Southeast Asian descent, so I get a lot of disbelieving reactions when I tell people I’m American. Some people get it eventually; some never do. I had a taxi driver once say to my face that he didn’t believe me, and I gave him the cold shoulder after that. For foreign women of color, it’s up to you on how you manage it; I am less patient than I was last year. Now I shortly say, “I was born in America but my parents immigrated from the Philippines.” If it’s a student or a polite curious person or friend, I may explain more, but for people who push it, I refuse to engage. More on Perception of Foreign Women American women are generally seen as being freer, more tomboyish, and often, more promiscuous; that is mostly from movies, music, and TV, I suspect. How this shows in treatment of foreign women varies; some are pretty forgiving of my foibles as a result. I do get corrected in my behavior quite a bit, though, mainly for not being aware of my safety or local customs. Something you may also find frustrating, depending on what capacity you’re in Indonesia for, is people’s attempts to make you safer, as a woman. By this, I mean, people may caution you or downright tell you not to go outside at night, not to walk alone, not to go here and there, and may even try to be the only ones to take you anywhere so you won’t be in danger. Don’t worry; it’s totally possible to have a fairly independent life. I managed it, but you have to be careful and polite in how you get people to understand you’ll be fine. Winona says: The general stereotype of foreign women is that we are “loose” and love to party. However locals are generally very kind and helpful and welcome your presence in Yogyakarta. Anna says: I’ve always been told to be wary of buses and angkots. Women definitely use them, but I’ve been told not to go on them alone and with angkots (mini-vans), you definitely need to learn the routes, which can be tricky to do since they’re marked by the color of the vans, and information on routes has been difficult to come by. I’ve never ridden them alone. More on Transportation I primarily use ojeks, taxis, and becaks. Bluebird is a reputable taxi company and is based in most major cities. If it’s not a taxi company like that, stick to ones with meters. Or, bargain in advance for the price. I’ve never had a problem with taxis, but definitely be aware of where you’re going. Ojeks, motorcycle taxis, are hit or miss, and you should have a helmet if you plan on using them with any regularity. As a rule, I never used ojeks after dark and tried to stick to guys I knew were good, safe drivers. Becaks, carts pulled by motorcycle or bicycle, tend to be fine, but it can be a little nerve-wracking being in that little cart on a busy road. I only used them for short distances that were just a little too long to walk. Winona says: At least in Yogyakarta, taxis are safe to take. I felt comfortable grabbing a cab on my own without worry. The traffic is bad, so scooters or motorcycles can be dangerous, but they’re also the most practical and cheap. I never took buses due to their sporadic schedule and how overcrowded they are. Shady Areas for Women Anna says: Certain areas of Indonesia (Aceh, Papua, Central Sulawesi, East Kalimantan) had a lot of upheaval, and I’ve been warned to stay away from them due to ethnic conflict or religious fundamentalism. In Aceh’s case, it has an international reputation due to it being under sharia law and being strict on women as a result. However, I’ve known a number of Western women who’ve ventured into Aceh and Papua and been fine. I’d say exercise caution, check any US State Department advisory, and try to get on-the-ground reports. Winona says: I felt safe throughout Yogyakarta and was okay walking around after dark on my own. I generally stayed in university and residential areas that were lit. Anna says: Outside foreigner-heavy areas like Jogjakarta, Bali, and Jakarta, I’d go for modest. Except in mosques, I’ve never been asked to cover my head, but as a rule, keep to longer pants and skirts (at least to the knee), at least short-sleeved shirts, and higher necklines (no cleavage) and then take your cues from the people around you. More on Clothing In my city, I’d be confused by seeing women in short dresses, skirts, and shorts and sleeveless blouses and dresses, but I found out later these were mostly Chinese-Indonesians and/or Christians. Since I worked in a majority-Muslim school at first and lived in a Muslim area, I erred on the conservative side. I now work in a school owned by Chinese Christians so there I dress a bit more casually. I also work in a mostly Muslim middle school so I dress more conservatively and formally there. Winona says: Skirts, dresses, pants, and shorts above the knees are not practical outside of expat areas. Keep shoulders covered, but otherwise short sleeves are okay. The closer you are to Malioboro the less conservatively you need to dress. Locals are usually in long pants or skirts and at least 3/4 length sleeves. One thought on “Tips for Women Travelers in Indonesia”
cc/2019-30/en_head_0021.json.gz/line1731858
__label__wiki
0.965417
0.965417
Home > First Fruits > Journals > Faith and Philosophy > Vol. 26 (2009) > Iss. 1 Kierkegaard And Natural Reason: A Catholic Encounter Jack Mulder Mulder, Jack (2009) "Kierkegaard And Natural Reason: A Catholic Encounter," Faith and Philosophy: Journal of the Society of Christian Philosophers: Vol. 26 : Iss. 1 , Article 3. Available at: https://place.asburyseminary.edu/faithandphilosophy/vol26/iss1/3 Aims, Scope, and Policies Patrons of the Journal Support Faith and Philosophy Submit Book for Review All Issues Vol. 36, Iss. 1 Vol. 35, Iss. 4 Vol. 35, Iss. 3 Vol. 35, Iss. 2 Vol. 35, Iss. 1 Vol. 34, Iss. 4 Vol. 34, Iss. 3 Vol. 34, Iss. 2 Vol. 34, Iss. 1 Vol. 33, Iss. 4 Vol. 33, Iss. 3 Vol. 33, Iss. 2 Vol. 33, Iss. 1 Vol. 32, Iss. 4 Vol. 32, Iss. 3 Vol. 32, Iss. 2 Vol. 32, Iss. 1 Vol. 31, Iss. 4 Vol. 31, Iss. 3 Vol. 31, Iss. 2 Vol. 31, Iss. 1 Vol. 30, Iss. 4 Vol. 30, Iss. 3 Vol. 30, Iss. 2 Vol. 30, Iss. 1 Vol. 29, Iss. 4 Vol. 29, Iss. 3 Vol. 29, Iss. 2 Vol. 29, Iss. 1 Vol. 28, Iss. 4 Vol. 28, Iss. 3 Vol. 28, Iss. 2 Vol. 28, Iss. 1 Vol. 27, Iss. 4 Vol. 27, Iss. 3 Vol. 27, Iss. 2 Vol. 27, Iss. 1 Vol. 26, Iss. 5 Vol. 26, Iss. 4 Vol. 26, Iss. 3 Vol. 26, Iss. 2 Vol. 26, Iss. 1 Vol. 25, Iss. 4 Vol. 25, Iss. 3 Vol. 25, Iss. 2 Vol. 25, Iss. 1 Vol. 24, Iss. 4 Vol. 24, Iss. 3 Vol. 24, Iss. 2 Vol. 24, Iss. 1 Vol. 23, Iss. 4 Vol. 23, Iss. 3 Vol. 23, Iss. 2 Vol. 23, Iss. 1 Vol. 22, Iss. 4 Vol. 22, Iss. 3 Vol. 22, Iss. 2 Vol. 22, Iss. 1 Vol. 21, Iss. 4 Vol. 21, Iss. 3 Vol. 21, Iss. 2 Vol. 21, Iss. 1 Vol. 20, Iss. 4 Vol. 20, Iss. 3 Vol. 20, Iss. 2 Vol. 20, Iss. 1 Vol. 19, Iss. 4 Vol. 19, Iss. 3 Vol. 19, Iss. 2 Vol. 19, Iss. 1 Vol. 18, Iss. 4 Vol. 18, Iss. 3 Vol. 18, Iss. 2 Vol. 18, Iss. 1 Vol. 17, Iss. 4 Vol. 17, Iss. 3 Vol. 17, Iss. 2 Vol. 17, Iss. 1 Vol. 16, Iss. 4 Vol. 16, Iss. 3 Vol. 16, Iss. 2 Vol. 16, Iss. 1 Vol. 15, Iss. 4 Vol. 15, Iss. 3 Vol. 15, Iss. 2 Vol. 15, Iss. 1 Vol. 14, Iss. 4 Vol. 14, Iss. 3 Vol. 14, Iss. 2 Vol. 14, Iss. 1 Vol. 13, Iss. 4 Vol. 13, Iss. 3 Vol. 13, Iss. 2 Vol. 13, Iss. 1 Vol. 12, Iss. 4 Vol. 12, Iss. 3 Vol. 12, Iss. 2 Vol. 12, Iss. 1 Vol. 11, Iss. 4 Vol. 11, Iss. 3 Vol. 11, Iss. 2 Vol. 11, Iss. 1 Vol. 10, Iss. 4 Vol. 10, Iss. 3 Vol. 10, Iss. 2 Vol. 10, Iss. 1 Vol. 9, Iss. 4 Vol. 9, Iss. 3 Vol. 9, Iss. 2 Vol. 9, Iss. 1 Vol. 8, Iss. 4 Vol. 8, Iss. 3 Vol. 8, Iss. 2 Vol. 8, Iss. 1 Vol. 7, Iss. 4 Vol. 7, Iss. 3 Vol. 7, Iss. 2 Vol. 7, Iss. 1 Vol. 6, Iss. 4 Vol. 6, Iss. 3 Vol. 6, Iss. 2 Vol. 6, Iss. 1 Vol. 5, Iss. 4 Vol. 5, Iss. 3 Vol. 5, Iss. 2 Vol. 5, Iss. 1 Vol. 4, Iss. 4 Vol. 4, Iss. 3 Vol. 4, Iss. 2 Vol. 4, Iss. 1 Vol. 3, Iss. 4 Vol. 3, Iss. 3 Vol. 3, Iss. 2 Vol. 3, Iss. 1 Vol. 2, Iss. 4 Vol. 2, Iss. 3 Vol. 2, Iss. 2 Vol. 2, Iss. 1 Vol. 1, Iss. 4 Vol. 1, Iss. 3 Vol. 1, Iss. 2 Vol. 1, Iss. 1
cc/2019-30/en_head_0021.json.gz/line1731860
__label__cc
0.626309
0.373691
Quiz: Can You Fill in the Missing Words in These Famous British Poems? Can You Fill in the Missing Words in These Famous British Poems? By: Zoe Samuel No man is an island. A little knowledge is a dangerous thing. Halfway up the stairs is a stair where I sit. When the boys come back they will not be the same... All of these are lines from some of the most famous works by some of the most famous poets in British history. Whether Scottish, Welsh, English, Northern Irish or from the various outlying islands, poets have been using the language of Shakespeare to create beautiful work since the beginning of British history and the English language. This came into being in a recognizable form as early as the Roman period, and then despite the name, began to truly flourish during the Dark Ages. There were a great many Anglo-Saxon poems, from Beowulf to Dream of the Rood, to Seafarer, that were recited by minstrels and written down on vellum or parchment. After them came the Middle English poetry of Geoffrey Chaucer and his contemporaries. Once the Renaissance got underway, the English language was still not standardized, but as a great many people became literate, they began to use it in new and exciting ways. This led to William Shakespeare, widely held up as one of the greatest writers in all of human history, and contemporaries such as the Metaphysical poets. Dr. Johnson and the other dictionary writers (many of them poets) then standardized Modern English, and as the Industrial Age brought about the Romantic poets such as Samuel Taylor Coleridge and William Wordsworth. More and more women had access to literature at this point, and had a chance to have their work seen. This leads us to our modern writers such as Poet Laureate Carol Ann Duffy and Jamaican-born Benjamin Zephaniah. Truly knowing British culture means knowing them all! How many do you know by heart? I am ____ dog at Kew / Pray tell me sir, whose dog are you? His Highness' The princess' The equerry's The butler's This is one of Alexander Pope's shortest poems, seen here in its entirety. It was engraved on the collar of a puppy given to his friend, the Prince of Wales. April is the ____ month, breeding / Lilacs out of the dead land... Wettest Cruellest This is from T. S. Eliot's poem, "The Wasteland". That is no country for old men. The young / In one another's arms, the birds in the ____.... This is from "Sailing to Byzantium" by W. B. Yeats. Stop all the ____, cut off the telephone / Prevent the dog from barking with that juicy bone... This is from W. H. Auden's poem "Stop All the Clocks", written in honor of his dead lover. What immortal hand or eye / Could frame thy ____ symmetry? This is from William Blake's poem, "Tyger", an ode to the beauty of tigers. ...the Shepherdesses Charms, / Whose soft bewitching ____, / Had Damn'd him to the Hell of Impotence. This is from "The Disappointment" by 17th century poet Aphra Behn. Corinna wakes, a dreadful sight! / Behold the ruins of the ____! Fright This is from Jonathan Swift's very angry poem "A Beautiful Young Nymph Going to Bed" about a woman who takes off her makeup, then her face, and so on. Take some Picts, Celts and Silures / And let them settle, / Then overrun them with Roman ____... Centurions This is from Rastafarian poet Benjamin Zephaniah's poem "The British", an ode to the melting pot of British culture. Fair fa' your honest, sonsie face, / Great ____ of the Puddin' race! This is from Scottish poet Rabbie Burns' poem, "Address to a Haggis". It's a very long poem about a meaty Scottish dish. Do not go gentle into that good night. / ____, ____, against the dying of the light Rage, rage Rage, burn Burn, seethe Fight, scream This is from Dylan Thomas' villanelle, "Do Not Go Gentle Into That Good Night" about fighting against a premature or undeserved death. What is't that ails young Harry Gill? / That _____ his teeth they chatter.... This is from William Wordsworth's comedy poem "Goody Blake and Harry Gill" about a mean rich man who is cruel to an old widow and becomes cursed to never be warm again. We make more fuss of ballads than of _____.... Ditties This is from Wendy Cope's poem "Engineers' Corner", about how there is no monument to engineers in Westminster Abbey, though there is one for poets. When by thy scorn, O ____, I am dead / And that thou think'st thee free... Murd'ress This is from John Donne's creepy poem "The Apparition", about a man who blames a woman for rejecting him and thus resulting in his death, and threatens to stalk her from beyond the grave. Had we but world enough, and time / This ____ lady, were no crime Coyness These are the opening lines of Andrew Marvell's poem "To His Coy Mistress" Dear friends, we surely all agree / There's almost nothing ____ to see Nicer This is from Roald Dahl's poem, "Dear Friends, We Surely All Agree", about the evils of chewing gum. Come friendly bombs, and fall on ____! It isn't fit for humans now. Glough Bough Slough is a town in England that frankly, isn't very nice. Poet John Betjeman wrote his poem "Slough" about it. And each man stands with his face in the light of his own drawn sword, / Ready to do what a ____ can This is from "Napoleon III In Italy" by Elizabeth Barrett Browning. All the pheasants ever ___ / Won't repay for one man dead This is from Mark Beaufoy's poem "A Father's Advice", written to his son to encourage gun safety. If you can wait and not be tired by waiting / Or being lied about, don’t deal in ____ Untruth This is from Rudyard Kipling's poem "If", which is about how to be a man. I'm not the first or the last to stand on a hillock / Watching the man she married prove to the world he's a total, utter, absolute, Grade A ____ Numpty Chump Pillock This is the entirety of the poem "Mrs. Icarus" by Poet Laureate Carol Ann Duffy. It's part of her book "The World's Wife" in which women in the lives of famous men are given the voice to comment on their situation. In ____ did Kubla Khan / A stately pleasure dome decree... Karakorum This is the opening line of Samuel Taylor Coleridge's famous poem "Kubla Khan". Something there is that doesn't love a _____ This is from Robert Frost's poem "Mending Walls" which is about how boundaries affect people's ability to get on with each other. Remember me when I am gone away / Gone far away into the ____ land... This is the opening line of Christina Rossetti's famous poem, "Remember", that is often read at British funerals. I hate the dreadful ____ behind the little wood... This is the opening line of George Gordon, Lord Byron's utterly weird monodrama, "Maud". Out flew the web and floated wide / The mirror ____ from side to side! Swung Lurched Shook This is from Alfred, Lord Tennyson's famous epic poem, "The Lady of Shalott". Then all at once I saw a cloud / A host of golden _____ This is from William Wordsworth's Romantic poem, "Daffodils". Shall I compare thee to a summer's day? / Thou art more lovely and more _____ This hails from probably the most famous sonnet of William Shakespeare, "Shall I compare thee to a summer's day?" Fools rush in where ____ fear to tread! Brainiacs This comes from Alexander Pope's poem "Essay on Criticism", which is about how small time critics think they are more important than they are! Here is no home, here is but ____ / Forth, pilgrim, forth! This comes from Geoffrey Chaucer's poem "Good Counsel". The mind is its own place, and in itself can make a ____ of hell, a hell of ___... This comes from John Milton's great poem "Paradise Lost", which he wrote to be the English language equivalent of epics like Homer's Odyssey. ____ my heart, three-person'd God, for you / As yet but knock, breathe, shine, and seek to mend This comes from the metaphysical poet John Donne, whose sonnet "Batter my heart" begins with these lines. You would not tell with such high ____ / To children ardent for some desperate glory.... This is Wilfred Owens, the World War I poet, and hails from his powerful poem "Dulce Et Decorum Est", which means "it is sweet and proper". I think it is a ____ but I'm not quite certain / Nanny isn't certain too This is from A. A. Milne and begins "In the corner of the bedroom is a great big curtain / Someone lives behind it but I don't know who!" Brownies are a little pixie-like creature that apparently live behind curtains. La belle dame sans merci hath thee in ____! John Keats' poem tells us that "La belle dame sans merci hath thee in thrall!" James ____ Morrison _____ Weatherby George Dupree... James, Morrison Frank, Rigby John, Hamilton Jack, Egerton In "Disobedience" by A. A. Milne, we learn that "James James Morrison Morrison Weatherby George Dupree, took good care of his mother, though he was only three." The A to Z Knowledge Quiz Can You Match This Classic British Novel to the Correct Author? Can You Match the Famous Painting to the French Artist? Can We Guess If You're British or American Based on the Words You Use? Can You Guess This Famous Book by Its Ending? How Well Do You Know These Drama Class Words? Can You Fill the Blanks in These Old-Timey Phrases? Can You Match the Famous Piece of Literature to Its Author? Do You Remember the Authors of the Books You Read in High School? Do You Know the Meaning of These Words With No Repeating Letters?
cc/2019-30/en_head_0021.json.gz/line1731861
__label__wiki
0.555596
0.555596
Gaming Machines In New Zealand Tokoroa Region Face Potential Ban May 18, 2018 by William Bettany New Zealand’s Tokoroa region might see an end to all local gaming machines in the coming months. The government in the region has given a new gaming salon the go-ahead to start operations, but the salon now has new problems to face. An anti-gambling group is waging a legal battle against the new salon, and hopes to ban gaming machines outright before the venue even opens. Feed Families Not Pokies is the name of the group that is currently looking to take the new salon to court. Colin Bridle, spokesperson for the group, has told reporters that the new salon, which is set to open with 30 gaming machines, will ultimately hurt the development of local families. “We have gathered a lot of material under the Official Information Act and are very fortunate that a barrister and a senior policy analyst, who are both experts in this area of law, have reviewed all the material without charging us for their time. They advised us that there is a clear case of judicial review due to come significant flaws in the official decision-making processes.” Bridle maintains that the new venue exploits a loophole in the Gambling Act that allows it to open a mini-casino. The Act, which allows only nine machines in a new venue, can be exploited if RSAs and other clubs merge, which allows them to have more machines at a time. “We don’t want to see a venue with 30 pokie machines in our community which is basically a commercial venture masquerading as a club,” Bridle added.
cc/2019-30/en_head_0021.json.gz/line1731864
__label__wiki
0.966646
0.966646
Features Princeton spring By Christopher Connell ’71 For the Class of 1968, senior year was a time like no other Bernard Maisner The rites of Princeton University’s 221st Commencement played out on the sun-swept lawn of Nassau Hall on June 11, 1968, after a semester of national torment and heartbreak. Former Supreme Court Justice Arthur J. Goldberg received an honorary degree, along with the poet Marianne Moore; John Doar ’44, the Justice Department’s point man in civil-rights battles across the South; and other luminaries. In the folding seats stretching back to FitzRandolph Gate sat the 756 graduates in the Class of 1968 and 514 master’s- and doctoral-degree recipients, and their families. The last months of their Princeton experience had unfolded against a blur of tragedies and stunning events: the Tet offensive, the abrupt end of draft deferments for graduate school, incumbent Lyndon B. Johnson’s withdrawal from the presidential race, the assassination of the Rev. Martin Luther King Jr., the ensuing riots in Trenton and 100 other cities, the strike that shut down Columbia University, and, finally, the bullets that felled Sen. Robert F. Kennedy moments after he celebrated his triumph in California’s Democratic primary. There had been talk of canceling the P-Rade on Saturday, the day of the Kennedy funeral. Instead, it was curtailed, confined to campus instead of winding through town. “It felt like nothing was ever going to be the same, here or anywhere else,” remembers Timothy McFeeley ’68, who would spend that summer touring Europe with the Princeton and Smith glee clubs. The group had stops in Paris, where students were rioting on Bastille Day, and Prague, enjoying a last month of liberty under Alexander Dub¹cek before Warsaw Pact tanks crushed the “Prague Spring.” It had been a year when Princeton, too, faced rising protests — not only over the war and the campus outpost of the Institute for Defense Analyses, but over dormitory rules and divestiture from businesses dealing with apartheid South Africa. Coeducation was on the horizon (Professor Gardner Patterson and his committee were at work), but still a year away. Sociologist Suzanne Keller that spring became the first woman appointed to a tenure-track faculty position, but Suzanne Gossett *68, a student in the early days of coeducation in the Graduate School and now a professor of English at Loyola University Chicago, says some professors seemed astonished that she actually sought a job after completing her doctorate. “I always describe 1968 as the worst year that ever was — one damn thing after another,” says William H. Earle ’69, a Baltimore writer and editor. “I remember a lot of it as terrifying.” Earle unexpectedly was thrust into the center of controversy over the dorm restrictions known as parietals at the end of exam week in January 1968. His girlfriend was visiting from Bryn Mawr. A proctor — one of the University’s seven-member, plainclothes security force — knocked on Earle’s Cuyler Hall door at 10:30 p.m. to deliver a routine notice from the English department. “Come in,” Earle called out, only to be peremptorily told by the proctor that his visitor must leave, since it was after 7 p.m. on a weeknight (the hours extended to midnight on weekends). But his girlfriend had no other place to spend the night, and Earle stoutly refused to comply. “I said a lot of things. I was pretty annoyed, but I did take her out eventually,” he recalls. He found room for her that night at a married student’s place in town. Earle was hauled before a disciplinary committee and, for refusing to agree to obey the rules in the future, ordered to withdraw for a year. “That whole spring, the country was really in turmoil, plus you’d had the riots, the cities on fire,” says Kenneth Michaelchuck ’68. The case quickly became a cause célèbre. The Prince originally planned to run an account playing the incident for laughs, but “it was anything but comic to me. We managed to get it rewritten as a serious news story,” says Earle. Student leaders intervened on his behalf, and a compromise was struck: Earle’s punishment was changed to probation and the dean of students let it be known that while parietals would stay on the books, there were no plans to enforce them, according to Marc E. Lackritz ’68, the president of the Undergraduate Assembly. Writing in a 1968 Bric-a-Brac essay titled “Going Forward” instead of “Going Back,” David S. Gould ’68 described that senior year: “Miraculously, the clouds started to part, and for the first time in 67 years, the 20th century threatened to break through.” Gould — lawyer, speechwriter, and wag — was a “ferocious” supporter of the Commit-tee for Coeducation, a student group. “The absence of women was the greatest drawback to my Princeton education,” he wrote in the class’s 35th-reunion book. Noting that the class was among the first with more public- than private-school graduates, Gould opined, “Our class must have driven the administration crazy. Even though the Princeton Class of ’68 was still far behind other schools in social activism, we were doing things that were unheard of in the lore of Princeton University.” “One of the things I liked about the Class of ’68 [was that] there was a lot of protesting going on, a lot of disagreement, and it was fine,” says Eric L. Chase ’68. Courtesy Eric L. Chase ’68 Kenneth Michaelchuck ’68 skipped graduation for his honeymoon. He and his high school sweetheart, Kathleen, had wed back home in Paulsboro, N.J., on Saturday, June 8; they’d set the date without checking on graduation. Michael-chuck, a construction worker’s son, already had enlisted in the Army and had a job waiting with Procter & Gamble. “That whole spring, the country was really in turmoil, plus you’d had the riots, the cities on fire,” says Michaelchuck, who became a Miller Brewing executive and later vice president and CIO of Philip Morris Co. “When I enlisted in May I had to go to Newark. I got off the train to go to the federal building, and the city had been burned out. I kept thinking to myself, ‘Vietnam can’t be any worse than this.’ It looked like a war zone.” The Army sent Michaelchuck to Alaska instead of Vietnam. Not everyone remembers the summer of ’68 as a season of torment. “I didn’t feel it as a hectic spring,” says Roger S. Cooper ’68, one of 78 graduating seniors commissioned into the Army, Air Force, Navy, or Marines. “Except for getting my thesis done, I didn’t feel any pressure. It was very pleasant. ... I was unaffected by the turmoil going on in the rest of the world, in all honesty.” Cooper, a statistics major, made the Navy his career. He captained a guided-missile frigate and became an arms-control negotiator. Now a defense analyst, he says, “People always ask me, ‘What about SDS [Students for a Democratic Society] on campus and things like that?’ SDS? It was like the Senate used to be, where the Republicans and the Democrats disagreed, but they talked to each other. The same thing with ROTC and SDS. I had close friends who didn’t believe in what I was doing, but they didn’t get violent or anything. I didn’t experience that at Princeton, ever.” SDS even challenged ROTC to a game of touch football over Yale weekend. The radicals won. The draft led architecture major William Brundige ’68 into teaching, where he happily remains. Courtesy William Brundige ’68 Future Marine officer Eric L. Chase ’68 remembers sitting on the edge of his seat at Commencement, ready to get on with life and “with a certain eagerness to go to war.” His father, Harold W. “Hal” Chase ’43 *54, back for his own 25th reunion, had sworn in Eric as a Marine officer the day before. The elder Chase, a political scientist and former Princeton professor, was a colonel and later a major general in the Marine Reserves who had returned to active duty and led an amphibious assault battalion in Vietnam, his third war. Eric Chase, a wrestler at Andover and Princeton, would be wounded in Vietnam leading a combat patrol in Que Sanh in 1970. In June 2006, he swore in his own son, Eric ’06, and two classmates as Marine officers; the son is now serving in Iraq. The father does his battles these days in the courtroom as a commercial litigator. It troubles him that the military is no longer part of life for most Princetonians. “One of the things I liked about the Class of ’68 [was that] there was a lot of protesting going on, a lot of disagreement, and it was fine,” says Chase. “That’s not true anymore. You get a lot of disparagement of views that don’t conform to what most people want to hear.” Air Force ROTC product Hervey Stockman Jr. ’68, known as Peter, also received his diploma on Commencement morning, uncertain whether his father, Air Force fighter pilot Hervey S. Stockman ’44, had survived the crash of his plane over North Vietnam in June 1967. Eighteen more months would pass before Peter and his mother got confirmation that the elder Stockman was a POW; he spent nearly six years in Hanoi prisons and emerged to write a paper for the Air Force War College on how and why so many U.S. aviators survived that ordeal as well as they did. The son says his father had encouraged him to join ROTC at Princeton “because he was concerned about Vietnam.” He did so, and the Air Force allowed the young officer to pursue his Ph.D. in physics afterward; Stockman became a top NASA scientist and deputy director of the Hubble Space Telescope program, and is now head of the James Webb Space Telescope Mission Office. Asked if the vocal anti-war students on campus that spring bothered him, Stockman says, “Maybe a little bit, but on the other hand I could see why they were upset with the war. ... It’s hard to be for a war in which the government you’re supporting clearly is not very strong.” Benjamin R. Foster ’68 returned to his dorm for one last check of the mail after the graduation ceremony and found a draft board notice reclassifying him 1-A, subject to being drafted immediately. He wound up as an ammunition specialist in Vietnam before returning to graduate school at Yale. “I felt I’d lost two years of my life, but there it was, and I was highly motivated. I could hardly wait to open a book, and I couldn’t bear to put a book down. Military service was a colossal motivator,” says Foster, a Yale professor of Assyriology and Babylonian literature. He laments that Americans now are dying in another “pointless and stupid war.” The draft and Vietnam led architecture major William Brundige ’68 to detour into teaching. His draft board renewed his deferment when he signed up to teach at an inner-city Los Angeles junior high. Later, after earning a master’s degree in architecture at the University of Southern California, he found that teaching, not architecture, had become his passion. He is still in the Los Angeles public schools, teaching six sections a day of technical arts, 41 students to the class, at Fairfax High School. He teaches summer school as well. He stuck with teaching, he says, “because of the happiness that it’s brought me all these years.” “It was very courageous of Dr. Goheen to stand there and speak with us students not knowing what our intentions were, other than to have an unscheduled discussion with him,” says Deane Buchanan ’68. Courtesy Deane Buchanan ’68 Robert B. Schoene ’68 regards 1968 as “one of the most important and pivotal years of the 20th century in our country’s history.” Schoene was the starting quarterback on the football team his senior year, but a knee injury in the Cornell game ended his season prematurely. “I was sort of devastated for 36 hours, but all of a sudden it came over me that much more important things were going on,” says Schoene, a physician, mountaineer, and expert on high-altitude sickness. “I think about 1968 every day. I really do,” says the University of California, San Diego, medical school professor, who keeps a picture in his office of the clenched-fist salute by sprinters Tommie Smith and John Carlos at the Olympics in Mexico City that October. The 1967 riots in Watts, Newark, and Detroit had made a deep impression on him; the assassinations of King and Kennedy left him emotionally drained. His face is angry in all the pictures his family took that day at graduation. Schoene recalls that one day that spring, when SDS was staging a protest, some football teammates came by his room “and said, ‘We have to go defend Nassau Hall.’ By that time I had rethought things. These were my friends, but I said, ‘You know, I can’t do that. I think SDS is correct.’” “It felt like nothing was ever going to be the same, here or anywhere else,” remembers Timothy McFeeley ’68. Courtesy Timothy McFeeley ’68 When students organized a weekend anti-war fast and study-in in February at the Woodrow Wilson School, Nassau Hall touted the event with a press release noting that participants included class officers “and the captains of the football and lacrosse teams.” Stephen B. Richer ’68 gained national attention for efforts to get Robert Kennedy’s name added to the Democratic presidential primary ballot in New Jersey. Kennedy jumped into the race a few days after Sen. Eugene McCarthy of Minnesota, the peace candidate, nearly upset President Johnson in the March 12 New Hampshire primary. Many students were still home on spring break on March 31, when LBJ addressed the nation about a halt to the bombing of North Vietnam and his surprise announcement at the very end that he would not seek re-election. Lackritz, a future Rhodes Scholar who was completing his senior thesis on Cleveland’s 1966 riots, recalls “whooping, hollering, and celebrating” in the Wilson School, which LBJ had dedicated two years earlier. But as John V.H. Dippel ’68 wrote in PAW’s On The Campus column, “absolute euphoria” quickly turned to “complete bewilderment” four nights later with the shocking news from Memphis. Apart from being all-male, Princeton in 1968 was overwhelmingly white. There were three dozen African-American undergraduates on campus that spring, and most marched to Walter B. Lowrie House, the president’s residence, an hour before midnight on Sunday, April 7, to remonstrate when President Robert F. Goheen ’40 *48 decided not to cancel classes on Tuesday, the day of Martin Luther King Jr.’s funeral. Goheen had assured students, faculty, and staff they could spend as much time as they wished that day commemorating King’s life, but said official activities would pause only for a moment of silence at noon. Going ahead with the pursuit of education “may well be the best tribute we can pay this great man,” the president reasoned. Robert L. Jaffe ’68 thought valedictories were customarily given over to effusive words. “I wasn’t in that mood,” he says. Courtesy Robert L. Jaffe ’68 The year-old Association of Black Collegians (ABC), in a pronouncement printed in the Prince, said its members were “numbed and shocked by the brutal slaying of the world’s apostle of non-violence.” Whatever Nassau Hall did, ABC members would “withdraw totally from ‘the Princeton Experience’ [Tuesday]. No black student will attend classes! No black student will work on any job! It will be a day of quiet meditation and reflection.” Goheen and his family had moved just 10 days earlier from Prospect House into the new official residence on Stockton Street. The ABC members, led by seniors Deane Buchanan and Paul Williams, clustered on the porch and rang the doorbell. Goheen emerged and heard them out for the next half-hour. Finally, the president told the students they had convinced him: Classes would be canceled. “I didn’t realize that the cancellation of classes was that significant a symbol. I didn’t realize the intense concern the ABC felt,” the Prince quoted him as telling the students on his porch. Buchanan, now a municipal judge in Cleveland Heights, Ohio, says it was important for the University to acknowledge “the loss of what this man meant to our country, not just the black people, but the importance of this man to our country.” But he adds, “It was very courageous of Dr. Goheen to stand there and speak with us students not knowing what our intentions were, other than to have an unscheduled discussion with him.” In Alexander Hall on the day of the King funeral — at one of an emotional series of ABC-organized events — Paul Williams told an overflow audience, “Violence is not what we’re advocating. If we wanted violence, we wouldn’t be here today.” A week later, the admission office announced that the number of black students admitted in the next entering class had more than tripled. At Commencement, there would be a surprise addition to the awards printed in the formal program: ABC leaders Buchanan and Williams were asked to step forward to receive the first Frederick Douglass Service Award. “It was a tremendous surprise,” says Buchanan. “I was just amazed. The theme of ‘Princeton in the nation’s service’ has always been a statement of significance for the University. ... This was the Univer-sity recognizing the importance of generating student leadership among blacks.” His co-winner, now Paul X. Carryon ’68, became a cardiologist in Chicago. The semester hurtled on. Later in April, Princeton’s trustees voted to liberalize parietals instead of to eliminate them. Women would be allowed in dorms until 2 a.m. on Fridays and Saturdays and until midnight the rest of the week, and undergraduates now could live off campus. The gesture only antagonized those it was meant to placate. A “travesty ... senseless and disgraceful,” howled the editors of the Prince. That year’s protests — which included the arrest of 30 students (14 seniors among them) for blockading IDA’s doors in October 1967 — came to a head with a march and rally outside Nassau Hall on Friday, May 2, 1968, that drew more than 1,000 people. Goheen, after listening to all the demands, gave his own speech promising faculty and students a say in University governance. Parietals were scuttled. The protests, for now, were over. Then the RFK assassination cast its pall on the end-of-year rituals. James A. Winn ’68 recalled in his class’s 25th-reunion yearbook how unreal it seemed, with the draft hanging over so many heads. “Here we were, reveling toward graduation in one of Princeton’s most achingly beautiful springs, performing the rites of Houseparties and Class Day without ever being able to forget the uncertainty that lay beyond.” Winn enlisted, but later won a discharge as a conscientious objector. He became a professor of English literature. The class valedictorian, Robert L. Jaffe, a 22-year-old physics major from Stamford, Conn., had misgivings when University Secretary Jeremiah Finch notified him that he had been chosen for the honor. Jaffe thought valedictories were customarily given over to effusive words. “I wasn’t in that mood,” he says. He was upset about the war, about bicker and the pace of change at Princeton, and by the violent turn of events at Columbia. Jaffe used the platform to offer an impassioned defense of student activism, coupled with a warning against the “disruption and destruction” exhibited on Morningside Heights. “Over all our years here has hung the specter of an unpopular and seemingly endless war, one which many of us also feel to be unjust. Alongside this conflict has risen another, sprung from the struggle of the blacks of our country to obtain equality and to find dignity. We have watched and found that we cannot wait for others to confront these issues,” the valedictorian said. To solve America’s problems, “we must go beyond institutional rearrangement and reform; we must ... effect profound changes inside the hearts and minds of the American people. We cannot alienate ourselves in our frustration and our discontent from the majority of Americans with whom we must communicate if we are to improve the country.” Jaffe later took part in war protests as a graduate student at Stanford and got involved in a forerunner of the Union of Concerned Scientists. He went on to make important discoveries on the physics of quarks at MIT, where he holds an endowed chair and has received numerous teaching awards. Salutatorian Donald McCabe ’68 delivered the customary Latin address, with classmates following a script telling them when to cheer, hiss, or applaud. Still, McCabe ended on a somber note. “So we salute you, alma mater, as many of us prepare to leave and go to war, and perhaps to die.” Fifty weeks later, Marine Lt. Will Pyle ’68 was killed trying to reach wounded members of his platoon in Vietnam. Pyle was an architecture major who had undergone Marine Corps officer training at Princeton. He and fellow Tower Club member William Van Stone Jr. ’68, who perished in the crash of his Navy jet in Washington state in 1970, are among the two dozen Princetonians killed during the Vietnam era whose names are engraved on the memorial wall in the atrium of Nassau Hall. The Class of 1966 lost five members, the Class of 1961 three, and the Classes of 1962 and 1965 two each. Eight undergraduate classes have a single name on that section of the wall (1931, 1943, 1954, 1955, 1956, 1964, 1967 and 1969). Two Graduate School alumni (1959 and 1962) gave their lives during the conflict in Southeast Asia. Nineteen-sixty eight was the worst year for U.S. casualties in Vietnam. More than 16,000 of the 58,000 names on the Vietnam Veterans Memorial in Washington, D.C., honor those who fell that year. Republican Richard M. Nixon would win the presidency in the fall, promising “peace with honor” and an end to the unpopular draft. The first draft lottery, in December 1969, would reduce some of the uncertainties that many in the Class of 1968 faced; the switch to an all-volunteer force in 1973 eliminated them entirely. That semester also was the final one at Princeton for Alpheus Thomas Mason, the constitutional scholar and McCormick Professor of Jurisprudence, forced to take emeritus status at age 68 after 43 years on the faculty. Mason was neither ready nor rusty; he spent the next dozen years teaching at Harvard, Dartmouth, the University of Virginia, and other institutions and lived to 90. For Timothy McFeeley ’68, it was Professor Mason who helped him make sense of that tormented spring. McFeeley, executive director of the Human Rights Campaign Fund, the nation’s largest gay and lesbian political organization, from 1989 to 1995, says he feels Mason’s influence to this day. What he learned from the legal scholar, McFeeley says, was that “despite everything that was happening politically, culturally, and socially, there was this institution and this incredible document called the Constitution of the United States that would provide an anchor for the Republic, and for people in it.” Christopher Connell ’71 is a freelance writer in Alexandria, Va., and former assistant chief of the Washington bureau of The Associated Press. Princeton Spring navigation=1187002759-14 Read letters and comments from PAW’s Inbox Remembering 1968 By Bill Swan ’68
cc/2019-30/en_head_0021.json.gz/line1731869
__label__wiki
0.9946
0.9946
Home Football English Football Freddie Ljungberg Returns To Arsenal As U23 Coach Freddie Ljungberg Returns To Arsenal As U23 Coach Richard Barrett June 12, 2018 Former Arsenal star Freddie Ljungberg has returned to the Premier League club as Under-23 head coach. Ljungberg helped Arsenal win the Premier League twice and the FA Cup three times in a nine-year spell from 1998 to 2007. He scored 46 goals in 216 appearances for Arsenal and, after retiring in 2014, the Sweden winger spent a season coaching Arsenal’s Under-15 side. Following a short spell as Wolfsburg assistant manager, Ljungberg returns to the Emirates Stadium after Arsene Wenger ended his 22-year reign as Arsenal manager at the end of the season. Wenger has been replaced by Spaniard Unai Emery. “I’m delighted to be returning to the club. Arsenal has always been a special place for me and I’m really excited at this opportunity to work with our under-23 team,” Ljungberg said on Tuesday. “I look forward to working with the talented young players we have at the club. “I know many of them well and will work hard to help them continue developing and become the best players and people they can be.” Ljungberg played a prominent role in Arsenal’s Premier League and FA Cup double triumph of 2002 and was part of the ‘Invincibles’ team which went unbeaten for the 2004 league campaign. Ljungberg, who also played for West Ham, Seattle Sounders, Chicago Fire and Celtic, joined Wolfsburg as former Arsenal Academy manager Andries Jonker’s assistant in 2017. But he left when Jonker was sacked as manager of the German side after just seven months in charge. Arsenal’s new Academy chief Per Mertesacker said: “It’s great to have Freddie back at the club. “He understands the club’s values and how important it is to give young players the opportunity to grow and develop.” smg/cw © Agence France-Presse (Additional edits from Richard Barrett) About Richard Barrett Richard Barrett is a Co-Founder and Head of Content at Pundit Arena. You can follow him on Twitter via @TheBoyBarrett . @theboybarrett
cc/2019-30/en_head_0021.json.gz/line1731880
__label__wiki
0.944291
0.944291
From Africa to the land of opportunity By By Russell Toof Baltimore Recruiting Battalion U.S. Army Staff Sergeant Mohamed Kaba. FORT MEADE, Md, May 9, 2018 — FORT MEADE, Md. - Learning English on your own in three months is not a typical thing for someone born in the Republic Of Guinea and educated in France. For U.S. Army Recruiter Staff Sgt. Mohamed Kaba, Baltimore Recruiting Battalion, he could not have imagined taking a different path in life. Guinea is a small country in West Africa that gained its independence from France 60 years ago. The agriculture industry employs more than three-fourths of the nation's labor force and the literacy rate is one of the lowest in the world. Kaba was in the minority, moving to France and studying law. He concentrated on civil law, assisting families. He visited the U.S. for the first time in 2006 and moved permanently in 2007. "Coming to the U.S. was a wakeup call. I'm thankful to France for my education, however the U.S. is a land of opportunity. People are more open-minded here," he said. Kaba turned his sites towards the Army shortly after coming to America. "The good thing about the U.S., and especially the Army, is it's a melting-pot. It doesn't matter your background, where you are from, your religion. If you want to be successful, the Army will give you the tools to make it happen," he said. He wanted to be a Judge Advocate General officer, but he was not a citizen and could not hold a security clearance. He was, however, able to enlist. "I started as a logistics specialist, but after six years of active duty, I wanted something bigger than just me," Kaba said. Kaba volunteered for recruiting near the end of 2016 and became a recruiter in April 2017. "I'm grateful to my family and especially my leadership for their support," he said. Spending time with Kaba, you get a sense of how much he truly enjoys this line of work. "They give me a government car with a gas card and an EZ-Pass, so I don't mind going out and finding recruits," he said with a big smile across his face. "Without my Future Soldiers, I wouldn't be where I am now. I thank them for the trust they put in me."
cc/2019-30/en_head_0021.json.gz/line1731885
__label__cc
0.605888
0.394112
Tag Archives: Statistics on Violence Against Women Global Scope and Magnitude of Violence Against Women This past year has been a wake-up call to me that violence against women has a global scope and magnitude that the media is turning a blind eye to. As women, we must ask ourselves what we can do to help put an end to this epidemic that spans across all societies across the world. The global scope and magnitude of the violence is a direct result of the religious and cultural “indoctrination” that takes place to proliferate this “inequality” of the sexes. Male-dominated societies push through the “belief systems” that enable them to continue to oppress and suppress women from positions of authority and power throughout the world. Women in positions of authority that have the power and influence to affect changes in law, would absolutely stop much of the violence. Women do not tolerate abuse or, abuse on their children; men do. If men TRULY desired to end the violence, they absolutely could by using “thought or behavior reform” and, the same methods they have always used AGAINST women, to reverse behavior and attitudes that lead to abuse. They could also put permanent laws in place to protect women. They could prosecute 100% of the perpetrators. The magnitude of the abuse: Religious indoctrination plays a major role in the behaviors and attitudes of men toward women. The religious manuscripts in existence have been proven to have many thousands of changes; many of which, have eradicated women from the religious roles they once held in the days of the early church. Changes have been made in order to dishonor and degrade women. Interpretations of scripture are twisted to teach that men are “superior”. Why would men do this? Why would men change “scripture” to eliminate women in leadership in any capacity within religious circles? This is not difficult to answer. It keeps women in a position of inequality and submission that leads to total control; that leads to sexual exploitation (see my articles on Sexual Exploitation of Women in Cults, How Submission is Obtained: The Cult Rationale and, How Submission is Obtained: Personal Abuse) Thought reform (also known as behavior modification), has been a major tool used by men to keep women in a place of inequality and submission; thus, enabling the abuses talked about in the following study that I am about to give you. This study reveals just how bad the war on women really is. Every woman must educate herself on the statistics, and the reality, of what is truly taking place in not only this country, but across the world. We must be exceedingly “aware” of the changes in law that affect our equality, freedoms and protections. As a race of people, we must take steps to protect ourselves and our children from this abuse. We do not have to put ourselves at the mercy of abusive men in any situation. Unfortunately, oftentimes, we are “forced” into this abusive environment by men whose only real agenda is sexual control and power. Through “religious” laws (like Sharia) interwoven into civil laws, women are “forced” to endure the torture, sexual mutilation, physical abuse, incest, rape, humiliation and trauma that men perpetrate against them. As a result, of these religious laws, as a result of religious indoctrination, as a result of the forced submission and sexual inequality, women and children are left at the mercy of abusive and perverse men in all societies across the globe. MEN can STOP the VIOLENCE and bring EQUALITY – IF THEY WANTED TO! Global magnitude of the violence against women. What are some of the steps we can take to ensure our safety? Let’s put some thought to this and really figure out what is necessary to stop violence against us and our children. Women should be vying for positions of leadership all over America within Government. Women in Government protect themselves and children. Women should be ever alert to changes in law that take away their rights and protections. Many times men will enact “laws” using the “MORAL” excuse as a blanket to deprive women of sexual equality; thus, enslaving them to their agendas of “exploitation”, control and submission to THEM. Women that have been abused MUST speak out about that abuse! The STATISTICS are so badly understated that it gives the impression that it is not as bad as it really is! Women MUST be courageous in taking action against ALL perpetrators of abuse where there are laws in place to protect them from it. IF we do NOT do this, these laws will fall away leaving us NO protection. Think about this! The Violence Against Women Act (VAWA) was not renewed last year because the religious “right” said it would cost too much money to help abused women. Do we really believe that they cared one wit about money on this issue? Of course not! It’s about maintaining the power imbalance and control over women. Here’s an excerpt from the Huffington Post online on February 14, 2012. Protecting women from violence and abuse has been an issue of bipartisan cooperation since President Clinton signed the landmark Violence Against Women Act (VAWA) in 1994. It was reauthorized with overwhelming bipartisan support in 2000 and again in 2005. Not this year. On Feb. 2, the Senate Judiciary Committee approved legislation (S. 1925) reauthorizing VAWA. The bill was sponsored by Chair Patrick Leahy (D-Vt.) and Sen. Mike Crapo (R-Idaho) — who is not on the committee — and cosponsored by 34 senators from both parties. Nevertheless, the legislation attracted no GOP support among committee members and passed out of committee on a party-line vote of 10-8. It was, according to Leahy’s office, the first time VAWA legislation did not receive bipartisan backing out of committee. “Helping victims of domestic violence shouldn’t be partisan,” said Leahy in an interview with The Huffington Post. “I remember when I was a prosecutor and I’d go to a crime scene at 2:00 in the morning where [there were] victims of domestic violence. … I never remember the police saying, ‘Well, we can only investigate this if it’s a Democrat or a Republican or whatever else. Their reaction was, ‘How do we find the person who did this?’ It’s outrageous to make this a partisan issue.” – Huffington Post, Feb. 14, 2012 “But VAWA is facing well-organized opposition, and as Jillian Rayfield reported, it’s coming almost entirely from the religious right movement [emphasis mine]. The socially conservative Family Research Council asked supporters to help it oppose the reauthorization of the Violence Against Women Act because, the group says, the “real abuse” is how much it will waste taxpayer dollars.” – MSNBC’s Madowblog.com, Feb. 7, 2013 However, President Obama signed it back into law this year to provide women protection from domestic abuse. What if he hadn’t done so? Why isn’t this law PERMANENT? Why is it TEMPORARY and must be “voted on” at the end of its term? Does that make any sense at all? Let’s protect women “temporarily” until such a time as we have a man in office that decides it’s not worth renewing because his “religious” beliefs degrade women anyway? What is wrong with people in government that this needs to be voted on? This is a moral and ethical issue here. This should be a PERMANENT law here in this country. If women across the globe are going to EVER gain their honor and dignity back, their rights and equality, then we MUST speak out about ABUSE of all kinds. WE MUST REPORT IT. We MUST strive to get into government positions that will allow us to affect changes in law. Why does one think that all these women were shot down by the MEDIA in the last four years? Katheryn Lane, Michele Bachmann, Sarah Palin, Hilary Clinton. These women were viciously “discredited” and “attacked” by the media and, it was not because they were not qualified for the positions they were vying for. They were discredited because they were WOMEN that DARED to run for an office that would enable them the POWER to affect change for women all over this country; changes that would stop the power imbalances in government, changes that would stop the abuse and afford women the protections they have been denied oftentimes, changes that would give women the courage to report ALL abuses because they would not have to worry about men shaming and humiliating them and hurting them any longer. WOMEN do not tolerate abuse. Let’s let that sink in for a moment. If we women are going to change America and bring equality of the sexes, protection of women and children and, equality of power, then we must stand together as a WHOLE and do our best to put women in these positions! We cannot let ourselves be divided by MEN’S agendas as the media “portrayes” them. We cannot let the MEDIA “LABEL” those that try to make a difference for women everywhere. Labeling: Here is what “labeling” does. It attempts to dehumanize a person or race so that dismissing them or their opinions is much easier. Choosing not to address someone individually who challenges the toxic faith places a blanket negative label on all who would agree with that person. Those who disagree with what is taught are labeled as “detractors,” “malcontents” and “traitors”, who would destroy the ministry or organization. These labels then become rallying points under which other followers can be moved to action to squelch a revolt. Once the label is placed, it becomes more difficult to see the person as a human with real needs and the potential for good judgment. This is exactly what religious leaders have done to women throughout history! — Religion’s Cell: Doctrines of the Church that Lead to Bondage and Abuse, C. McClaskey These women showed the COURAGE to stand in the forefront and run for political offices. They were not only publicly shamed and humiliated (typical male tactic against us) by men, they were shamed and humiliated and mocked by other WOMEN! They were “labeled” by the MEDIA and MEN. They were used to DIVIDE women everywhere across this country! What is wrong with people? Only equality of POWER will stop abuse for us and give us the freedoms that we have been denied. If you don’t think we have been denied equality, then ask yourself why men are paid higher salaries than women? Please, think about these things as you read this study that puts all of this into perspective. This is a WAR on WOMEN and always has been. This war is the result of “religious mindsets” delivered to people deceptively over time. It is time to wake up women of the world and realize that the time is NOW to do what we must do to change our positions in society and to protect us and our children. This will be the most important document you will every read to open your eyes to the global scope and magnitude of violence against women. Violence Against Women Global Scope and Magnitude Some “reality checks” for women: What is the Texas Islamic Court? Muslim Gang-rapes across Europe under-reported in press Female genital mutilation on the rise in the United States Saudi preacher gets fine and short jail term for raping and killing daughter Court: Man raped 7-yr old inside Church, gave her Chlamydia Why is rape in Syria being ignored by U.S.? Rape is Rape: How the Culture of Shaming, Stigma, and Victim-blaming is Hurting us Papua New Guinea woman burned alive for sorcery The Magdalene Laundries: Forced Labor When Violence Against Women is ‘Honorable’, ‘Religious’ and ‘Legal’ DHS Allowing Saudi’s to bypass passport and travel controls Washington: Hamas-linked CAIR bullying middle school teacher, defending Hamas, Taliban For the sake of the assault these bring on our conscience, I will stop here with the unlimited list of articles across the world that show beyond a shadow of a doubt that the abuses are real and need to be dealt with. They show the religious “attitude” toward women. They show the reality of the abuses. They show the “mindset” of most men due to religious “brainwashing”. There is so much more that it is mind-boggling. Violence against women caused by “religion” is the main reason I wrote my book, Religion’s Cell: Doctrines of the Church that Lead to Bondage and Abuse. I expose the tactics and mindsets that religion has used to ENLSAVE a whole race of people – women. Why aren’t mainstream MEDIA covering all of these stories? Why aren’t mainstream MEDIA telling the real story that is taking place against women? Makes one wonder, doesn’t it? Power imbalance and inequality have caused these atrocities. It’s time for women to unite and work together to elect women in places of leadership across this country before we are “forced” permanently into the abusive roles that we once fought so hard to get out of. The time is short. Only unity between us will make the difference. This entry was posted in Religion's Cell Articles and tagged Brainwashing leads to abuse, Global Magnitude of Violence Against Women, Incest, Physical Abuse, rape, Religious Abuse against women, Religious Abuse of Children, Statistics on Violence Against Women, Violence Against Women on March 23, 2013 by admin.
cc/2019-30/en_head_0021.json.gz/line1731887
__label__cc
0.746539
0.253461
Λιανικής Χονδρικής Rito's Food (the “Company”) is committed to protecting the privacy of its users. This Privacy Policy (“Privacy Policy”) is designed to help you understand what information we gather, how we use it, what we do to protect it, and to assist you in making informed decisions when using our website. Unless otherwise indicated below, this Privacy Policy applies to any website that references this Privacy Policy, any Company website, as well as any data the Company may collect across partnered and unaffiliated sites. For purposes of this Agreement, the terms “we,” “us,” and “our” refer to the Company. “You” refers to you, as a user of the website. I. CONSENT By accessing our website, you accept our Privacy Policy and Terms of Use, and you consent to our collection, storage, use and disclosure of your personal information as described in this Privacy Policy. In addition, by using our website, or services across partnered and unaffiliated sites, you are accepting the policies and practices described in this Privacy Policy. Each time you visit our website, and any time you voluntarily provide us with information, you agree that you are consenting to our collection, use and disclosure of the information that you provide, and you are consenting to receive emails or otherwise be contacted, as described in this Privacy Policy. Whether or not you register or do any sort of business with us, this Privacy Policy applies to all users of the website. II. INFORMATION WE COLLECT We may collect both “Non-Personal Information” and “Personal Information” about you. “Non-Personal Information” includes information that cannot be used to personally identify you, such as anonymous usage data, general demographic information we may collect, referring/exit pages and URLs, platform types, preferences you submit and preferences that are generated based on the data you submit and number of clicks. “Personal Information” includes information that can be used to personally identify you, such as your name, address and email address. This website uses Google Analytics to track information regarding your use of the website. We may track information provided to us by your browser or use of the website, such as the website you came from (known as the “referring URL”), the type of browser you use, the device from which you connected to the website, the time and date of access, and other information that does not personally identify you. We use this information for, among other things, the operation of the website, to maintain the quality of the website, to provide general statistics regarding use of the website and for other business purposes. We track this information in Google Analytics using cookies, or small text files which include an anonymous unique identifier. Cookies are sent to a user’s browser from our servers and are stored on the user’s computer hard drive. Sending a cookie to a user’s browser enables us to collect Non-Personal Information about that user and keep a record of the user’s preferences when utilizing our services, both on an individual and aggregate basis. The Company may use both persistent and session cookies; persistent cookies remain on your computer after you close your session and until you delete them, while session cookies expire when you close your browser. Persistent cookies can be removed by following your Internet browser help file directions. If you choose to disable cookies, some areas of the website may not work properly. You may disable cookies in your browser using the following instructions: For any other browser, please directly consult the cookie management help information available on the Internet. There may be several online forms present on our website where you are able to submit personally identifiable information in order to express interest in our business or submit an inquiry regarding our business. These forms may appear as RFP forms, Contact Us forms, Wedding RFP forms, or other similar forms that request your information before submitting. When you contact us using a form on our website, we collect information that identifies you, such as your name, job title, business name, phone number, email address, and other personally identifiable information. Some of this information is required and other information is optional. This information is used to better address your inquiry and is not used for marketing purposes or shared with other third party companies. If you would prefer that we do not collect this information then simply do not fill out the form. If you have already submitted your information through a form and would like to be removed, please email us. Based upon the Personal Information that you provide us, we may communicate with you in response to your inquiries to provide the services you request and to manage your account. We will communicate with you by email or telephone, in accordance with your wishes. We may also use your Personal Information to send you updates and other promotional communications. If you no longer wish to receive those email updates, you may opt-out of receiving them by following the instructions included in each update or communication. Specifically, we use MailChimp to store email addresses of those who have opted into our email marketing campaigns. We also use MailChimp to distribute marketing emails to our list of opt-in subscribers. These emails may contain a pixel or a web beacon that identifies whether you have 1) received the email; 2) opened the email; or 3) clicked the email. You may opt out or unsubscribe from our marketing emails if you do not want us to collect this information from you. You may also email us if you would like to be removed. For more information, please review Mailchimp’s own Privacy Policy​. We participate in a variety of online advertising. This advertising displays our ads to you on the websites and apps that reside outside of this website. We collect information that identifies: which ads are displayed which ads are clicked where the ad was displayed Buttons, Tools, And Content From Other Companies Our websites may include features such as plugins, buttons, tools, or content that link to other companies. We may collect information about your use of these features. In addition, when you see or interact with these buttons, tools, or content, or view any of our web pages containing them, some information from your browser may automatically be sent to the other company. Please read that company’s privacy policy for more information. We have a presence on various social media networks, such as Facebook, Instagram, Twitter, Google+, Pinterest, and LinkedIn. We may collect information when you interact with our social media accounts and pages. III. HOW WE USE AND SHARE INFORMATION The data that we collect about you may be used in the following ways: Troubleshooting our websites and diagnosing problems Providing you with any services, support, or information you have requested Better understanding user behavior on our sites so that we may update our website to better serve the needs and interests of our customers Sending you information about our Company or our website Sending messages to clients of our Company that pertain to various business functions such as those related to payments or changes in service Reducing and addressing instances of fraud and protecting both you and the Company In general, we do not sell, trade, rent or otherwise share your Personal Information with third parties without your consent. We may share your Personal Information with vendors and other third-party providers who are performing services for the Company. In general, the vendors and third-party providers used by us will only collect, use and disclose your information to the extent necessary to allow them to perform the services they provide for the Company. For example, when you provide us with personal information to complete a transaction, verify your credit card, place an order, arrange for a delivery, or return a purchase, you consent to our collecting and using such personal information for that specific purpose, including by transmitting such information to our vendors (and their service providers) performing these services for the Company. However, certain third-party service providers, such as payment processors, have their own privacy policies in respect of the information that we are required to provide to them in order to use their services. For these third-party service providers, we recommend that you read their privacy policies so that you can understand the manner in which your Personal Information will be handled by such providers. In addition, we may disclose your Personal Information if required to do so by law or if you violate our Terms of Use. Non-Personal Information: In general, we use Non-Personal Information to help us improve the website and customize the user experience. We also aggregate Non-Personal Information in order to track trends and analyze use patterns of the website. This Privacy Policy does not limit in any way our use or disclosure of Non-Personal Information and we reserve the right to use and disclose such Non-Personal Information to our partners, advertisers and other third parties at our sole discretion. IV. HOW WE PROTECT INFORMATION We implement reasonable precautions and follow industry best practices in order to protect your Personal Information and ensure that such Personal Information is not accessed, disclosed, altered or destroyed. However, these measures do not guarantee that your information will not be accessed, disclosed, altered or destroyed by breach of such precautions. By using our website, you acknowledge that you understand and agree to assume these risks. V. YOUR RIGHTS REGARDING THE USE OF YOUR PERSONAL INFORMATION whenever you are asked to fill in a form on the website, look for the box that you can click to indicate that you want the information to be used for direct marketing purposes and leave it unchecked if you have previously agreed to us using your personal information for direct marketing purposes, you may change your mind at any time by writing to or emailing us VI. HOSTING Our website is hosted by InMotion Hosting, Inc. InMotion Hosting provides us with the online platform that allows us to provide the website to you. Your information, including Personal Information, may be stored through InMotion Hosting servers. By using the website, you consent to InMotion Hosting’s collection, disclosure, storage, and use of your Personal Information in accordance with InMotion Hosting’s privacy policy. VII. LINKS TO OTHER WEBSITES As part of the website, we may provide links to or compatibility with other websites or applications. However, we are not responsible for the privacy practices employed by those websites or the information or content they contain. This Privacy Policy applies solely to information collected by us through the website. Therefore, this Privacy Policy does not apply to your use of a third-party website accessed by selecting a link via our website. To the extent that you access or use the website through or on another website or application, then the privacy policy of that other website or application will apply to your access or use of that site or application. We encourage our users to read the privacy statements of other websites before proceeding to use them. VIII. AGE OF CONSENT By using the website, you represent that you are at least 18 years of age. IX. CHANGES TO OUR PRIVACY POLICY The Company reserves the right to change this Privacy Policy and our Terms of Use at any time. If we decide to change this Privacy Policy, we will post these changes on this page so that you are always aware of what information we collect, how we use it, and under what circumstances we disclose it. Any such modifications become effective upon your continued access to and/or use of the website five (5) days after we first post the changes on the website or otherwise provide you with notice of such modifications. It is your sole responsibility to check this website from time to time to view any such changes to the terms of this Privacy Policy. If you do not agree to any changes, if and when such changes may be made to this Privacy Policy, you must cease access to this website. If you have provided your email address to us, you give us permission to email you for the purpose of notification as described in this Privacy Policy. X. MERGER OR ACQUISITION In the event we undergo a business transaction such as a merger, acquisition by another company, or sale of all or a portion of our assets, your Personal Information may be among the assets transferred. You acknowledge and consent that such transfers may occur and are permitted by this Privacy Policy, and that any acquirer of our assets may continue to process your Personal Information as set forth in this Privacy Policy. If our information practices change at any time in the future, we will post the policy changes here so that you may opt out of the new information practices. We suggest that you check this Privacy Policy periodically if you are concerned about how your information is used. XI. CONTACT US & WITHDRAWING CONSENT If you have any questions regarding this Privacy Policy or the practices of this Site, or wish to withdraw your consent for the continued collection, use or disclosure of your Personal Information, please contact us by sending an email to us. XII. Last Updated This Privacy Policy was last updated on Monday, May 21, 2018.
cc/2019-30/en_head_0021.json.gz/line1731891
__label__wiki
0.823081
0.823081
Ryan Costello & Brad Schneider Compare the voting records of Ryan Costello and Brad Schneider in 2017-18. Ryan Costello Represented Pennsylvania's 6th Congressional District. This is his 2nd term in the House. Brad Schneider Represented Illinois's 10th Congressional District. This is his 1st term in the House. Ryan Costello and Brad Schneider are from different parties and disagreed on 53 percent of votes in the 115th Congress (2017-18). Nov. 16, 2018 — Manage our Wolves Act July 11, 2018 — Strengthening Fishing Communities and Increasing Flexibility in Fisheries Management Act March 15, 2018 — Regulation At Improvement Act of 2017 March 14, 2018 — Taking Account of Institutions with Low Operation Risk Act of 2017 or the TAILOR Act of 2017 Feb. 15, 2018 — ADA Education and Reform Act of 2017 Jan. 18, 2018 — Home Mortgage Disclosure Adjustment Act Dec. 21, 2017 — Department of Homeland Security Blue Campaign Authorization Act of 2017 Dec. 6, 2017 — Concealed Carry Reciprocity Act of 2017 Nov. 30, 2017 — Minnesota’s Economic Rights in the Superior National Forest Act Nov. 1, 2017 — Resilient Federal Forests Act of 2017 June 28, 2017 — Protecting Access to Care Act March 30, 2017 — EPA Science Advisory Board Reform Act of 2017 March 29, 2017 — Honest and Open New EPA Science Treatment Act Feb. 3, 2017 — Providing for congressional disapproval under chapter 8 of title 5, United States Code, of the final rule of the Bureau of Land Management relating to “Waste Prevention, Production Subject to Royalties, and Resource Conservation” Sept. 6, 2018 — DeGette of Colorado Part B Amendment No. 2 July 24, 2018 — Providing for consideration of H.R. 6199, the Restoring Access to Medication and Modernizing Health Savings Accounts Act of 2018; providing for proceedings during the period from July 27, 2018, through September 3, 2018 July 18, 2018 — McHenry of North Carolina Amendment No. 87 July 18, 2018 — Gosar of Arizona Amendment No. 63 July 18, 2018 — Pearce of New Mexico Amendment No. 60 July 18, 2018 — Gallego of Arizona Amendment No. 51 July 18, 2018 — Lamborn of Colorado Amendment No. 49 July 18, 2018 — Adams of North Carolina Amendment No. 29 July 12, 2018 — Providing for consideration of the bill (H.R. 6237) to authorize appropriations for fiscal years 2018 and 2019 for intelligence and intelligence-related activities of the United States Government, Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes June 27, 2018 — Providing for further consideration of the bill (H.R. 6157) making appropriations for the Department of Defense for the fiscal year ending September 30, 2019, and for other purposes, and providing for proceedings during the period from June 29, 2018, through July 9, 2018 June 20, 2018 — Providing for consideration of the bill (H.R. 6) Substance Use-Disorder Prevention that Promotes Opioid Recovery and Treatment for Patients and Communities Act;providing for consideration of the bill (H.R. 5797) IMD CARE Act;providing for consideration of the bill (H.R. 6082) Overdose Prevention and Patient Safety Act June 13, 2018 — Providing for consideration of the bill (H.R. 2851) Stop the Importation and Trafficking of Synthetic Analogues Act; providing for consideration of the bill (H.R. 5735) THRIVE Act; and providing for consideration of (H.R. 5788) Securing the International Mail Against Opioids Act June 7, 2018 — Tsongas of Massachusetts Part B Amendment No. 13 May 23, 2018 — Providing for consideration of the bill (H.R. 5515) National Defense Authorization Act for Fiscal Year 2019, and for providing for proceedings during the period from May 25, 2018, through June 4, 2018 May 22, 2018 — Providing for consideration of H.R. 5515, NDAA FY, 2019; providing for consideration of S. 204, Trickett Wendler, Frank Mongiello, Jordan McLinn, and Matthew Bellina Right to Try Act of 2017, and providing for consideration of S. 2155, the Economic Growth, Regulatory Relief, and Consumer Protection Act May 17, 2018 — Westerman of Arkansas Part C Amendment No. 13 May 17, 2018 — Faso of New York Amendment No. 13 May 9, 2018 — Providing for consideration of the bill (H.R. 3053) to amend the Nuclear Waste Policy Act of 1982, and for other purposes March 15, 2018 — Providing for consideration of H.R. 4061, the Financial Stability Oversight Council Improvement Act of 2017; and providing for consideration of H.R. 4293, the Stress Test Improvement Act of 2017 March 14, 2018 — Providing for consideration of H.R. 4545, the Financial Institutions Examination Fairness and Reform Act; H.R. 1116, the TAILOR Act of 2017; and H.R. 4263, the Regulation At Improvement Act of 2017 Feb. 27, 2018 — Providing for consideration of the bill (H.R. 4296) to place requirements on operational risk capital requirements for banking organizations established by an appropriate Federal banking agency, and providing for consideration of the bill (H.R. 4607) the Comprehensive Regulatory Review Act Feb. 15, 2018 — Langevin of Rhode Island Part A Amendment No. 2 Feb. 6, 2018 — Providing for consideration of the Senate amendment to the bill (H.R. 1892) to amend title 4, United States Code, to provide for the flying of the flag at half-staff in the event of the death of a first responder in the line of duty Jan. 30, 2018 — Providing for consideration of the Senate amendments to H.R. 695, the Child Protection Improvements Act of 2017 Jan. 20, 2018 — Waiving a Requirement of Clause 6(A) of Rule XIII with Respect to Consideration of Certain Resolutions Reported from the Committee on Rules, and Providing for Consideration of Motions to Suspend the Rules On Ordering a Call of the House Jan. 10, 2018 — Providing for consideration of the bill (S. 139) to implement the use of Rapid DNA instruments to inform decisions about pretrial release or detention and their conditions, to solve and prevent violent crimes and other crimes, to exonerate the innocent, to prevent DNA analysis backlongs, and for other purposes Dec. 13, 2017 — Providing for consideration of H.R. 2396, the Privacy Notification Technical Clarifications Act; and providing for consideration of H.R. 4015, the Corporate Governance Reform and Transparency Act of 2017 Dec. 13, 2017 — Providing for consideration of H.R. 1638, the Iranian Leadership Asset Transparency Act; and providing for consideration of H.R. 4324, the Strengthening Oversight of Iran’s Access to Finance Act Nov. 1, 2017 — O’Halleran of Arizona Amendment No. 3 Oct. 5, 2017 — Establishing the congressional budget for the United States Government for fiscal year 2018 and setting forth the appropriate budgetary levels for fiscal years 2019 through 2027 Sept. 14, 2017 — Huizenga of Michigan Amendment No. 207 Sept. 14, 2017 — Palmer of Alabama Amendment No. 192 Sept. 13, 2017 — Courtney of Connecticut Amendment No. 164 Sept. 13, 2017 — Flores of Texas Amendment No. 124 Sept. 13, 2017 — Mullin of Oklahoma Amendment No. 74 Sept. 8, 2017 — Pearce of New Mexico Amendment No. 63 Sept. 7, 2017 — Young of Alaska Amendment No. 43 Sept. 7, 2017 — Lowenthal of California Amendment No. 39 Sept. 7, 2017 — Grijalva of Arizona Amendment No. 18 Sept. 7, 2017 — Grijalva of Arizona Amendment No. 2 July 14, 2017 — Franks of Arizona Amendment No. 13 July 13, 2017 — Hartzler of Missouri Amendment No. 10 July 13, 2017 — Buck of Colorado Amendment No. 3 July 13, 2017 — Rogers of Alabama Part B Amendment No. 88 June 22, 2017 — Providing for consideration of the bill (H.R. 2842) to provide for the conduct of demonstration projects to test the effectiveness of subsidized employment for TANF recipients, and providing for consideration of motions to suspend the rules. June 21, 2017 — Carbajal of California Part A Amendment No. 1 May 24, 2017 — Huffman of California Amendment No. 2 May 24, 2017 — Esty of Connecticut Amendment No. 1 May 3, 2017 — Providing for consideration of the Senate amendments to the bill (H.R. 244) to encourage effective, voluntary investments to recruit, employ, and retain men and women who have served in the United States military with annual Federal awards to employers recognizing such efforts, and for other purposes April 26, 2017 — Providing for consideration of the bill (H.R. 1695) to amend title 17, United States Code, to provide additional responsibilities for the Register of Copyrights, and for other purposes April 5, 2017 — Providing for consideration of H.R. 1219, Supporting America’s Innovators Act of 2017 April 4, 2017 — Providing for consideration of H.R. 1343, the Encouraging Employee Ownership Act of 2017 Jan. 11, 2017 — Peterson of Minnesota Part A Amendment No. 5 Jan. 10, 2017 — Clay of Missouri Part B Amendment No. 2 Jan. 10, 2017 — Velazquez of New York Part B Amendment No. 1
cc/2019-30/en_head_0021.json.gz/line1731898
__label__cc
0.584999
0.415001
Lloyd Smucker & Sheila Jackson Lee Compare the voting records of Lloyd Smucker and Sheila Jackson Lee in 2017-18. Lloyd Smucker Represented Pennsylvania's 16th Congressional District. This is his 1st term in the House. Sheila Jackson Lee Represented Texas's 18th Congressional District. This is her 12th term in the House. Lloyd Smucker and Sheila Jackson Lee are from different parties and disagreed on 69 percent of votes in the 115th Congress (2017-18). Sept. 6, 2018 — Ensuring Small Scale LNG Certainty and Access Act July 19, 2017 — Promoting Cross-Border Energy Infrastructure Act Feb. 14, 2017 — Red River Gradient Boundary Survey Act May 23, 2018 — Garamendi of California Amendment No. 5 July 14, 2017 — Byrne of Alabama Amendment No. 17 Feb. 28, 2017 — Krishnamoorthi of Illinois Amendment No. 6 Jan. 5, 2017 — King of Iowa Amendment No. 12 Jan. 5, 2017 — Grijalva of Arizona Amendment No. 3
cc/2019-30/en_head_0021.json.gz/line1731903
__label__cc
0.649769
0.350231
Pat Tiberi & Billy Long Compare the voting records of Pat Tiberi and Billy Long in 2017-18. Pat Tiberi Represented Ohio's 12th Congressional District. This is his 9th term in the House. Billy Long Represented Missouri's 7th Congressional District. This is his 4th term in the House. Pat Tiberi and Billy Long are from the same party and agreed on 94 percent of votes in the 115th Congress (2017-18). But they didn't always agree. Out of 569 votes in the 115th Congress, they disagreed on 32 votes, including 3 major votes. Sept. 7, 2017 — Austin Scott of Georgia Part B Amendment No. 92 Sept. 6, 2017 — Smith of Missouri Part B Amendment No. 56 March 2, 2017 — Jackson Lee of Texas Part A Amendment No. 3
cc/2019-30/en_head_0021.json.gz/line1731904
__label__wiki
0.521712
0.521712
Water in a changing coastal environment Sep 27, 2018 | Conservation, Environment, Land, University of Delaware, Water National Science Foundation awards $19.2 million to statewide EPSCoR consortium An estimated 40 percent of the world’s population resides within roughly 60 miles of a coast. Delaware has a rich coastal environment with 381 miles of tidal shoreline, including 24 miles of ocean coastline and approximately 90,000 acres of tidal wetlands. Coastal regions throughout the world have entered a critical period when multiple pressures threaten water security, which the United Nations defines as society’s capacity to safeguard adequate, sustainable quantities of high-quality water. A new five-year, $19.2 million Research Infrastructure Improvement (RII) grant from the National Science Foundation’s Established Program to Stimulate Competitive Research (EPSCoR) will help Delaware develop solutions to water issues related to human, economic and ecosystem health. In addition to the federal award, the state of Delaware has committed $3.8 million in support of this initiative. “We are bringing people together to create actionable solutions that will have a positive impact on Delawareans, while providing transformative research, educational and career preparation experiences for students of all levels,” said Charlie Riordan, vice president for research, scholarship and innovation at UD. EPSCoR is a congressionally mandated federal program to help states develop their research initiatives and institutions. In Delaware, the EPSCoR program currently focuses on enhancing environmental science, engineering, social science and policy research in support of the state’s goal of achieving a sustainable environment and a prosperous economy. This is the fourth RII grant for the statewide consortium, which includes four Delaware higher education institutions: Delaware State University, Delaware Technical Community College, the University of Delaware and Wesley College. “As a coastal state with significant agricultural and tourism industries, Delaware is the perfect place to address the interdisciplinary challenges of balancing the needs of the environment, the economy and our communities,” said University of Delaware President Dennis Assanis. “Not only will this funding help us develop solutions to local problems, but it will also make Delaware a national leader and a model for the world.” “Water security is a serious issue facing society. We are bringing people together to create actionable solutions that will have a positive impact on Delawareans, while providing transformative research, educational and career preparation experiences for students of all levels,” said Charlie Riordan, vice president for research, scholarship and innovation at UD. “Most problems related to water security are consequences of human activities and, inevitably, solutions involve behavioral change,” said Kent Messer, the project director and the S. Hallock du Pont Professor of Applied Economics for the Environment in UD’s College of Agriculture and Natural Resources. A major component of the grant will focus on behavioral science and developing decision-support tools, early warning systems and other evidence-based solutions that decision-makers can use to inform policy and encourage adoption of environmentally oriented behavior. In the Wilmington community of Southbridge, for example, a previous EPSCoR-funded social science study bolstered residents’ confidence about the quality of their drinking water by enabling researchers to work with community members to collect and analyze tap water samples and provide evidence-based data from both home test kits and professional labs that the tap water was safe to drink. A subsequent study revealed that this water quality information significantly improved residents’ trust in their water supply, saving them the expense of bottled water. The threat of salinization A key threat to water security in our region is salinization, or the accumulation of excess salts in soil, which degrades water quality. Delaware’s long tidal shoreline and low elevation renders its waters vulnerable to salinization, which can be exacerbated by sea level rise and the extraction of groundwater for use by industry, agriculture and municipalities. This problem is increasingly recognized in Delaware, where high salinity, or salt content, already has caused some agricultural lands to become unusable and has prompted the installation of new wells for monitoring and measuring saltwater intrusion in some coastal municipalities. In addition to focusing on the salinization threat, the grant also leverages UD’s growing presence in interdisciplinary data science and environmental research to: Develop ultrasensitive smart sensors for monitoring and characterizing how nutrients, such as nitrogen and phosphorous, and particles are transported through Delaware rivers, ponds, streams and marshes, as well as the sources and fates of these nutrients and their effect on plants. Address information gaps about the microbial communities that help maintain the healthy function of our coastal ecosystems and how these communities change with salinization or excess nutrients. Use the emerging technology of big-data analytics to link science and social decision-making, and to potentially reveal previously hidden hurdles to sustainable societal change. “This new project builds on the successful statewide network of partnerships we have built over the past years to address the significant issue of water quality and sustainability, which impacts not only Delaware but many parts of the world,” said Delaware EPSCoR Director Don Sparks, the Unidel S. Hallock du Pont Chair of Plant and Soil Sciences and director of the Delaware Environmental Institute. Digitally defending our infrastructure An emerging area of concern for water utilities is the digital defense of infrastructure, both from a contamination and from a cybersecurity standpoint. A partnership with the U.S. Army’s Communications, Electronic, Research and Development Center, Intelligence and Information Warfare Directorate (CERDEC-I2 WD) will integrate military-grade data science and machine learning capabilities to enhance existing water security decision support tools for resource managers, policymakers and researchers. It also will enable training of students in the emerging data science and big-data analytics fields, providing Delaware and the surrounding region a pool of capable environmental informatics and cybersecurity professionals. In complementary work, UD will partner with Tidewater Utilities, Inc., the largest private water supplier south of the Chesapeake and Delaware Canal, to develop a cybersecurity awareness program to educate utility company employees about potential cyber threats and security issues. According to Tidewater President Gerard L. Esposito, cybersecurity is one of the biggest risks facing today’s utility companies, which increasingly rely on technology to support business operations. Developing an awareness program that is flexible, scalable and adoptable at any level, he said, will go a long way toward providing a blueprint for Tidewater and other companies, both locally and regionally. “Utilities are not prepared to balance this risk while delivering on operational goals like increased efficiencies,” Esposito said. “Constant user engagement and training is the key to keeping our systems safe and having a robust cyber awareness program is a big step toward accomplishing this goal.” Continuing to build the future workforce of scientists, engineers and entrepreneurs trained to meet these growing challenges is necessary, too. Education and training opportunities throughout the five-year project will enable nearly 700 graduate, undergraduate and high school students to gain on-the-job experience working alongside over 60 faculty and post-doctoral researchers. A proven track record that goes beyond statistics Delaware was designated an EPSCoR state in January 2003 and awarded its first EPSCoR RII grant in 2005. To date, Delaware’s NSF EPSCoR program has resulted in $69 million in direct EPSCoR funding to the state and $46 million through leveraged EPSCoR funds and 143 additional research awards to EPSCoR faculty. Additionally, this work has led to over 900 published journal articles, 75 faculty and student submitted invention disclosures, 11 patents and eight faculty-led start-ups, as a result of direct or indirect funding by EPSCoR. But the true impact of the work runs deeper than statistics. It is woven into the fabric of the partnerships created across and outside the state by collaborators, the local projects and models developed locally that also can be applied globally, and the training opportunities provided for students who will become our future citizens and decision-makers. Support from the previous EPSCoR funding allowed Wesley College to change the institution’s academic curriculum to incorporate research in a first-year undergraduate experience for all incoming students. This important action improved student retention and four-year graduation rates of its students and led to the development of Wesley’s Undergraduate Research Center for Analytics, Talent and Success. Student retention rates in STEM majors at Wesley have increased by 22 percent since 2010, from 46 percent in 2010-2013 to 68 percent in 2014-2018. Additionally, all of Wesley’s EPSCoR STEM majors graduated and were placed in STEM fields between 2010-2013. Across the state, the University of Delaware’s Spin In program paired teams of University undergraduate students with early-stage startups to apply experientially what they’re learning to real-life situations that entrepreneurs encounter. Students from a range of disciplines were coached and integrated into product development teams charged with solving business challenges facing these early-stage startups. To date, more than 175 students have engaged in 25 projects that have led to the launch of seven new products and four new business startups, with a dozen students landing job offers. Article by Karen B. Roberts | Photos by Doug White, Kathy F. Atkinson and Evan Krape | September 26, 2018 Project WiCCED Network in Action May 2019 Two Wesley Undergrads Win National Chemistry Awards UD Flexes its research muscle on Capitol Hill TRAINING ETHICAL HACKERS: Computer engineering students hone their skills at cybersecurity competitions and hackathons Project WiCCED does not and shall not discriminate on the basis of race, color, religion (creed), gender, gender expression, age, national origin (ancestry), disability, marital status, sexual orientation, or military status, in any of its activities or operations. These activities include, but are not limited to, hiring and firing of staff, selection of volunteers and vendors, and provision of services. We are committed to providing an inclusive and welcoming environment for all members of our community. Delaware EPSCoR Improving Delaware's Environment and Economy through Research and Education Project WiCCED | WATER in the CHANGING COASTAL ENVIRONMENT of DELAWARE
cc/2019-30/en_head_0021.json.gz/line1731906
__label__cc
0.696067
0.303933
Risk + Prevention Tips + Tools THE "NEW" PROSTATE CANCER INFOLINK Follow The "New" Prostate Cancer InfoLink news blog on TWITTER or FACEBOOK. The "New" Prostate Cancer InfoLink has been developed to become a primary source of accurate, current, and topical information about prostate cancer for patients and their families. Prostate Cancer International. Other PCI web sites El Cáncer de Próstata Latinoamérica Prostate Cancer Africa Prostate Cancer Caribbean Solidarité Prostate InfoLink Copyright © 2008-18 Prostate Cancer International, Inc. PCaI appoints new Medical Director Posted on December 4, 2018 by Sitemaster This morning, Prostate Cancer International (PCaI) announced the appointment of Michael B. Williams, MD, as its Medical Director and as a member of the Board of Directors of the foundation. The complete media release reads as follows: Virginia Beach, VA, December 3, 2018 – Prostate Cancer International is pleased to announce that Michael B. Williams, MD, has accepted an invitation to join the Board of Directors of the foundation and act as its Medical Director Dr. Williams received his MD degree from the University of Texas Health Sciences Center, in San Antonio, TX. He then completed his residency training in urology at Eastern Virginia Medical School in Norfolk, VA. After completing his fellowship in urologic oncology at the M. D. Anderson Cancer Center, in Houston, TX, he returned to Virginia Beach, VA, where he is currently an Associate Professor in the Department of Urology, Eastern Virginia Medical School, and a member of the staff of Urology of Virginia, working within the Paul F. Schellhammer Cancer Center. Dr. Williams is a member of the Society of Urologic Oncology (SUO), the American Society of Clinical Oncology (ASCO), the American Association of Clinical Urologists (AACU), and the American Urological Association (AUA). “We are delighted that Dr. Williams has agreed to join the Board of Directors of Prostate Cancer International, “ stated Mike Scott, a co-founder and president of the foundation. “He was recently kind enough to participate as a speaker at one of our patient education conferences in Virginia Beach. Importantly, he has a strong commitment to ensuring that patients diagnosed with prostate cancer are made aware of the risks and the benefits of the full spectrum of clinical options that are now available for the management of this common form of cancer in men. We look forward to being able to take advantage of his knowledge, experience, and commitment to high-quality patient education.” About Prostate Cancer International Prostate Cancer International (PCaI) is a not-for-profit 501(c)(3) organization based in Virginia Beach, VA. It is primarily focused on providing information and educational resources for men with or at risk for prostate cancer and their families. Its mission is to transform global understanding of the risks associated with prostate cancer and the strategies available to manage those risks until prevention is possible and a cure can be found. PCaI would also like to thank Dr. Arnon Krongrad for his participation as the outgoing Medical Director of PCaI. Dr. Krongrad has served in that capacity for the past 10 years, and he will continue to hold a position as a member of the Board of Directors of the foundation. Dr Krongrad was one of the two original co-founders of the foundation. He is now the CEO of Allevion, Inc., and the developer of its innovative surgical services system known as Surgeo. Filed under: About Us | Tagged: cancer, International, Krongrad, PCaI, prostate, Williams | « Does lowering lipid levels really affect risk for prostate cancer and prostate cancer-specific mortality? The development of a “10-minute cancer test”: the Methylscape » maack1, on December 5, 2018 at 10:18 am said: Congratulations and welcome to Dr. Williams, and Thank You to Dr. Krongrad for his development of this website/forum and long service as Medical Director. And while I am providing recognition, a huge Thank You to Mike Scott for his long and invaluable service as our Sitemaster! As an aside, I met my wife to be while strolling on Virginia Beach the summer of 1953 where she and girlfriends from Canton, Ohio, had just arrived on vacation and while I, as a young sailor was stationed with CINCLANTFLT Headquarters in Norfolk. We married April 6th, 1954, then spent the next 23 years on our “honeymoon” traveling to many locations during my subsequent Navy career. Here we are, among those who take marriage seriously, 64 years, 8 months as of tomorrow! Sitemaster, on December 6, 2018 at 8:21 am said: Thank you for the “Thank yous” Chuck. And — also as an aside — you and Mrs Maack now need to buckle down for another 6 years and 7 months to catch up to George and Barbara Bush! PCaI’s ASVSG If you are on or thinking about active surveillance (AS) as a way to manage your low-risk prostate cancer, you may want to join Prostate Cancer International’s Active Surveillance Virtual Support Group. CureTalks on PCa Our most recent CureTalk on Prostate Cancer (on February 21 this year) features Eli Van Allen, MD, of the Broad Institute and the Dana-Farber Cancer Center, talking about the new “Metastatic Prostate Cancer Project” and how you can become part of the solution. For access to the full list of CureTalks on Prostate Cancer, please click here. News and information provided on this site should not be used for diagnosing or treating any health problem or disease. The “New” Prostate Cancer InfoLink is intended for informational purposes only. It is not engaged in rendering medical advice or professional services and is not a substitute for professional care. If you have or suspect you may have a health problem, please consult your healthcare provider. Hot Posts … Geographic risk for advanced and metastatic prostate cancer Early data from the LuPIN trial in men with mCRPC ADT is associated with risk for Alzheimer’s and dementia in largest study to date Patient-reported outcomes and the management of prostate cancer Evidence for dose escalation in adjuvant/salvage radiation The role of nutrition in management of prostate cancer patients on ADT New urine test shows promising results in detecting, classifying risk for prostate cancer Mutations to FOXA1 may be key to some aggressive forms of prostate cancer Genomic data and prostate cancer risk classification: an update Decision aids and prostate cancer: how useful are they? Strategies to maintain sexual function post-treatment for prostate cancer 3-year outcomes of men on AS in US community urology settings Patient satisfaction and the management of localized prostate cancer FDA “fast tracks” ARV-110 for the treatment of mCRPC AS in practice in a specific US community setting … and Archives … and Archives Select Month July 2019 (4) June 2019 (17) May 2019 (14) April 2019 (17) March 2019 (16) February 2019 (16) January 2019 (23) December 2018 (18) November 2018 (11) October 2018 (32) September 2018 (21) August 2018 (21) July 2018 (15) June 2018 (22) May 2018 (12) April 2018 (26) March 2018 (17) February 2018 (19) January 2018 (25) December 2017 (19) November 2017 (21) October 2017 (29) September 2017 (34) August 2017 (27) July 2017 (24) June 2017 (32) May 2017 (32) April 2017 (28) March 2017 (34) February 2017 (16) January 2017 (39) December 2016 (19) November 2016 (24) October 2016 (42) September 2016 (37) August 2016 (25) July 2016 (27) June 2016 (16) May 2016 (28) April 2016 (45) March 2016 (48) February 2016 (46) January 2016 (40) December 2015 (28) November 2015 (40) October 2015 (51) September 2015 (42) August 2015 (33) July 2015 (25) June 2015 (24) May 2015 (29) April 2015 (41) March 2015 (30) February 2015 (17) January 2015 (37) December 2014 (50) November 2014 (41) October 2014 (51) September 2014 (33) August 2014 (39) July 2014 (31) June 2014 (36) May 2014 (33) April 2014 (41) March 2014 (35) February 2014 (31) January 2014 (42) December 2013 (35) November 2013 (22) October 2013 (39) September 2013 (22) August 2013 (37) July 2013 (38) June 2013 (36) May 2013 (41) April 2013 (62) March 2013 (53) February 2013 (51) January 2013 (35) December 2012 (36) November 2012 (25) October 2012 (37) September 2012 (36) August 2012 (49) July 2012 (32) June 2012 (25) May 2012 (48) April 2012 (44) March 2012 (37) February 2012 (42) January 2012 (40) December 2011 (26) November 2011 (42) October 2011 (44) September 2011 (49) August 2011 (57) July 2011 (49) June 2011 (65) May 2011 (60) April 2011 (60) March 2011 (67) February 2011 (49) January 2011 (56) December 2010 (54) November 2010 (59) October 2010 (60) September 2010 (52) August 2010 (47) July 2010 (46) June 2010 (43) May 2010 (52) April 2010 (58) March 2010 (55) February 2010 (32) January 2010 (43) December 2009 (39) November 2009 (46) October 2009 (36) September 2009 (44) August 2009 (41) July 2009 (55) June 2009 (69) May 2009 (71) April 2009 (82) March 2009 (79) February 2009 (76) January 2009 (64) December 2008 (57) November 2008 (44) October 2008 (48) September 2008 (44) August 2008 (35) July 2008 (47) June 2008 (39) May 2008 (36) April 2008 (37) March 2008 (15)
cc/2019-30/en_head_0021.json.gz/line1731909
__label__wiki
0.814315
0.814315
A Y Badayev - Bolsheviks In the Tsarist Duma For revolutionaries who believe that there is a higher form of democracy than that of Bourgeois Parliamentarianism, what to do during elections is the sort of discussion that sparks intense debate. For the Bolsheviks in the years of Tsarist rule it was even more complex because the Russian Parliament, the Duma, existed only as a gesture towards democracy from the Tsar. In this context the Duma was of limited power - but more importantly, it was seen by some on the left as the first stage in the struggle for the capitalist order, rather than the feudalistic Tsarism that prevailed. Lenin's Bolsheviks took a principled position. They tried to win seats in the Duma, in the face of extreme hostility from the ruling class, but not for the reasons most other parties tried to do so. The Bolshevik candidates saw the Duma as an arena were they could in a period when their organisation was illegal, spread propaganda and socialist ideas with a level of immunity. Revolutionary socialist ideas were popular - tens of thousands of workers voted for the Bolshevik candidates, thousands of workplace groups sent messages of support - but it was hard to organise. The Tsar's police force ran an efficient network of spies, newspapers and publications were regularly seized. Socialists, Trade Unionists and activists were regular imprisoned and exiled. But in an era when some were proclaiming that socialism was a future ideal, and the important political task was to win a Bourgeois Parliament like that of the West, the Bolsheviks recognised that they couldn't run the risk of sowing illusions in parliament. The key thing was to use their position to educate, inspire and organise the workers movement. This was made easier by the way that the Duma was stacked against the representatives of the workers movement. Badayev was one of the Bolshevik deputies. His was a background in engineering and he was a longstanding Bolshevik activist. His account is fascinating for many reasons - in part because of his stories about how they evaded the police and how revolutionaries had to organise in an era when simply being discovered with a socialist newspaper could mean years of exile. But the most important parts of the book are those in which he describes how socialists can use parliament, or other elected bodies to raise the workers movement to new heights. Because it was legal to print speeches of the deputies, it meant that organisatins could distribute speeches by socialists. The deputies could become the focus of networks of workers - collecting money for strikes for instance. Take the struggle for the 8 hour working day - a key demand of the workers movement in Russia in the early 1900s. The Duma and the Tsar was never going to grant this - it would have to be won by mass struggles and protests. But the Duma became a part of the battleground. The Bolshevik newspaper Pravda explained: "Of course we do not for a moment expect that the Fourth Duma will pass this bill. The eight-hour days is one of the fundamental demands of the workers in the present period. When this question is raised in the Duma the other parties will be forced to declre their attitude towards it and this will assist in our struggle for the eight-hour day outside the Duma. We appeal to all workers to endorse the bill. Let it be introduced not only in the name of a group of deputies, but in the name of tens of thousands of workers." As Badayev says, "the very failure of the bill could be made the occasion of further revolutionary agitation". The deputies, despite their small numbers were very successful. They were able to strengthen and inspire millions of people across Russia, particularly with the work they did to highlight examples of workplace abuse or inter-workplace solidarity. Raising tens of thousands of rubles for strikes in far off Baku, shows just how much their were successful. The rising revolutionary mood against the Tsar and against capitalism that took place in the pre-war period was curtailed by the outbreak of the patriotism that marked the start of World War One. The Tsar took the opportunity to clamp down on workers organisations, and the Bolshevik deputies were arrested. Even in those difficult times, thousands of workers took action in support of their deputies - a far greater mark of respect than many so called "workers representatives" would get today. For socialists today, there is much to learn from Badayev's book. It isn't intended as a blueprint for organisation today. Nor is it really a guide for elected representatives. But it does show how socialists who do get elected can use their positions to strengthen the movement. It also shows the need for flexibility and organisation fluidity to adapt to changing circumstances. Over a hundred years later, we've much to learn from Badayev and his comrades. Alan Sillitoe - Saturday Night and Sunday Morning Saturday Night and Sunday Morning is a novel whose rage still rings out fifty years after it's first publication. Post war 50s Britain is a bleak place. Rationing has just ended, there are jobs aplenty, but war seems to be always on the horizon. Arthur Seaton is a young man in his mid-twenties. He doesn't think there is a future and his life revolves around the weekend, when he can escape in a blur of alcohol, sex and the occasional outbreak of violence. "For it was Saturday night, the best and bingiest glad-time of the week, one of the fifty-two holidays in the slow-turning Big Wheel of the year, a violent preamble to a prostrate Sabbath. Piled-up passions were exploded on Saturday night, and the effect of a week's monotonous graft in the factory was swilled out of your system in a burst of goodwill." Arthur's inward monologue, his ruminations on life and society carry you along with them, his dull repetitive work at the lathe becoming a metaphor for the weeks and years that stretch ahead. You can see why it caused a stir on its publication. Its brilliant style, combined with the honest portrayal of working class life and the social tensions as a new generation of men and women grow up, determined not to live the restrictive lives of their parents, must have terrified some in the establishment. But Albert's musings on revolution and destruction aren't about a dream of a better world - they're about a violent destruction of the one he hates. As Arthur juggles his affairs, dodging vengeful husbands and finally finding stability, you feel somewhat disappointed. After all, as the novel ends, Albert seems set upon the path of becoming what he despises. Yet this in part is the point. The author is telling us there is no hope. No alternative - only a struggle to survive. As Arthur ruminates at the end; "And trouble for me it'll be, fighting every day until I die. Why do they make soldiers out of us when we're fighting up to the hilt as it is? Fighting with mothers and wives, landlords and gaffers, coppers, army, government. If it's not one thing it's another, apart from the work we have to do and the way we spend our wages. There's bound to be trouble in store for me every day of my life, because trouble it's always been and always will be. Born drunk and married blind, misbegotten into a strange and crazy world, dragged though the dole and into the war with a gas-mask on your clock, and the sirens rattling into you every night while you rot with scabies in an air-raid shelter. Slung into khaki at eighteen, and when they let you out, you sweat again in a factory, grabbing for an extra pint, doing women at the weekend and getting to know whose husbands are on the night-shift, working with rotten guts and an aching spine, and nothing for it but money to drag you back there every Monday morning." But something was changing. Ten years after its first publication, the world exploded as men and women across the globe decided that the world should be different. The anger and frustrations at the system so aptly summed up by Arthur Seaton at his lathe, spilled out into protest, demonstration and near-revolution. Arthur might not have joined those rioting against capitalism in the streets near the Sorbonne, in Grosvenor Square or in a hundred other places - he's far to cynical for that. But he'd have understood their anger and raised a pint to them. Marcus Rediker - Between the Devil and the Deep Blue Sea Marcus Rediker's book is subtitled "Merchant Seamen, Pirates and the Anglo-American Maritime World, 1700-1750". It would seem to be a niche area of interest, but as with his other history writing, Rediker explores far more than the narrowness of his title suggests. The world of the early 18th century was a very different place to the one we inhabit today. Capitalism, has now spreed to every corner of the globe, but then it had only taken deep root in Western Europe and the Eastern Seaboard of the North Americas. Much of the rest of the world was something to be exploited and plundered by the more power Western powers. In this world, shipping was of great importance. For the trading of everything from foodstuffs to slaves, raw materials to emigrants, you needed ships and their crews. Without sailors, ships didn't sail. A fact that sailors understood well and frequently used to their advantage. The world of the sailor was a cruel and vicious one. Captain's had virtually limitless rights to punish and even murder the crew. The law courts appeared to offer an impartial restriction on the violence of the captain, but in reality the courts (and the rest of the state apparatus) sided most often with the interests of capital. In this context, the life of the seaman was an brutal one. It was brutal because of the violence the captain dished out in order to maximise the profits of his voyage. It was brutal because of the constant attempts to undermine the life of the seaman in the interest of further profits - the reduction of rations, the withholding of wages and the fines for the most minor of misdemeanors. It's no surprise that sailors fought back. They cursed their officers, occasionally they struck back and sometimes they mutinied and turned pirate. This review isn't the place to discuss further Rediker's fascinating depiction of pirate life in the early 18th century. Suffice to say Pirates were far from the swashbuckling heroes of our TV screens. They organised a collective lifestyle that is the exact opposite of the hierarchical ship life they had left behind. They had elected officers, accountable to the crew and though feared, the vast numbers of pirates on the seas frequently avoided fighting altogether. The heart of Rediker's book though, is an attempt to explain the changes going on in the world of work, which the sailors were at the forefront of. Seaman, Rediker argues, were the first workers to loose their individual identity in the way that we understand today. They no longer owned their own tools, but had become a small cog in a collective machine. They had no control over the means of production but sold their labour power for the best deal they could get. They were driven together into a collective environment, lorded over by a master whose job was to squeeze every last penny of profit from their sweat. "for all of these men, self-protection - from harsh conditions, excessive work, and oppressive authority - was necessary to survival. Too often... 'all the men in the ship except the master' were 'little better than slaves.' Social bonds among sailors arose from the very conditions and relations of their work. These men possessed a concrete and situational outlook forged within the power relations that guided their lives. Theirs was a collectivism of necessity." And they used their collective power to great effect. "In 1729 the seamen of the Young Prince, when ordered to heave anchor, 'one and all...unanimously agreed to stop & swore Goddamn their Bloods if they would heave the Anchor or go any further with the said Ship but would go on Shore'". Rediker points out that the very world "strike" originates with the sailors who "struck" the sails down and refused to allow a ship to sail. This collective nature of work, as well as the international character of their work, meant that sailors were at the heart of struggles, protest and demonstration along the whole of the Atlantic seaboard. Rediker argues that it isn't to fanciful to suggest that the very notion of "rights" developed as a result of the political input of sailors with their new collective identity to early land-based struggles. So the story of the seamen of the 1700s is the story of class struggle. An emerging class struggle that reflected the changing economic and political landscape. It was a struggle that expressed itself through dancing and songs. Valued sailors were ones who could work, but could also sing and tell tales. Rediker's thoughtful and fascinating book is important because it allows us to further understand the blood and violence from whence our modern system was born. But it also reminds us that people always resisted the arrival of capitalism, and all it's most dehumanising aspects, and fought for a different type of world. Readers might be interested in this video of a speech on Pirates by Marcus Rediker to the Bristol Radical History Group. Rediker - Villains of all Nations: Atlantic Pirates in the Golden Age Rediker and Linebaugh - The Many Headed Hydra Labels: marxism, modern history Sembène Ousmane - God's Bits of Wood There are many reasons why socialists support strikes. The most obvious of them is that they are the best way that workers can use their power to win changes and improvements to their lives. But there is a more important reason. Anyone engaging in collective action changes themselves. The old ways no longer seem right. Attitudes and beliefs are shaken, changed and sometimes discarded. The belief in your own class and its ability to organise is strengthened. In the biggest strikes, the very fabric of society is threatened. As Marx put it, in a slightly different context, "All that is solid, melts into air". It is because he understands this aspect of the struggle that Sembène Ousmane's great novel is so powerful and engaging. Centering on the great strike of the workers on the Dakar-Niger railway in the late 1940s, Ousmane describes the way in which the workers are driven to strike and how they change. The strike is marked by bloodshed as the authorities resort to brutal force on the very first day. The workers seem to expect it, this is after all, colonial Africa and the European powers' rule has always been marked by violence. Ousmane doesn't dwell on the racism and horrors though - he was writing for an African readership after all. But he concentrates on the way the strikes and their families are. So the strike is marked by rumour and gossip. As the days become weeks, families have sold everything they have and food and water is in short supply. But suffering is collective. Those who don't strike aren't simply ignored, they are almost incomprehensible to those fighting for their livelihoods. At the heart of the story is the way that the role of women changes. From being second class citizens they become at first the breadwinners - trying to find ways to feed the family, to powerful fighters on their own. These changes bring their own problems. Turning your world upside down like this doesn't please everyone. Not least the religious leaders who argue that the strike, being the work of communists, must be ended. But its the women who take centre stage. Whose own action sets the scene for the final confrontation of the story. At the novel's end, the women are changed forever, and they know it. But so are the men, and so is the community. One of the strikes leaders argues that this is a class war. A battle between exploiter and exploited. One where skin colour is only important because the whites are the ruling class. Workers everywhere have shown solidarity, even from France, to the strikers' surprise. The collective understanding and developing identity is important. Senegal was starting down the road to independence as the events described are happening. This development of an identify forged in struggle is important for Ousmane, writing as he was on the eve of independence. Few books come close to showing what a strike is like for those taking part. Even fewer come close to allowing us to sense the real power of working men and women. Labels: fiction, socialist Marcus Rediker - Between the Devil and the Deep Bl...
cc/2019-30/en_head_0021.json.gz/line1731913
__label__cc
0.635344
0.364656
Home News UNFPA's vision and agenda 2030 UNFPA's vision and agenda 2030 Imagine a world where every pregnancy is wanted every childbirth is safe and every young person's potential is fulfilled This is the world we are striving to realize. Our goal is to achieve universal access to sexual and reproductive health, realize reproductive rights, and reduce maternal mortality to accelerate progress on the agenda of the Programme of Action of the International Conference on Population and Development (ICPD), to improve the lives of women, adolescents and youth, enabled by population dynamics, human rights and gender equality. Our new strategic plan is designed to drive the ambitions and goals of the ICPD and 2030 agendas. Achieving universal access to sexual and reproductive health and reproductive rights of women and young people will transform our future. Rooted in fundamental human rights and serving as a powerful development accelerator, sexual and reproductive health and rights benefits individuals, communities, and nations. Investing in women's sexual and reproductive health and rights is one of the best investments in international development. When a woman can plan her pregnancy, she can plan her future. Her prospects increase for completing education and securing an income. Her children are more likely to be healthy and educated, and poverty is less likely to be transferred to the next generation. Realizing Global Goals by 2030 In 2015, world leaders agreed to 17 global goals to advance sustainable development. The Sustainable Development Goals (SDGs) are integrated and indivisible, and provide a global framework for partnership and action. The work of UNFPA contributes to the achievement of the SDGs. Realizing these goals by 2030 requires a strategic shift in how we design and implement programmes, and how we measure impact. Click to view the interactive report Statement by UNFPA on U.S. Decision to Withhold Funding State of World Population 2017 Right now, the combined wealth of the world’s 2,473 billionaires, as calculated by... WCARO 2016 ANNUAL REPORT SUMMARY The message is clear.We must put young people first if we are to harness the...
cc/2019-30/en_head_0021.json.gz/line1731914
__label__wiki
0.573672
0.573672
« Michigan Supreme Court Releases Report on Problem Solving Courts | Main | Michigan Supreme Court Issues Order Governing Motion Practice at the Court of Claims » In Memoriam: Hon Cornelia G. Kennedy The Honorable Cornelia G. Kennedy, the first woman appointed federal judge in Detroit, passed away on Monday at her home in Grosse Pointe Woods at the age of 90. Judge Kennedy was born in Detroit on August 4, 1923. She earned a Bachelor of Arts and her law degree from the University of Michigan. She subsequently clerked for the Honorable Harold W. Stephens, Chief Judge of the United States Court of Appeals for the District of Columbia Circuit. She was the first woman to clerk for that court. After 20 years in private practice in Detroit, she was elected to the Wayne County (Michigan) Circuit Court. In 1970 President Richard M. Nixon appointed her to the United States District Court for the Eastern District of Michigan. She was the first woman to sit on that court, and in 1977 she became the first female chief judge of a federal district court in the United States. She was elevated to the United States Court of Appeals for the Sixth Circuit by President Jimmy Carter in 1979. She was the second woman to sit on that court, and held that position until her retirement on June 30, 2012. Judge Kennedy and her sister, the Honorable Margaret G. Schaeffer, were the first sister judges in the United States. Judge Schaeffer sat on the 47th District Court in Farmington Hills, Michigan from 1974-1992. Judge Kennedy is survived by her son and daughter-in-law, Charles S. and Angela Kennedy; her grandchildren, Elizabeth and Matthew; her sister, Dr. Christine G. Gram; and 28 nieces and nephews. A memorial service will be held on Friday, June 27, 2014 at 11:00 a.m. at Grosse Pointe Congregational Church. A luncheon will follow. In lieu of flowers, memorial contributions may be sent to The Honorable Cornelia G. Kennedy Scholarship, c/o Alexandra Haddad, University of Michigan Law School, 701 S. State St., Suite 4000, Ann Arbor, MI 48109. For more detail, please visit http://www.verheyden.org/book-of-memories/1867695/Kennedy-The- Posted by State Bar of Michigan Blogs at 03:35 PM in In Memoriam | Permalink
cc/2019-30/en_head_0021.json.gz/line1731917
__label__wiki
0.758051
0.758051
Kevin Smith Teases His Next Episodes of Supergirl & The Flash by Joe Deckelmeier in Comic-Con, SR Originals Director Kevin Smith's contributions to the pop culture and comic book lexicon are nothing short of legendary. He is most known for the creation of Jay and Silent Bob, the stoner duo that first debuted in Smith's film Clerks. He would come to expand on these characters in his films Mallrats, Chasing Amy, Dogma, and Jay and Silent Bob Strike Back. Although he's most known for Jay and Silent Bob, Kevin Smith's work in the comic book realm cannot be ignored. In recent years Kevin has stepped into The CW's Arrowverse, directing episodes of Supergirl and The Flash. He has also written comics for characters like Daredevil and Batman. Screen Rant got a chance to chat with Kevin Smith at New York Comic Con 2017, where we discussed whether or not Mallrats 2 was happening, his work on The CW's Arrowverse, and what he thinks about the standalone Joker movie that is in the works. SR: I am here with the legendary Kevin Smith. How are you, sir? Kevin Smith: So good. I appreciate the “legendary” comment; makes me feel good. SR: Well, you are a legend. Kevin Smith: I don’t know. You know what, you may be right as much as, like, it’s all fiction. Lotta tall tales, making up a guy’s story. But I’m happy to be here, man. New York Comic Con again; I been going almost every year since this thing started out here. SR: It’s my first time in New York, and I love it. Kevin Smith: You’ve never been here before? SR: Never. Kevin Smith: My Lord, it’s confusing as Hell, isn’t it? SR: It is, but I love it. Kevin Smith: Here’s the thing you gotta remember: it’s a grid. Everything’s a grid. So basically, your avenues, 1st, 2nd, 3rd, 4th go this way, and then one, two, all the way up to like 200 goes that way. SR: I only got you for like five minutes, man. Kevin Smith: [laughs] I’m trying to give useful information. SR: [laughs] I’m just joking. So, Mallrats? Kevin Smith: Yes. SR: Spinoff? Reboot? Kevin Smith: Dead. SR: Dead? Kevin Smith: Yeah, as reported elsewhere, but maybe these cats don’t care about Kevin Smith anymore. But Mallrats 2 originally was a flick that I wanted to do, and then I couldn’t do it cause I didn’t own the rights, Universal did. So instead I got involved in Universal Television, and then went and pitched it to six networks. All six passed. So there’s three networks left to pitch, but I got pretty sad about the whole affair, so I put it to the side, cause I was like, “clearly this is not the time.” Instead, I picked up Jay and SIlent Bob Reboot, which is a sequel to Jay and SIlent Bob Strike Back. I was intending to shoot that in the fall, but now we shoot that in January. Well, we start prepro in January, I imagine we start shooting by February first. SR: That’s good, that’s awesome. I’m excited about that. Kevin Smith: So, Mallrats, dead—or just resting, we’ll see, and Jay and Silent Bob Reboot happening. SR: I’m really stoked about that. Something else that I loved that you’ve done is your work in the Arrowverse, the CW’s Arrowverse. Kevin Smith: Well, let’s use that term “work” very loosely. I’ll be honest with you, I don’t do much on those shows. It’s a privilege and an honor to get to go up there, because I love Supergirl, I love Flash, those are my two faves. So I’ve worked on three episodes of each, “directed”, they gave me credit for directing three episodes—well, two of Flash and one more in January, I’m gonna shoot one in January. SR: You are coming back? Kevin Smith: Going back to Flash. The slowest, fattest man alive directing the fastest man alive. SR: You know what? I’d love to see Onomatopoeia. Just saying. Kevin Smith: You and me both, and I’ve been saying it for years, but Arrow, they don’t care. [laughs] I guess it’s Marc Guggenheim, he doesn’t care. I talked to him once after a panel at the Paley Center, I was the moderator for the Paley Center CW panel at the Hollywood and Highland complex. And so afterwards, I was talking to Marc, and I was like, “hey man, fans keep saying they want me to direct an episode of [Arrow], I would love that, I wrote Green Arrow.” He knows that. And he goes, “yeah, you know, Arrow is very dark. Legends [of Tomorrow] would be good for you.” [laughs] So, I don’t think they’re ever gonna let me near Arrow, which is totally fine. I love doing Flash and Supergirl, and even though they say I direct, I’ll be honest with you—I’ve said this a zillion times, but I always wanna make it clear because maybe there’s kids in the audience going, “oh, I’ll never be able to direct Supergirl”—yes you can. Oh my God—I don’t know if you will be able to, but you can do it, it’s insanely simple. SR: Can you give me a hint on what kind of—like, what villain you’re doing, what kind of episode you’re doing? Kevin Smith: The Supergirl one, or The Flash? SR: Either, both. Kevin Smith: Flash I haven’t seen a script for, I won’t see that until Christmas, right? Cause that’s January. But the Supergirl episode I did, which was episode five of the new season, didn’t have a comic book villain to speak of. But, you know, of course, that doesn’t—every episode there’s a threat that she’s gotta deal with and stuff, this one’s just not ripped from the pages of the comics. This episode that I did—the first two I did on Supergirl were very space oriented. This one [is] very Earthbound. This season of Supergirl seems to be more grounded. Not that she’s not flying, but just—less space, more Earth. SR: One thing I absolutely—cause I know you’re a huge DC fan— Kevin Smith: Lemme finish, hold on. I don’t direct those episodes; I stand there and they give me credit. But really, that cast and crew, they make that show what? Twenty-two, twenty-three times a year? So I show up, if I’m lucky, twice a year—you think I could tell them anything useful? They got this down to a science. SR: You’re legendary Kevin Smith. Kevin Smith: No. I’ll tell them how to avoid making a movie about a walrus, but other than that there’s not much I can teach them. And the actors and the actresses know exactly what they’re doing with those characters by the time I get up there, they’ve been doing for so many episodes, so many seasons. The DP, the cinematographer, he knows exactly how to shoot that show. I remember the first episode of Flash I did, Kim Miles the DP, he’s a wonderful guy, he’s shooting a movie right now for Bob Zemeckis. So I come in, I go, “hey man, so”—we’re in the cortex, which is the main set where everything takes place, where they all sit around and ponder. I said, “we’ll go through here, come up through here, come up through here.” He goes, “oh my God, totally, we just did that last week in the cortex for episode six, but we’ll totally do it again.” And I was like, “oh, well let’s not do what we did. Alright, so how bout we come through here, and we’ll go up through here.” And he’s like, “we did that episode three this season.” So, it’s tough to tell them anything they haven’t done already. There’s no new ideas, they’ve shot that room a zillion ways to Sunday. So I show up and just be very supportive. I just tell them how much I love the show. I operate as a fan, that’s why I’m saying you can totally direct the show. I don’t know whether they’ll let you, but if you’re a fan that gets you literally halfway there. SR: I love it. Last question for you, I know you’re a huge fan of the DC universe, and currently we’ve had a lot of information coming out. There’s going to be a standalone Joker movie, they’re not all gonna take place in the same universe. I need to know what your thought are about this. Kevin Smith: All of ‘em are good. There’s no such thing as a bad comic book movie. Even the ones that people say are quote-unquote bad are better than no comic book movies. SR: I agree. Kevin Smith: I’m a forty-seven-year-old man, so I grew up in an era where there were no comic book movies. And then every once in awhile you’d get one, and it was like water in a desert. You’d get Batman in 1989, or Blade or something like that. So now, we live in an era where they’re like, “hey, we’re not even gonna do an interconnected DC universe. We’re just gonna let Martin Scorsese produce a flick where Leonardo DiCaprio might play the Joker.” That’s exciting. So, to me, I’m like, the more the merrier. I know they’re deviating from the Marvel template of, like, “we’ll make a bunch of characters, and then a reunion movie. Buncha characters, reunion movie.” Instead, Warner Brothers seems to be going with, “well, we tried that, and we’re gonna keep doing it on the side, but we’re not gonna limit ourselves. We’re gonna do a bunch of other interesting things.” They’re trying to forge their way in the superhero space. So I think it’s interesting, I’m not against that at all. And then you have some people—I’m a purist, so I love when things are interconnected, as well, but I grew up in an era where there was a Batman movie, there was a Superman movie, and they didn’t really reference each other. One time George Clooney was like, “this is why Superman works alone” and we got our nipples hard, we were like, “aaah, they know each other.” So now we live in a world where these movies can cross over and stuff, I’m happy to get the ones that can, but if they don’t cross ‘em over that’s totally okay with me. As long as they’re good, as long as they try. And think about—some people get kinda crappy, like, “come on, man, these cats, they don’t know comic books.” Comic books and characters have been handed to so many creators over the years. You never know what you’re gonna get in the hands of any particular person. I still get crap for making Batman pee his pants in a Batman book once, which is, you know, kind of reducing it to something it wasn’t, but still, regardless, you gotta respect the fact that a creator can come on, maybe take that character [to] a place that you’ve never seen that character be taken. And I gotta imagine, if Martin Scorsese jumps onto a Batman movie, we’re gonna see some shit. Not bad shit, the good shit that we all dream about. Goodfellas in a DC universe movie? I’m there, take all my money. MORE: Kevin Smith's Thoughts On DCEU's Future Tags: the flash, supergirl Green Ranger 2-Pack Joins Hasbro's Power Rangers Lightning Collection More in Comic-Con Batman Beyond Season 4 A Possibility (If Blu-Ray Sales Are Strong) Daniel Alvarez Picard: The First Duty Exhibit May Hint at Future Star Trek Plot Points Johnny Kolasinski
cc/2019-30/en_head_0021.json.gz/line1731924
__label__wiki
0.774205
0.774205
Spider-Man: Homecoming - Uncle Ben's Role Revealed by Chris Agar After witnessing the death of Uncle Ben in both Sam Raimi's original 2002 Spider-Man film and Marc Webb's Amazing Spider-Man reboot in 2012, audiences will not be treated to a third rendition of the tragedy in this summer's Spider-Man: Homecoming. Much like Superman and Batman, Your Friendly Neighborhood's origin is one of the best known in all of comics. The murder of Peter Parker's beloved Uncle Ben (something Peter himself could have stopped) was what spurred the high school student to use his powers for good, and he vowed to be a protector of New York City. The mantra "With great power comes great responsibility" is one of Spider-Man's calling cards, highlighting the importance of being a selfless hero. When Sony and Marvel Studios struck the deal that allowed the web head to become a part of the Marvel Cinematic Universe, it meant a new actor would be stepping into the iconic role. Tom Holland is the third big screen Spider-Man in 15 years, so the filmmakers placed an onus on changing things up a bit to make Homecoming feel fresh. For the character's MCU introduction in Captain America: Civil War, Spider-Man's beginnings were largely bypassed, and Homecoming follows suit. However, that doesn't mean there will not be any reference to Peter's past. In August 2016, Screen Rant visited the set of Spider-Man: Homecoming in Atlanta, where we spoke with co-producer Eric Carroll. One of the topics of conversation was how Ben Parker fit into this new film, but it sounds like he will only be spoken about and not seen: "They talk about that, absolutely. It’s not… it’s not a huge thing that I want to go into too much, but there is an acknowledgment that there was a Ben." As for why the creative team went in this direction, in addition to being repetitive, featuring Uncle Ben again would have run the risk of clashing with the tone director Jon Watts established: "I mean, we’re implying he’s dead. We have not at all, again, gone into trying to change his origin story as far as I have been envisioning it. But we, just again, we thought that to keep this fun, light tone, as soon as they have to have their, like, ‘Let’s remember our dearly departed father figure’ – it derails that a little. And again, what we’re trying to tell is this sort of fun story of the kid who is doing all the wrong things for the right reasons. And once you do that, it stops becoming a sort of sun movie about a kid trying to be a kid. He’s mourning the loss of a parent." Dating back to the San Diego Comic-Con 2016 sizzle reel, many of the marketing materials for Homecoming have highlighted a light-hearted, breezy tone that looks to capture the spirit of being a young kid in a big city. Granted, Sam Raimi was able to balance the seriousness of Ben's death with more colorfully campy moments, but that's still a fine line to walk and can come across as jarring if executed poorly. Director Jon Watts and company had an advantage because just about everyone knows what happened to Peter before he truly became the Spider-Man, so there was no real need to rehash this particular plot point. Making reference to what happened (like in Civil War) should get the job done. It's encouraging that Sony and Marvel are committed to keeping the Homecoming series different, which is also illustrated through their villain selections. The Amazing Spider-Man duology was heavily criticized for simply repeating many of the similar beats of the original trilogy without bringing much new to the table, so this approach is definitely appreciated. Holland would like to do battle against the likes of Venom and Doc Ock at some point, but for now, fans will be treated to things they haven't seen before. NEXT: Why Marvel Is Avoiding Reusing Spider-Man Villains Key Release Dates Guardians of the Galaxy Vol. 2 (2017) release date: May 05, 2017 Black Panther (2018) release date: Feb 16, 2018 Avengers: Infinity War / The Avengers 3 (2018) release date: Apr 27, 2018 The Avengers 4 / Avengers: Endgame (2019) release date: Apr 26, 2019 Captain Marvel (2019) release date: Mar 08, 2019 Ant-Man & The Wasp (2018) release date: Jul 06, 2018 Tags: spider-man homecoming
cc/2019-30/en_head_0021.json.gz/line1731925
__label__cc
0.701761
0.298239
Legislative Update: Week Of 3/6/2018 – 3/8/2018 Last week was the 9th week of the 2018 legislative session. Here are the highlights from the Senate: CAPITAL PUNISHMENT – South Carolina law provides two methods of execution: lethal injection and electrocution. However, the law allows the inmate to select the method, and inmates almost always select lethal injection. Like many states, South Carolina has not been able to purchase the drugs to carry out a lethal injection execution for the last few years because pharmaceutical companies have refused to sell the drugs out of fear of retaliation from death penalty opponents. While South Carolina has not carried out a death sentence since 2011, there are 36 inmates on death row, some of whom are nearing the end of their appeals. Last week the Senate passed S. 872, a bill that would require the Department of Corrections to use electrocution to carry out a death sentence if the inmate selects lethal injection and the necessary drugs are not available. The House of Representatives will now consider the bill. SUDDEN UNEXPECTED INFANT DEATH SYNDROME– The Senate passed S. 891, a bill that would require South Carolina hospitals to offer a video presentation to all new mothers on safe sleep practices and the causes of Sudden Unexpected Infant Death Syndrome. The bill now goes to the House. COMMUNITY SERVICE FOR PROBATIONERS – The Senate passed S. 949, a bill that would give probation officers, local governments, and charitable organizations immunity if a person serving probation is injured while performing community service as a condition of probation. The idea is to encourage more community service by probationers, especially litter pick-up. The House will now consider the bill. COMPOUNDING PHARMACIES – The Senate passed H. 3926, a bill that gives guidance and clarification for pharmacies that compound drugs. The Senate passed the same version as the House, so the bill now goes to Governor McMaster. MITIGATION OF FLOOD DAMAGE – South Carolina currently has a program to help residential property owners mitigate hurricane damage. Last week, the Senate voted to expand that program to flood mitigation, as well, by passing S. 11. The bill now goes to the House. RETIRED EDUCATOR CERTIFICATES – The Senate passed H. 3513, a bill that would allow retired educators to obtain certificates for the purpose of serving as specialized substitute teachers. The bill will now be returned to the House of Representatives to consider Senate changes. RULES FOR ADOPTIONS – The Senate passed H. 3442, a bill that updates the guidelines for adoptions by nonresidents. The bill also would allow South Carolina residents to petition for adoption when the Department of Social Services has temporary custody of a child. The Senate amended this House bill, so the bill will not go back to the House. UNWANTED CONTROLLED SUBSTANCES – The Senate passed S. 755, a bill that would require county sheriffs to offer the general public a drop box to dispose of unwanted controlled substances. The House will now consider the bill. CHILD ADVOCATE – The Senate passed S. 805, a bill that would create a state child advocate within a new Department of Children’s Advocacy. The new department would be responsible for ensuring children receive adequate protection and care from services or programs offered by all state agencies that deal with children. The bill should go to the House this week. CREDIT UNIONS – The Senate passed S. 337 , a bill that would expand opportunities for credit unions to serve communities in South Carolina, especially those communities that are underserved by banking institutions. The bill will now go to the House of Representatives for consideration. GOVERNOR/ LT. GOVERNOR JOINT TICKET – The Senate gave a crucial 2nd reading (all bills require 3 readings or votes) to H.4977, a bill that would establish the framework for the Governor and Lt. Governor running on a joint ticket. Voters approved a constitutional change in 2012 to allow for the top two executives to run as a joint ticket beginning with this year’s election. In previous attempts to set the rules for this year’s election, the House of Representatives has insisted on salary increases for judges and all constitutional officers. This latest version does not deal with pay, so I am hopeful we can finalize the election rules this week. LAST WEEK’S MEETINGS On Tuesday morning, I attended a Code to the Future presentation at Rocky Creek Elementary School in Lexington. The work these elementary students have done on coding, an exciting component of STEM education, is impressive! On Tuesday night, I held a town hall meeting at Lexington High School. On Wednesday, Leadership North Augusta visited the State House. It was a busy day, so I had just a few minutes with the group, but I really appreciate of these young professionals stepping up to make North Augusta an even better place. On Thursday night, I held a town hall at Gilbert High School. On Saturday, I attended the 6th annual Edgefield County Agriculture Day. CONSTITUENT INTEREST TOWN HALL MEETINGS – I held two meetings in Lexington County last week. Here is the schedule for upcoming meetings: Edgefield County Council Chambers Midland Valley High School LBC Middle School Belvedere Elementary School I hope to have meetings scheduled for Saluda and McCormick Counties soon. SPEAKING WITH GROUPS – Several groups, clubs, and classes around our Senate district have invited me to attend their meetings and provide legislative updates. If you would like for me to come speak with your group, please let me know. Email – shanemassey@scsenate.gov Cell Phone – (803) 480-0419
cc/2019-30/en_head_0021.json.gz/line1731931
__label__cc
0.729445
0.270555
Next:COUNTER-TERRORISM: Why al Qaeda Stays Out Of Afghanistan Intelligence: Terrorists Terrified By Malware April 23, 2009: Two years ago, it was revealed that the U.S. FBI (Federal Bureau of Investigation) was using a hacker tool to legally (with a court warrant) monitor what was happening on the target computer (of a suspect). This came as little surprise to criminals, and especially terrorists. It's long been known that law enforcement agencies have used computers to catch criminals and terrorists. This was largely thought to be done with taps into Internet traffic through various chokepoints (local, via ISPs, and nationally via major fiber optic cable systems). But it was also suspected that that the intelligence agencies and police were using hacker tools. Many terrorists have reported, on pro-terrorist message boards, finding secret hacker software planted on their computers. But no one had much definitive proof that it was from, say, the CIA, MI6, Mossad or the FBI. Most of it appeared to be the usual criminal stuff. For nearly a decade, cyberwar and criminal hackers have planted programs ("malware") in computer networks belonging to corporations or government agencies. These programs, called "Trojan horses" or "zombies", are under the control of the people who plant them, and can later be used to steal, modify or destroy, data or shut down the computer systems the zombies are on. You get the zombies secretly placed using freshly discovered, and exploitable, defects in software that runs on the Internet. These flaws enable a hacker to get into other peoples networks. Called "Zero Day Exploits" (ZDEs), in the right hands, these flaws can enable criminals to pull off a large online heist, or simply maintain secret control over someone's computer. Now, it's generally accepted by terrorists that the intel agencies are seeking to infect their PCs with zombie type software. Most terrorist computer users are low tech guys, and there are not enough tech gurus in the ranks to insure that everyone's PCs are kept "clean." While the more serious terrorists insist that everyone keep "business" off cell phones and computers, especially those hooked up to the Internet, not everyone is that dedicated. So the intelligence agencies still obtain lots of useful information via hacker attacks. SPECIAL OPERATIONS: Indians Are Getting Better All The Time COUNTER-TERRORISM: Why al Qaeda Stays Out Of Afghanistan Intelligence: Current 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 
cc/2019-30/en_head_0021.json.gz/line1731935
__label__wiki
0.545882
0.545882
Compute a numerical value for the area under the standard normal distribution, for z greater than or equal to 1. Compute a numerical value for the area under the standard normal distribution, for z greater than or equal to 1.3. distribution, between -1.15 and 0. distribution, for z greater than or equal to -0.85. Q: Compute a numerical value for the area under the standard normal distribution, between 0 and 1. Compute a numerical value for the area under the... Q: A prospective MBA student earns $45,000 per year in her current job and expects that amount to increase by 12% per year. Q: Suppose you are a health club owner and you are approached by a PRIDE salesperson who says, "The PRIDE database is located in an XYZ cloud facility,"... Q: Carson Inc.'s manager believes that economic conditions during the next year will be strong, normal, or weak, and she thinks that the firm's returns... Q: Read the passage from “I Know Why the Caged Bird Sings.” Occasionally, though, Mrs. Flowers would drift off the road and down to the Store and Momma would say to me, "Sister, you go on and play." Q: What is compound interest? Compare compound interest to discounting? 2. Why does money have time value? 3. How is present value affected by a change Q: Amniocentesis is a process in which amniotic fluid is taken from the mother's womb to identify any genetic abnormalities in the fetus. How would the discovery of the human genome contribute to this pr
cc/2019-30/en_head_0021.json.gz/line1731936
__label__wiki
0.587514
0.587514
Cheating on WoW: Destiny 2, Again Posted on December 15, 2017 by Tyler F.M. Edwards I’ve been curious about the Destiny games for ages, my interest fueled by the general hype around the series, as well as my inability to let go of my love for the Bungie games I grew up with. Unfortunately, the open beta for Destiny 2 pretty much told me nothing about the game. So when a proper free trial popped up, I was happy to have another chance to give the game a try. The good news is this is a far more fleshed out experience than the beta was. The amount of content is significant — several hours’ worth, at least — and all of the basic systems are in place. There’s now a character creator, for instance (though given this is a first person game where everyone wears helmets 95% of the time, I’m not sure there’s much point). There’s also now a cutscene at the beginning that explains some of the story, so I kind of get what’s going on now. Sort of. I think? Still not really sure what the deal with Darth Zug-Zug is. This game could really use a codex or something. The gameplay is… fine, I guess. Not much to complain about, but to be honest I don’t see much to separate Destiny 2 from the other MMO or quasi-MMO shooters I’ve played. What differences I do see are quite subtle. The gameplay is slightly less mindless than Defiance, but the setting and lore also seem to have had a lot less effort put into them. It doesn’t have The Division’s weird difficulty spikes, but the world is a lot less detailed, and exploration a lot less rewarding. The graphics are a lot better than Defiance’s, but oddly still not as good as The Division’s. Heck, I even found a public event where the boss has the exact same mechanics as Dark Matter Monoliths and Remnant Architects. Is it really that hard to come up with different fight mechanics in a shooter? I guess there’s not much to work with, but still. I did like how pistols seem to be a strong choice in Destiny 2. I like the aesthetics of pistols, but in most shooters they’re relegated to an option of last resort. In Destiny 2, they seem to be pretty good. Maybe too good. Pretty much every gun in Destiny 2 seems quite overpowered. That might not seem like a problem, but it tends to trivialize weapon choice if none of them have any drawbacks. At first I was lamenting my inability to find a good sniper rifle, but eventually I realized it didn’t matter. Who needs sniper rifles when even a six-shooter can blow someone’s head off from five hundred feet? I guess if I have one big complaint about Destiny 2, it’s that it’s just too easy. I’m sure there’s tougher content later in the game, but when it comes to leveling and solo content, this is another MMO aimed squarely at the lowest common denominator. Such complaints aside, this seems a solid game overall. It’s polished. It plays well. But I don’t feel a strong urge to upgrade to the full version right now, and overall I do feel a bit disappointed. Given the game’s pedigree and all the hype around it, I was expecting something special. Instead I got Defiance with deeper gameplay but a shallower backstory. I know it’s unfair to compare Destiny with Myth. It’s been twenty years, after all. But nonetheless I can’t help but think about the enormous gulf in originality between them. Myth was a game so unique that even today there’s nothing like it. Destiny is fine for what it is, but there’s plenty of other games just like it. There was a spark of true creativity in Bungie games in those days. That’s what I was hoping to see in Destiny 2, and that’s exactly what I failed to find. This entry was posted in Games and tagged Destiny, Destiny 2, sci-fi by Tyler F.M. Edwards. Bookmark the permalink.
cc/2019-30/en_head_0021.json.gz/line1731938
__label__wiki
0.672498
0.672498
Starcraft II: Wings of Liberty Review by SPG Team | Review, Starcraft II, Starcraft II: Wings of Liberty Review, Wings of Liberty| 0 Comments | April 26, 2018 Some sequels radically reinvent what has come before; others simply buff up a formula that already soars. To suggest that Starcraft II: Wings of Liberty does only the latter and not the former would be to sell short the fresh ideas and exciting gameplay that makes this superb real-time strategy sequel so enjoyable. This package delivers more than simple fun–it serves up incredible amounts of variety, from the cinematic and multifaceted campaign to the competitive and tightly balanced multiplayer. You might scoff at the fact that the game only includes a single campaign and, perhaps, at the high price point (the game retails at $59.99; $10 higher than the average PC game). But these are nitpicks, forgivable quibbles in a high-quality game that provides plenty of bang for the buck. Starcraft II is the natural next step for the series: it both embraces and updates the core components that made the first game a huge hit while layering on important features that give the game endless replay value, both online and off. This is one of the finest real-time strategy games in years, and whether you’re new to the genre or have been studying Protoss build orders for the past decade, there’s something here to delight you. The campaign is the first of many of these delights. You may have heard that Starcraft II features only a single campaign: that of the human faction known as the Terrans. One of the game’s few disappointments is that the other two factions–the Protoss and the Zerg–don’t get their day in the sun, so if you’re a newcomer who wants to prove your superiority (or inferiority) online, don’t expect the campaign to prepare you for the potential onslaught. But the campaign is hardly a one-note wonder, offering loads of variety, including an entire set of missions that divulges important story elements from an entirely different perspective. Yet even outside of those devious missions, you accomplish diverse and interesting tasks throughout the story. In one early mission, lava periodically rises onto the mainland, posing a threat to any units not positioned on high ground. In another, an exploding sun causes a deadly wall of flame to steadily push you across the map. From one mission to the next, there’s an intriguing new development that keeps you devoted to seeing what surprise is waiting for you next. Many of these missions are RTS staples: Lead these small groups of units down this linear path, defend this specific structure, and so on. Yet Starcraft II gives these tasks meaningful context. Take the very first mission, for example. It’s a very easy training mission, but one side objective has you take down holograms displaying emperor Arcturus Mengsk’s political propaganda. After destroying these displays and arriving at your objective, the citizens rise up and join you, and you get a sense of the Terran dominion’s heavy hand, as well as the peoples’ desire to be freed from tyranny. A later mission puts you in control of an enormous mech and sends you off on a fiery rampage. Controlling a single unit in an RTS for any period of time isn’t always fun, but because of how the mission is presented and its meaning within the story, this simple single-unit romp feels completely satisfying. Jim could use a shot of caffeine. Of course, the story plays out in more ways than simple mission objectives. You closely follow brooding freedom fighter Jim Raynor as he struggles to fight off the threat of the alien Zerg race, topple the manipulative Emperor Mengsk from his throne, and come to terms with his own guilt over the fate of Sarah Kerrigan. If you’re headed into this sequel without any knowledge of prior events, you need not worry that you’ll be in the dark: the campaign does an excellent job of filling in backstory even as the current narrative unfolds. The plot is uncomplicated, and the dialogue is action-movie simple, but Starcraft II’s excellent cinematics, evocative soundtrack, and top-notch voice acting have a way of keeping you glued to the screen. Hero Jim Raynor is a strong but troubled man. You hear it in his resolute drawl, and the way the soundtrack signals his presence with its telltale twangs; you see it in the dark, moody way he’s so often lit. The game punctuates its most poignant and thrilling moments with fantastic prerendered cutscenes, but even the in-engine cutscenes pull you in, thanks to expressive facial animations and plenty of humorous winks and nods scattered about. You do more than just watch cutscenes in between missions, however. This downtime is your chance to get to know the crew of Raynor’s battlecruiser, the Hyperion. In a style similar to that of an adventure game, when you click on various characters and items on the screen, you might be rewarded with a short cutscene, a clever quip from a nerdy scientist, or a broadcast from a not-so-fair-and-balanced news agency. But these interludes aren’t just for clicking and watching: You also upgrade and enhance your units and structures in important ways. By spending research points you earn on particular missions, you will gain access to permanent upgrades and new units normally associated with the Zerg and Protoss factions. However, these are either/or propositions: choosing one research option will lock you out of the other choice offered. You also earn currency to spend on other permanent upgrades or on mercenary units you can immediately summon to the battlefield. By their very nature, these options give the campaign replay value–value that’s further elevated by a few occasions on which you must make a choice during the campaign that determines the course of minor story elements. These decisions don’t just bring narrative consequences, however; they also determine which of two or more potential missions you must complete and have further impact on what units you might have access to or the enemy units you will face. The Protoss mothership may look imposing, but it’s hardly an automatic win. And so the campaign is certainly not an incomplete game, in spite of the focus on a single faction. The structure of the campaign provides a strong argument for playing the entire thing from the beginning all over again or, at least, from an early save game. Furthermore, the campaign is of a goodly length, lasting 15 hours or more depending on how quickly you blow through missions, how much time you spend tooling around on the Hyperion, and what difficulty level you choose. But there’s also another factor that will keep you coming back: an entire metagame in which you earn in-game achievements for accomplishing very specific tasks. Of course, such achievements are nothing new; Xbox Live, the PlayStation Network, Steam, and even Blizzard’s own World of Warcraft have made good use of abstract rewards to keep players dedicated. But these achievements are woven through every aspect of the game, from the campaign to the multiplayer, and in turn, these achievements are broadcast to your in-game friends on the all-important Battle.net online service that serves as Starcraft II’s primary interface. This Battle.net interface has its drawbacks. In order to play the game at all, you must create a Battle.net account and associate it with your game key. To earn achievements–even those in the single-player modes–you must be signed in to your account, which means always remaining online. (Fortunately, you can play the campaign as a guest when not signed into your Battle.net account, though you won’t earn any rewards that way.) And though you can indicate that you are unavailable and block other users, you cannot make yourself invisible to the players on your friends list if you aren’t in a social mood. Starcraft II is an intrinsically social experience. When friends receive achievements, you get a notification, which might drive a bit of friendly competition. You unlock and select from various user icons, which identify you to your friends and to your multiplayer rivals. You select which achievements you want to show off to anyone viewing your profile. And if you aren’t sure which of your friends might be playing, the game will search your Facebook friends list and automatically send an invite to anyone with a Battle.net account. The social integration, the achievement notifications, and the intuitive and smooth interface make Battle.net–usually–a positive way of interfacing with Starcraft II. StarCraft II is a competitive game of the highest order, and as such, it offers a fully featured online experience that is as thrilling as it is grueling. It begins with choosing the faction that best suits your play style. Every race offers versatility within its own units, and any number of strategies could be key to your success. If you play as Protoss, you might become enamored with the ominous flying void rays, which destroy both ground and air units with a focused beam of energy. But an enemy with a ready counter (say, Terran marines) might take advantage of the void’s need to charge up before it fires. The Zerg are well known for facilitating rush tactics, but if you face a zergling rush as a Terran, flame-spewing hellions may be your answer. There are great opportunities for satisfying micromanagement with each race, whether that means using the Protoss phoenix to lift ground units into the sky or transforming soaring Terran vikings into assault walkers. Each of the three factions possesses its own strengths and weaknesses, but there are so many different ways of approaching the battle that you need to stay flexible, scout the enemy, and respond accordingly. These units and strategies make Starcraft II very similar to its predecessor. You won’t see the drastic changes seen in the most recent Dawn of War and Command & Conquer games; Starcraft II is a highly traditional RTS. But you shouldn’t discount the tweaks, the minor changes, and the additions and subtractions that differentiate this sequel from what came before. The larvaelike Protoss reaver, for example, was jettisoned in favor of the looming colossus, a thin-legged walker that razes ground units with a buzzing beam. (A group of them climbing over a short cliff into your base is a terrifying sight.) The Terran thor is a mechanical mass of limbs and missile launchers that can take on both air and ground units. (Their unit responses also sound suspiciously like Arnold Schwarzenegger.) On the Zerg side, nydus worms allow quick underground travel, and unlike the original game’s nydus canals, they can be placed anywhere in your line of sight. Starcraft II will surely see some unit tweaks in the coming months, but even at this stage, the factions seem remarkably balanced, and every unit has an appropriate reply. You might miss your favorite units from the original, but the new ones are every bit as fun to use. Void rays are appealing to use and awesome to watch in battle, but they aren’t invulnerable. The amount of content available in online play (and in offline play in skirmish mode) is remarkable. There are dozens of maps that support up 12 players, and matches can be tailored in the usual ways–grouping players into different teams, setting the game speed, and so on. You might group up with friends and conspire to take down an all-AI team or try your hand at a desperate six-player free-for-all. However, to show off your strategizing prowess, you’ll want to get into ranked league matches, which is as easy as playing a series of games to determine which league you’ll be placed in and then inching your way to the top. If this sounds intimidating, don’t worry; you can take part in up to 50 slow-paced preliminary matches to get yourself prepared for the big boys. If you need further practice, you can always take on the AI in a stand-alone skirmish, and numerous AI difficulty levels let you set your own pace. There are also a series of challenges designed to get you familiar with each faction’s units, as well as the intricacies of hotkeys, rush defense, and other gameplay elements. These challenges are enjoyable, testing your knowledge of proper counters and giving you a chance to learn the ins and outs of units and structures you don’t utilize in the campaign. Like every other mode, the learning curve of these challenges is smooth, rewarding novices with lower-level achievements while pushing experts to try for the top-tier rewards. You may lament the inability to further practice with friends over a local area network, but fortunately, the Battle.net interface functions smoothly, and players that cause extreme lag can be removed from matches. You’ll want to return to some missions to earn the most challenging achievements. Starcraft II was clearly built to run on all manner of PCs. Its system requirements are relatively low, and even at the highest settings, noticeable aliasing and some simple geometry keep it from setting a new bar for technical wizardry. Yet, it sports a wonderful sci-fi look and is filled with little details that constantly catch your eye, from buzzards scouring the dusty land to tiny civilian robots flitting to and fro. The campaign features a lovely variety of different environments, from tree-lined roadways stretching through green meadows to the charred crust of once-populated worlds. Units move with absolute fluidity, making the simple act of issuing orders a pleasure. Equally great sound effects augment the pleasure. The clicks and gurgles of the Zerg are appropriately repulsive, while the hums and buzzes of Protoss structures and units are distinctive and satisfying. The most dedicated of the dedicated will further contribute to Starcraft II’s longevity by using the included user creation tools to develop new maps, new modifications, and even entirely different kinds of games. One such game–a top-down shoot-’em-up–is already featured within the campaign to show off the possibilities these tools bring to the table. These tools aren’t as simple to use as what you’d find in, say, Little Big Planet, but there are already a good number of custom maps and modes to download, and there are assuredly many, many more on their way. But even without a burgeoning supply of user-created content, Starcraft II would stand on its own as a true gem, providing strategy veterans with a tournament-focused online package while easing newcomers in with easier difficulty levels, offline challenges, and even a friendly introduction to competitive play. The campaign’s focus on the Terrans and a few scattered inconveniences aren’t great nuisances–not in an RTS as outstanding as this one. Starcraft II: Wings of Liberty is not just an old game with a pretty new face. It’s a varied and full-featured jewel that will keep you stuck to your computer chair for weeks, months, and even years to come. SOURCE: https://www.gamespot.com/reviews/starcraft-ii-wings-of-liberty-review/1900-6271989/
cc/2019-30/en_head_0021.json.gz/line1731944
__label__wiki
0.827637
0.827637
Casino: Spartan Slots Category: Free Spins Title: Phantom of the Opera Type: TBA Genre: Opera Bonus: 25 Free Spins on Signup Software: Microgaming Summary: Celebration of the world's biggest opera with the Phantom of the Opera slot that will balance a good mix of features and a feature-packed Free Spins round! Not Available In: Australia, Belgium, Hong Kong, Denmark, Hungary, Iran, Israel, Italy, North Korea, Macau, Myanmar, Philippines, Romania, Singapore, South Africa, Spain, Taiwan, Turkey, United Kingdom, United States and Territories. Residents from all other countries and territories are welcome to play. Claim Free Spins→ In addition to picking up awards at the recent ICE Totally Gaming 2017 Awards in London, Microgaming we're also using this prestigious event to celebrate another huge announcement, that of a forthcoming film tie in slot that promises to be yet another smash hit. Those that were lucky attendees at the ICE event will already be aware of the theme of the new slot, given that the Microgaming Bar was decked out to resemble the key setting from the movie in question, even down to the point of using actual props taken from the set of the film. That film was the 2004 movie reworking of the classic Phantom of the Opera which was heavily based on the musical, originally devised and composed by Andrew Lloyd Webber. Having acquired the rights to produce a slot based on the movie, which starred Gerard Butler, Emily Rossum and Minnie Driver, Microgaming are aiming to have the slot ready for release later this year. The 2004 film, which was a huge success grossing over $154 million at the Box Office worldwide, was originally based on the famous musical, which is now one of the longest running shows in theatrical history. However, Lloyd-Webber's inspiration for the musical came from the novel of the same name written by French author Gaston Leroux. It tells of how the majestic and grandiose Paris Opera House hides a shadowy secret, that of the Phantom. A mysterious and hideously deformed entity who dwells deep in the shadows in the darkest recesses of the building. Although shunned by the public, who fear his looks, the story tells the tale of how the Phantom falls in love with a beautiful Opera singer, Christine Daae, and how their relationship evolves. There's clear echoes with Victor Hugo's tale the Hunchback of Notre Dame here, but regardless of that, the Phantom of the Opera was a classic of French literature that had new life breathed into it when Andrew Lloyd Webber and Tim Rice penned the music and lyrics to the musical back in the early 1980s. The original theatrical release began at Her Majesty's Theatre in London in 1986 and starred Michael Crawford in the lead role. Since then, it has played non-stop for 31 years, winning 70 major theater awards and hitting the road to over 35 countries, playing in 166 cities around the world and grossing a total of $6 billion in ticket sales. Despite travelling the world over, you can still see the Musical right now at the very theater where it made its debut back in 1986. So after success as a novel, musical and now blockbuster Hollywood production, it is time for Microgaming to tackle the somewhat unusual task of converting not just a movie, but a musical, into a world class slots game. The good news is that anybody that has played any of movie-themed slots that Microgaming has created, will be well aware of just how high the presentation values are on that slot and Microgaming have taken steps to ensure that this new game, matches the quality of the last. To that end, the company have secured the rights to use all the characters as well as clips from the movie and music from the movie to ensure that their new slot is packed to the brim with all the nice touches and content to provide the most exciting and immersive slots experience. Following the announcement of the deal with the Really Useful Group earlier this month, David Reynolds the chief Games Publisher at Microgaming explained. "The Phantom of the Opera has had unequivocal success, played to over 140 million people worldwide! "It's exciting to be working with a music, a new genre of branded content for Microgaming, extending and broadening our portfolio of games. "Due out in Q3 2017, this game will be a true celebration of the world's biggest opera, balancing a healthy mix of base game features with a feature-packed Free Spins round," he concluded. One thing is for sure, based on the success of the book, musical and film, Microgaming's Phantom of the Opera slot is likely to be a sure fire hit when it hits casinos later this year. Keep your eyes peeled for the mysterious Phantom slot! Next Offer: Lucha Libre
cc/2019-30/en_head_0021.json.gz/line1731945
__label__cc
0.667948
0.332052
Domestique Sutton Coldfield - House Cleaning Services Our Cleaning Area TERMS AND CONDITIONS OF BUSINESS OF DOMESTIQUE LIMITED AND FRANCHISEES THEREOF The following expressions shall have the following meanings: 1.1 “Supplier” means Domestique Limited or any Franchisee of Domestique Limited, whose registered office and company registration number are detailed in the Proposal. 1.2 “Customer” means any person or company / body corporate who purchases Services from the Supplier. 1.3 “Housekeeper” means an insured and vetted Housekeeper supplied by the Supplier to the Customer to provide the services detailed in the Proposal until termination of this Agreement in accordance with these Terms and Conditions. 1.4 “Proposal” means a statement of work, quotation or other similar document describing the Services. 1.5 “Services” means the services as described in the Proposal and includes any materials required to complete the work. 1.6 “Terms and Conditions” means the terms and conditions of supply of Services as set out in this document and any subsequent terms and conditions agreed in writing by the Supplier. 1.7 “Consumer” shall have the meaning ascribed in section 12 of the Unfair Contract Terms Act 1977. 1.8 “Order” means the formal acceptance by the Customer of the Proposal. 1.9 “Agreement” means the contract between the Supplier and the Customer for the provision of the Services incorporating these Terms and Conditions. 2.1 These Terms and Conditions shall apply to the Agreement for the supply of Services by the Supplier to the Customer and shall supersede any other documentation or communication between the Supplier and the Customer. 2.2 Any variation to these Terms and Conditions must be notified to the Customer in writing by the Supplier. 2.3 Nothing in these Terms and Conditions shall prejudice any condition or warranty, express or implied, or any legal remedy to which the Supplier may be entitled in relation to the Services, by virtue of any statute, law or regulation. 2.4 In accordance with the Proposal and these terms and conditions, the Supplier shall provide the Customer with an insured and vetted Housekeeper to provide the services detailed in the Proposal until termination of this Agreement in accordance with these Terms and Conditions. 2.5 The Supplier may substitute the Housekeeper for another with greater or lesser experience in order to continue the provision of the Services giving due consideration of the service level agreed where possible. 2.6 Nothing in these Terms and Conditions shall affect the Customer’s statutory rights as a Consumer. 3.1 The Proposal for Services is outlined overleaf to these Terms and Conditions. 3.2 The Proposal for Services shall remain valid for a period of 30 days. 3.3 The Proposal must be accepted by the Customer in its entirety. 3.4 The Customer shall be deemed to have accepted the Proposal by placing an Order with the Supplier. 3.5 The Agreement between the Supplier and the Customer, incorporating these Terms and Conditions (and any associated insurance), shall only come into force when the Supplier confirms an Order to the Customer. Prior to any confirmation the Supplier has the right to refuse any Order. 3.6 In normal course, the Customer is entitled to a 7 days statutory “cooling off period” following the signing of these Terms and Conditions and associated Proposal. During this period, the Customer has a right to cancel this agreement without further recourse from the Supplier. Accordingly, no work as detailed in the attached Proposal shall commence until after the passing of the 7 day cooling off period. Should the Customer require work to commence prior to passing of the 7 day cooling off period, they are required to waive their rights to enforce the same and may do so by ticking the waiver box overleaf. By doing so the Customer waives all rights to enforce any Statutory Cooling Off Period. 4. Services and Delivery 4.1 The Services are as described in the Proposal. 4.2 Any variation to the Services must be agreed by the Supplier in writing. 4.3 The Services will be delivered in accordance with the times and dates detailed in the Proposal. The Supplier may vary these times by providing details of the change to the Customer. 4.4 Dates given for the delivery of Services are estimates only and not guaranteed. Time for delivery shall not be of the essence of the Agreement and the Supplier shall not be held liable for any loss, costs, damages, charges or expenses caused directly or indirectly by any delay in the delivery. 5. Price and Payment 5.1 The price for Services is as specified in the Proposal and is inclusive of VAT (if applicable) and any other charges as outlined in the Proposal. 5.2 The price for any materials required to complete the Services is as specified in the Proposal. 5.3 Payment to the Supplier for the Services by the Customer is to be made by monthly standing order in advance. The first standing order payment will be required prior to the commencement of work. 5.4 In addition to the payment to the Supplier as detailed above (which is in respect of administrative and management services), the Customer shall be responsible to make payment to the Housekeeper for any work conducted at the hourly rate as detailed in the Proposal. The Supplier reserves the right to amend the hourly rate of the Housekeeper from time to time to ensure that Housekeepers are paid an appropriate rate of pay in line with market forces / local competition. 5.5 The terms for payment are as specified in the Proposal. 5.6 The Customer must settle all payments for Services in accordance with the Proposal. 5.7 The Supplier reserves the right to charge the Customer interest on all late payments at a rate of 8% per annum above the base lending rate of National Westminster Bank PLC. 5.8 The Supplier is also entitled to recover all reasonable expenses incurred in obtaining payment from the Customer where any payment due to the Supplier is late. 5.9 The Customer is not entitled to withhold any monies due to the Supplier. 5.10 The Supplier is entitled to vary the price to take account of: 5.10.1 any additional Services requested by the Customer which were not included in the original Proposal; 5.10.2 any increase in the cost of materials (where applicable); 5.10.3 any additional work required to complete the Services which was not anticipated at the time of the Proposal; and any variation must be intimated to the Customer by the Supplier. 5.11 In the event that advance payment for Services has been made by the Customer to the Supplier and the cleaning operative fails to attend the Supplier shall arrange a replacement Housekeeper to attend at a mutually convenient time to the Customer and the Supplier / alternative Housekeeper. 6. Customer Obligations 6.1 The Customer will provide access to the Supplier / Housekeeper at the times agreed and/or specified in the Proposal and will co-operate with all reasonable requests by the Supplier / Housekeeper. 6.2 The Customer will provide electricity, hot water, cold water, toilet facilities and spare keys (if required) to the Housekeeper at no cost for the purpose of completing the Services. 6.3 The Customer will apply for, obtain and meet the cost of all necessary approvals and permissions required to complete the Services prior to the commencement of the work. 6.4 A detailed list of cleaning specifications must be provided by the Client to the Supplier / Housekeeper prior to the commencement of the Services (normally during the preliminary meeting). Any specific instructions will need to be outlined by the Customer in writing and agreed with the Housekeeper. 6.5 The Customer shall be liable for any expenses incurred by the Supplier / Housekeeper as a result of the Customer’s failure to comply with the obligations as defined by these Terms and Conditions. 6.6 The Customer shall remove (or restrict access to) all delicate items of furniture, ornaments and other belongings from the area to be cleaned. 6.7 The Customer shall supply all cleaning equipment and materials required for the provision of the Services. 6.8 All equipment supplied by the Customer must be safe to operate, in full working order and must not require any special skills to operate. 6.9 If cleaning materials are unavailable the Customer authorises the Housekeeper (as his or her sole discretion) to purchase the required products and agrees to meet the expenses of the materials and pay a surcharge of £5.00. Whilst reasonable endeavours shall be taken to purchase appropriate materials, the Supplier / Housekeeper accepts no liability with regard to the materials purchased and no warranty can be given s to the suitability of the same. 6.10 If the Customer fails to provide equipment as agreed the Supplier shall be at liberty to (but not obligated to) use their own equipment or hire equipment and the Customer agrees to meet the costs resulting from this lack of provision. 6.11 In order to properly protect the genuine business interests of the Supplier and the time, effort and financial investment made in approving Housekeepers and insuring quality control over the services they provide, the Customer hereby agrees not to directly approach or engage the Housekeeper as a directly retained housekeeper / cleaner (nor refer any Housekeeper directly to another third party, save through the Supplier) during the duration of this Agreement and for a period of 12 months thereafter. In the event that this clause is breached, the Customer agrees to compensate the Supplier with an equivalent sum to that which would otherwise have been paid to the Supplier to retain the Housekeeper’s services in accordance with this Agreement for a period of 12 months (payable in one lump sum). By entering into this contract, the Customer agrees to and accepts this condition and recognises that the same is entirely necessary and fair in order to protect the genuine business interests of the Supplier. 7.1 The Supplier shall supply the Services as specified in the Proposal – In particular, the Housekeeper is introduced to the Customer by the Supplier as a self employed Housekeeper. The Customer is responsible for the employment of any Housekeeper and the Customer retains the Housekeeper under a “Contract for Services”. Any specific arrangements and agreements should be agreed between the Customer and the Housekeeper directly. The Customer is responsible for prompt payment of the Housekeeper at the agreed hourly rate shown overleaf. This rate may be varied by the Supplier from time to time to ensure Housekeepers are being paid appropriate rates of pay. 7.2 The Supplier shall perform the Services with reasonable skill and care and to a reasonable standard. 7.3 The Supplier shall comply with all relevant health and safety regulations. 7.4 The Supplier shall ensure that all necessary licenses and permissions required to provide the Services are current. 7.5 The Supplier shall be responsible for all waste management and disposal required in the course of providing the Services. 7.6 The Supplier shall hold all necessary insurance policies as required by law. 7.7 Whilst reasonable endeavours shall be taken by the Supplier to supply alternative Housekeepers in the case of absence of a Housekeeper, the Supplier is under no obligation to do so. Further, the Supplier shall be under no obligation to provide alternative Housekeepers during the Easter and Christmas holidays should a Housekeeper elect not to work during these periods. 8.1 If the Customer cancels a visit by the Housekeeper, except in exceptional circumstances (at the sole discretion of the Supplier) the Customer shall remain liable to pay the Supplier’s fees. 8.2 If the housekeeper is unable to access the property of the Customer for reasons beyond the control of the Supplier / Housekeeper the Customer remains liable to pay the Housekeeper’s travelling time, which will be subject to a minimum of one hour of the Housekeeper’s agreed hourly rate. 8.3 If the Customer gives the Supplier / Housekeeper more than 24 hours notice requesting a visit is rescheduled the Supplier / Housekeeper will attempt to meet this requirement but all appointments are subject to availability. 9. Defective Services 9.1 If the Services are found to be defective in accordance with these Terms and Conditions then the Supplier shall, at their sole discretion, either require the Housekeeper to re-perform the Services or refund a fair proportion of any monies paid in respect of the defective Services to the Supplier. The Customer shall be responsible for negotiating any refund of any monies paid directly to the Housekeeper with the Housekeeper. 9.2 Where the Services are defective or do not comply with the Agreement the Customer must notify the Supplier in writing within 24 hours from the time the defect is ascertained. 9.3 If the Customer has not paid for all the Services in full by the date the defect in Services is notified to the Supplier then the Supplier has no obligation to remedy the defect in terms of this Condition 9. 10. Intellectual Property Rights All intellectual property rights, registered or unregistered, including but not limited to patents, trademarks, design rights and know-how (including the Supplier’s business model) remain the property of the Supplier and cannot be used, copied or replicated by the Customer without the written permission of the Supplier. 11. Property, Risk and Insurance 11.1 Insurance covers any Housekeeper employed by the Customer and introduced by the Supplier and retained by the Client. We hold public liability insurance to a maximum payout of £1,000,000. Neither the Supplier or its insurers shall be liable for the first £100 of any claim nor for any claim of £100 or less. The Customer should have adequate insurance cover in place against liabilities to the Housekeeper and shall produce to the Supplier a copy of the appropriate insurance policy if so requested (this may be in the form of a general household insurance policy). 11.2 The Supplier will not accept liability for any chemical damage as only materials supplied by the Customer will be used and the Housekeeper should be properly instructed by the Customer on how to use these chemicals. 12.1 The Agreement shall continue until the Services have been provided in terms of the Proposal or any subsequent date as mutually agreed in writing by both parties or until terminated by either party in accordance with 12.1 and 12.2 below: 12.2 The Supplier can terminate this Agreement at any time giving reasonable notice – usually not less than four weeks – during this notice period the ongoing provision of a Housekeeper to the Customer remains at the Supplier’s sole discretion; 12.3 The Customer can terminate this Agreement giving not less than four weeks notice in writing to the Supplier. Notice will be deemed to have commenced upon receipt of such written communication by the Supplier at their office. 12.4 The Customer may terminate the Agreement if the Supplier fails to comply with any aspect of these Terms and Conditions and this failure continues for a period of 4 weeks after notification of non-compliance is given. 12.5 The Supplier may terminate the Agreement if the Customer has failed to make over any payment due within 2 weeks of the sum being requested. 12.6 Either party may terminate the Agreement by notice in writing to the other if: 12.6.1 the other party commits a material breach of these Terms and Conditions and, in the case of a breach capable of being remedied, fails to remedy it within a reasonable time of being given written notice from the other party to do so; or 12.6.2 the other party commits a material breach of these Terms and Conditions which cannot be remedied under any circumstances; or 12.6.3 the other party passes a resolution for winding up (other than for the purpose of solvent amalgamation or reconstruction), or a court of competent jurisdiction makes an order to that effect; or 12.6.4 the other party ceases to carry on its business or substantially the whole of its business; or 12.6.5 the other party is declared insolvent, or convenes a meeting of or makes or proposes to make any arrangement or composition with its creditors; or a liquidator, receiver, administrative receiver, manager, trustee or similar officer is appointed over any of its assets. 12.7 In the event of termination the Customer must make over to the Supplier any payment for work done and expenses incurred up to the date of termination. 12.8 The Customer is responsible for arranging return of any keys from the Housekeeper upon termination. 12.9 In the event of termination (other than in accordance with the Guarantee) within the first 3 months after the commencement of the provision of Services, the Supplier shall be entitled to levy a charge equivalent to two month’s management fees as detailed in the Proposal, such sum representing a genuine pre-estimate of losses and time incurred on the part of the Supplier. The Customer agrees that such sum is justifiable and enforceable. 12.10 The Supplier does not control any standing orders set up by the Customer. Accordingly, it is the Customer’s responsibility to cancel the same upon termination in accordance with this Agreement. In the event that the Customer fails to cancel a standing order and payment is made for Services after the cancellation of this Agreement, in the event that the Supplier is required to refund the same, it shall be entitled to levy an administration charge not exceeding £27.50 per payment / incident. 12.11 Any rights to terminate the Agreement shall be without prejudice to any other accrued rights and liabilities of the parties arising in any way out of the Agreement as at the date of termination. 13. Warranties 13.1 The Supplier warrants that the Services will be performed using all reasonable skill and care. 13.2 Without prejudice to clause 13.1 and except as expressly stated in these Terms and Conditions, all warranties whether express or implied, by operation of law or otherwise, are hereby excluded in relation to the Services to be provided by the Supplier. 14.1 Nothing in these Terms and Conditions shall exclude or limit the liability of the Supplier for death or personal injury, however the Supplier shall not be liable for any direct loss or damage suffered by the Customer howsoever caused, as a result of any negligence, breach of contract or otherwise in excess of the price of the Services. 14.2 The Supplier’s maximum liability under any circumstances (save in the case of death or personal injury) shall be limited to the total management fees (not those paid to the Housekeeper) received by the Supplier in the preceding 12 months (or part thereof as applicable). 14.3 The Supplier shall not be liable under any circumstances to the Customer or any third party for any indirect or consequential loss of profit, consequential or other economic loss suffered by the Customer howsoever caused, as a result of any negligence, breach of contract, misrepresentation or otherwise. 14.4 For the avoidance of doubt, time shall not be of the essence and the Supplier shall incur no liability to the Customer in respect of any failure to complete the Services by any agreed completion date. The Customer shall indemnify the Supplier against all claims, costs and expenses which the Supplier may incur and which arise directly or indirectly from the Customer’s breach of any of its obligations under these Terms and Conditions. 16. Guarantee The Supplier guarantees that in the event a Customer is not happy with the first Housekeeper provided to them by the Supplier after two cleaning sessions, he or she shall be replaced with an alternative Housekeeper. If after two further cleaning sessions the Customer is still unhappy, the Supplier will offer the Customer the option to cancel the Agreement and will refund all charges paid to the Supplier for the first month. This guarantee is only effective if the Customer affords the Supplier the opportunity to remedy any perceived service shortfall and has themselves complied with the terms of this Agreement. Neither party shall be liable for any delay or failure to perform any of its obligations if the delay or failure results from events or circumstances outside its reasonable control, including but not limited to acts of God, strikes, lock outs, accidents, war, fire, breakdown of plant or machinery or shortage or unavailability of raw materials from a natural source of supply, and the party shall be entitled to a reasonable extension of its obligations. The Customer shall not be entitled to assign its rights or obligations or delegate its duties under this Agreement without the prior written consent of the Supplier. If any term or provision of these Terms and Conditions is held invalid, illegal or unenforceable for any reason by any court of competent jurisdiction such provision shall be severed and the remainder of the provisions hereof shall continue in full force and effect as if these Terms and Conditions had been agreed with the invalid, illegal or unenforceable provision eliminated. The failure by either party to enforce at any time or for any period any one or more of the Terms and Conditions herein shall not be a waiver of them or of the right at any time subsequently to enforce all Terms and Conditions. Any notice to be given by either party to the other may be served by email, personal service or by post to the address of the other party given in the Proposal or such other address as such party may from time to time have communicated to the other in writing (or email), and if sent by email shall unless the contrary is proved be deemed to be received on the day it was sent, if given by letter shall be deemed to have been served at the time at which the letter was delivered personally or if sent by post shall be deemed to have been delivered in the ordinary course of post. These Terms and Conditions supersede any previous agreements, arrangements, documents or other undertakings either written or oral. These Terms and Conditions shall be governed by and construed in accordance with the law of England and Wales and the parties hereby submit to the exclusive jurisdiction of the English and Welsh courts. 24. Acceptance of these Terms and Conditions These Terms and Conditions become effective and are deemed to have been accepted by the Customer upon signature of the Proposal by the Supplier and the Customer or alternatively, in the absence of the Customer’s signature on the Proposal, upon the acquiescence of the Customer to allow the Supplier’s Housekeeper to provide Services. A failure (deliberate or otherwise) on the part of the Customer to sign the Proposal is not indicative of the Customer failing to accept these Terms and conditions, should the Customer allow the Supplier (acting through a Housekeeper) to commence the provision of Services. 25. Amendments to these Terms and Conditions The Supplier reserves the right to amend these Terms and Conditions and shall inform the Customer of any changes by posting the same on the Supplier’s Website/s and/or by sending copies to the Customer either by post or email, not less than 30 days prior to the implementation of such changes. Refund Policy | Areas We Cover | © 2015 DOMESTIQUE FRANCHISING LTD - Developed and Maintained by InterProMedia Registered in England & Wales no. 09692391. Registered Address: Sutton Coldfield, West Midlands, B75 7NA England. Popular cleaning areas: Sutton Coldfield, Tamworth, Dordon, Atherstone, Kingsbury, Water Orton, Polesworth, Appleby Magna This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree to our cookie policy.
cc/2019-30/en_head_0021.json.gz/line1731948
__label__wiki
0.697076
0.697076
The Tin Whistle Everything You Know is Twisted The History of 420 in 3 Acts Waldos on the wall. You can trace a line from Jack Kerouac and Neal Cassady to Ken Kesey and Ken Babbs to Steve and Dave, who entered San Rafael High School in the late sixties. They were rugged individualists uninspired by the social scene, which centered on athletics and the school’s top jocks, so they decided to create their own fun by embarking on a quest for adventure. The first of these was a visit to a Bay Area research lab developing the very first holographs. Soon, Jeff, Larry and Mark joined the safaris, as these adventures became known. Every safari started with a sacramental hit of cannabis, followed by the cranking of the tunes, either in the 1966 4-door Chevy Impala with the killer Craig 8-track stereo system, or in Steve’s room, or in one of other sacred spots they shared herb, as getting high was illegal and couldn’t be done in public or around parents. One of their favorite spots was underneath the statue of Louis Pasteur by Benny Bufano, which overlooked the school parking lot. Sacred hymns provided by New Riders of the Purple Sage, Allman Brothers, Poco, Commander Cody, Beatles, The Moonlighters were then employed to lift the vibration higher. Waldos at the statue of Louis Pasteur. This crew gravitated to a wall inside the courtyard of San Rafael High, where they’d meet before class and during lunch break to make withering comments about everything around them, and this is where they obtained their name: The Waldos, as well as where they honed their savage wit. You couldn’t smoke pot around school unless it was a one-hitter and done extremely carefully, and even then you risked suspension and your parent’s wrath. In the fall of 1971 Steve was given a treasure map to an abandoned patch of cannabis on Point Reyes that had been planted by a member of the Coast Guard too scared to return. He wanted some fellow stoners to have the patch, and everybody at San Rafael knew the Waldos were frequent stoners. “Surely, this is the ultimate safari,” thought Steve. “No more adventurous nor noble quest could be devised by the mind of man.” The Waldos prophetically all agreed to meet at 4:20 PM at the Louis Pasteur Statue to get high, and drive out to Point Reyes to search for the secret patch of weed. From then on, whenever the Waldos passed each other in the halls, they spontaneously erupted in a salute with the words, “Four Twenty Louie!” Little did they know how far this ritual would eventually travel, although “Louie” got lost along the way. For the next ten years, the Waldos went on the most amazing safaris and had the most magical adventures, although they sadly never found that patch. But they always sponsored a big pot party on April 20th, where a ceremonial toke would take place at 4:20 PM. Eventually they started getting married, having families and picking up the sacred pipe less frequently. However, they kept up the safaris. But as soon as the Waldo’s retired from staging 420 ceremonies, the younger classmen of San Rafael picked up on the magic of numerology and began using the code as a way to evade detection, and some of them started a ritual of congregating on a ridge of Mount Tamalpias with a sunset view of the Pacific on April 20th in order to get high at exactly 4:20 PM as a way to honor the spirit of cannabis. This ritual started with only a few souls, but soon grew to dozens. And that’s when someone got the idea of making a flyer inviting stoners from all over the Bay Area to the ceremony. Nobody outside Marin even knew that 420 signified pot. But even those gathered at the top of Mt. Tam didn’t have any idea how the code had started. They thought it had something to do with the police. I’m often knee-deep before I realize what I stepped into, and that’s how it was with the Cannabis Cup. The idea came to me on the plane, while flying back from the Netherlands after interviewing the founder of the first marijuana seed company, Nevil Shoemakers. The night before, Dave Watson had regaled me with tales of California harvest festivals before C.A.M.P. helicopters forced that scene underground. Soon, I was back in the Netherlands, organizing the first Cannabis Cup, with a photographer and grow expert. Three seed companies entered, and one of them didn’t even cure their entries but plucked them fresh off the vine. But when I returned home after that first event, I couldn’t shake a feeling of responsibility. My event demanded a ceremonial framework respecting the true spirit of cannabis and its historical importance and influence. And that’s how I ended up buying a paperback version of the Rig Veda. Imagine my surprise when I came across the description of the primary sacrament shared during all ceremonies, a drink called Soma: “The blind see, the lame walk… he clothes the naked. Soma is a sage and seer inspired by poetry …King of the healing plants.” I knew Soma was supposed to be a mushroom, something accepted as gospel by the academic community, but in my heart, I instantly realized this had to be a description of cannabis, and there had to be some incredible cover-up going on that dwarfed the cover-up Jack Herer was pushing about the industrial uses and environmental benefits of hemp. I stepped out of my office to smoke a joint and reflect on these matters, something I had been doing in my office, but had recently departed, as I had moved to a former warehouse in the back of the building, something necessitated by a crackdown on smoking. But the crackdown had just been extended to the warehouse as well, so I sought refuge in the stairwell. Steve Bloom, the recently appointed news editor was there, along with some hippie dude I didn’t know, and he proceeded to pull out a stash of whippets and he began inhaling them in rapid succession. Bloom asked when he was going to share, and he said, “Sorry, I only have my dose and nothing more.” I fired my joint, while Bloom showed me a flyer he’d been handed while attending a recent Grateful Dead show in Oakland. “Check this out,” he said. “It’s really silly.” Pythagoreans greet the sunrise. I don’t have immense satori moments often, but I’d been time traveling through the Vedas for hours and still had a foot in distant past, so when I saw that crude flyer asking people to come to the sunset-view ridge of Mt. Tam at 4:20 PM on April 20th, it assumed Biblical proportions in my mind, and I expressed these feelings instantly, because this was a sign, and something that could be employed to give meaning to my Cannabis Cup ceremony and also help make marijuana legal. But for those not into numerology or the study of secret societies, this is just silliness with no meaning. Some people “got” 420 and employed the magic to enhance their cannabis experience and help legitimize pot in ceremony, while for others, it remained a joke and nothing more. I told Bloom I intended to use the code as part of my effort to build a case for spiritual rights to use cannabis under the Constitution. “This ceremony manifested spontaneously, and is evidence of the power of cannabis to create ceremony and culture,” I said. “We’re going to make this a big part of the Cannabis Cup and the Freedom Fighters.” Later on, I was crushed to discover Bloom had run a joke item about the flyer, and failed to mention my pledge to deploy the code. No matter, I was soon on the road going to hundreds of college campuses in a debate titled Heads versus Feds against the former head of the DEA in New York. And at every event I asked the students to have a peace ceremony at 4:20 on April 20th. I also told them to be moderate in the use at such a young age, reminding them “the less you do, the higher you get.” Certainly Chef RA, Jack Herer, Rodger Belknap, Thom Harris, and Linda Noel “got” 420. They were the shock troops in the hemp legalization movement, who helped me found the Freedom Fighters, the first national hemp legalization group. For many years we drove to rallies in a Psychedelic Bus (a new one each year as they were always breaking down). We hosted free campgrounds, with free kitchens, and published a free newsletter. Back then, the rallies were all held at precisely high noon, a trend that would continue for well over a decade. But the Freedom Fighters always held council at 4:20 PM, passed a feather and plotted how to best legalize in our lifetime. Just as every year, one of the Freedom Fighters was selected by open council to attend the Cannabis Cup as a celebrity judge. Debby Goldsberry became the most dedicated member of that original crew, and quickly broke off to create her own organization, CAN. The half dozen rallies we attended were not enough to keep her occupied, as she created her own tour that hit almost every college town in the Midwest, while we concentrated on Ann Arbor, Madison, Boston, and the Rainbow Family Gatherings. At every stop along the road, she handed out copies of that original 420 flyer, something I’d encouraged. However, the flyer was treated as a joke item, and did not resonate on the level of what I was manifesting. I hadn’t been to any Cups since the first one. But in 1993, I held the first 420 council at a Cannabis Cup. In truth, it was a clumsy ceremony, as no one but me had any idea what 420 represented, including Jack Herer. Some people will claim 420 was already widespread within the Grateful Dead community in the 1980s, but that is not true. It was known to teenagers who lived in Marin County in the later part of the decade. The following year, however, at the 7th Cup, my 420 ceremony blossomed and became epic and stayed that way for the next 15 years or so. Most of the chiefs of cannabis you’ll find in Amsterdam today attended that first big 420 ceremony and spoke from their hearts. Eagle Bill was a major force elevating those ceremonies and it could not have happened like it did without him. I ran into Bill on my way to open the Pax Party House on opening day, and noticed he carried a hand-carved staff. I asked if he would like to be the ceremonial high priest and use his staff in place of a feather. The impact of this request on Eagle Bill was profound. To say Eagle Bill “got” 420 would be a vast understatement, as he rapidly elevated to become the primary guiding spirit of the event. I was arranging everything around the afternoon 420, but the crew got so devoted they began doing 420 AM ceremonies, and these rapidly became the most legendary parties at the Cup and everyone collected photos of themselves under the clock at exactly 4:20. In 1995, Vancouver got credit for staging the first April 20th 420 ceremony outside Marin County. Marc Emery, Dana Rozek, Cindy Lassu and Ian Hunter had a hand in manifesting this event, although Marc was initially opposed to the concept. It continues today as the longest-running April 20th ceremony in North America. A few years later Debby Goldsberry staged the first major 420 event in the Bay Area in Golden Gate Park, although it turned into a one-off. However, the already established free 420 gathering on hippie hill continues to this day. The Mt. Tam sunset ridge ceremony was shut down in 1990. ACT THREE Even though High Times became the magazine success story of the 90’s and the Freedom Fighters spearheaded the return of the rallies, re-igniting the sleeping marijuana movement, success only seemed to bring problems for me, as I was soon forced to disband the Freedom Fighters and there were constant pressures to shut down the Cup as well, or at least remove my supervision. I moved home to concentrate on events and how to document them for posterity as I felt there was something important in these 420 ceremonies I was manifesting. At the time, I was primarily interested in building up WHEE! as the premiere cannabis event in North America. I’d been trying for years to get Ken Kesey and the Merry Pranksters over to the Cannabis Cup, and had lured Mountain Girl when she was poor and adventurous, but at one point realized if I wanted to do a ceremony with Kesey, it was going to have to happen in his backyard, and that’s what happened. The first year (1997) we had over 300 vendors and 20,000 attendees. Of course the Pranksters “got” 420 immediately, and the reason the code suddenly began skyrocketing through the Grateful Dead scene was threefold: first, Rainbow Family and Dead Family were basically the same thing and the Freedom Fighters and 420 had acquired a huge presence at Rainbow; second, Jack Herer and Chef RA “got” 420 and they became influential figures and spread the code; and three, and probably most important, the Pranksters “got” 420, and began actively pushing it. And Kesey was the most influential person in the Dead scene after Jerry Garcia. One day, I got an email from Mike, the travel agent of the Cannabis Cup, who had been made producer of the event with me directing the ceremonies. He forwarded a message from Steve in San Francisco who claimed to have started 420 with his friends in 1971. The part that caught my attention was Steve wasn’t seeking money, he just wanted 420Tours.com to know the real story. He was writing to the Cannabis Cup travel package website because Mike had put up a forum for posting 420 Cannabis Cup stories, and this website drew the attention of the Waldos, who had been following the spread of 420 across America with much mirth and amazement. By 2002, headshops in the Bay Area were stuffed with 420-t-shirts, buttons, hats, posters, and various other memorabilia. The code has become a well-known secret inside cannabis culture and been written about in High Times and celebrated as the central ceremony in the Cannabis Cup and WHEE!, the two biggest and most influential cannabis-themed events at the time (if you don’t count Kumba Mela). Still, however, outside the Bay Area, the code remained an enigma, even to most stoners. I ended up flying out to San Francisco and meeting the Waldos and holding epic ceremonies with them for days, all of which were captured on video, as were my 420 ceremonies with the Pranksters and the elders of the Rainbow Family. In fact, whenever I get together with Pranksters, Waldos or Rainbow Elders, the same magic improvisational energy always emerges, as well as an overwhelming desire to have fun. I never doubted the Waldo’s story, and read the truth in their hearts before I examined their documents. But the powers-that-be at High Times never trusted me, and the publisher spread the story I was suppressing competing tales on the origins of 420 because the Waldos were my friends, implying it all a massive hoodwink on my part. And that’s the way this story appears on Wikipedia today. I also began a college lecture tour in 1995, debating Curtis Sliwa for five years, and then the former head of the New York DEA for additional 14, and “Heads versus Feds” traveled to over 300 colleges and universities over 19 years and I end each debate with a plea for the creation of a local student-run legalization group, and urge the students to hold annual events on April 20th, and have local bands play to raise money for the chapter. That line about April 20th often gets a laugh from the audience, and about half the time, I’m able to get volunteers to start a sign-up sheet for a chapter of NORML for the first five years, before I switched to advocating for SSDP. At many debates the list of prospective members reaches several dozen before I depart the lecture hall, and some of these chapters actually get off the ground. Enough for SSDP to follow the tour remotely as it moves around the country, and that’s probably why Allen St. Pierre of NORML said recently: “Without Hager, I don’t think there’s any way that this interesting numerology that has crept deep into American culture and commerce would have happened.” One of the earliest schools we traveled to for the Heads versus Feds debate was Boulder, Colorado, and that school soon started a 420 ceremony that got so big the University had to shut down the entire school on April 20th just to try and stop it. And I think that’s one reason why Denver got the center of energy of 420. Colorado was always the most vocally pro-pot state I visited. I’ve long supported the view 420 should be used to help ritualize and legitimize cannabis as a sacrament, which will also strengthen the case for religious use. I’m not in favor of students doing breakfast dabs and going off to take their calculus exam, and I realize some get attracted to intoxication too early in life, and it holds them back, but on the other hand, I don’t believe anyone should go to jail, lose a student loan, or lose child custody over cannabis. So I suggest using 4:20 PM as a guide for an appropriate hour for the adult population to hold a cannabis ceremony, although this certainly doesn’t apply to those with a medical need. If you’re having a medical emergency, dabs away. I’m hoping some who read this will “get” 420, and consider lifting the ceremony to a higher level, something more meaningful than just an excuse to get intoxicated. Only then will we be able to help forge a spiritual culture worthy of being handed down to future generations. If you want to treat this plant with respect, there is magic, but for some others who use it without wisdom or who become too attached too soon, it’s just an expensive habit. The other thing I’ve learned is that if you want to have a true counterculture ceremony, everyone must be invited, which means it has to be free and it can’t just be about getting high and nothing else. A few years back, Bloom posted a story about how he “discovered 420” that failed to mention me at all. Bloom then told a Huff Post reporter that I had nothing to do with promoting 420, and that the code took off on its own, as if my events and ceremonies had zero to do with what happened. (P.S. Please visit the Waldos at www.420waldos.com for more information on their history.) Is graf a part of hip hop or not? Grandmaster Flash has opened up the longstanding debate on the basic elements of hip hop culture. In a recent interview, he stated writing has nothing to do with hip hop, and should be considered a separate movement apart, and not an integral element. In fact, Flash blamed the media for incorporating writing into hip hop, and a lot of writers immediately agreed with his position. I have to admit being a bit stung by some of his comments because I wrote the first major magazine article on the subculture and put the words “hip hop” into play in the national media, and included writing as a part of the culture. Writing was a city-wide phenomenon that started in the late 1960s in upper Manhattan and spread to the South Bronx before going all city, all boroughs. It spread quickly wherever there were subway tracks and trains. When the original masters of the first generation emerged as gallery artists calling themselves United Graffiti Artists, almost all were from the South Bronx, and the list was headed by Phase 2 and Bama. Few realize today Kool Herc began as a writer, long before he got his first deejay system, and he ran with Phase 2 and Stay High 149, both of whom would go on to have epic status. Herc threw his first jam in 1973, and hip hop was his to incubate for the first three years. Coke La Rock was the first emcee during this period, inventing lines like “you rock and you don’t stop,” and putting “ski” on the end of everything. Coke was also the weed dealer, as well as emcee and deejay whenever Herc took a break. I’m pretty sure Herc considers graf a part of his culture, why else would he pose in front of it? Afrika Bambaataa at Bronx River by Sylvia Plachy In 1977, Afrika Bambaataa began forming what soon became known as the Universal Zulu Nation, dedicated to peace, unity and having fun. Bambaataa declared that deejaying, emceeing, breaking and writing were the four elements of what he named “hip hop,” a phrase invented by Cowboy and made popular by Lovebug Starski. You simply can’t discard the fact the primary visionary behind this movement expressly included writing as a part of the culture from its inception. Bambaataa will tell you he had this vision of a new culture in 1974, shortly after he discovered Kool Herc, so he dates the birth of hip hop not with Herc’s first jam in 1973, but a year later. There have always been hundreds of writers who say hip hop never influenced them, and they are correct. Most writers never attended a hip hop jam, and didn’t know much about the culture until the media began covering it around 1980, and even then, awareness moved very slow at first because there was so much resistance to recognizing the culture. But it is incorrect to say the media invented the “graf-rap” connection, because that honor goes to Bambaataa. In 1981, I went to an exhibit titled “New York/New Wave” at PS 1 curated by Diego Cortez. Although panned in the Village Voice, that show changed my life. There was a huge room filled with photos of over a hundred subway cars, but one in particular drew my interest. I’d recently been given a copy of “The Breaks” by Kurtis Blow, which had recently become the second 12-inch gold record in history, and the first rap song to go gold as well. The subway car that caught my eye was “Break” by Futura 2000. I contacted Diego, got Futura’s phone number, and ended up attending a Soul Artists meeting on the Upper West Side. Futura introduced me to Fred Brathwaite, who gave me Bambaataa’s phone number. And that’s how I ended up writing a story called “Afrika Bambaataa’s Hip Hop” for the Village Voice. So, I entered this universe through graffiti, and while I respect Flash and the many writers who reject any hip hop-graf connection, I know one actually does exist. Posted on April 24, 2015 September 3, 2018 Did the CIA plot Nixon’s assassination? Tom Forcade came to New York City from Arizona to work for the Underground Press Syndicate (UPS) formed by six of the largest underground newspapers in 1966, a list that included John Wilcock’s East Village Other. When Tom arrived, the UPS offices and archives were located in Jim Fouratt’s apartment, but soon moved into Tom’s after he took over. Tom was suspicious of Abbie Hoffman and Jerry Rubin, and questioned their qualifications to lead the movement, so rather than join the Yippies, he created his own counter-revolutionary movement, and to make sure everyone knew where he was coming from, he named it the Zippies, implying it was the peppy alternative to last year’s revolutionaries. Tom would have been the public face, except he was also a pot smuggler and dealer, which forced him to stay in the background, which may have contributed to his jealousy concerning Abbie who was always on the mic. Tom eventually built a speakeasy in Manhattan that sold pot by the pound to dealers, a place where suitcases were stacked to the ceiling. According to a major pot dealer of the period, Tom began working with a Mossad agent on some big projects shortly after arriving in New York. Apparently, this agent eventually committed suicide. Tom used to tell this dealer if the Feds ever came after him, he had information that would embarrass them. But soon Tom committed suicide as well. A.J. Weberman was one of the biggest weed dealers in New York at the time, and he became Tom’s co-conspirator in creating the Zippies after he discovered Tom had a better, cheaper connection than he did. Weberman also ran a weapons training camp in the Catskills for volunteers wishing to help defend Israel from Arab annihilation. After outing Bob Dylan as a dabbler in heroin, Weberman wrote a book on the JFK assassination stating Watergate burglar Frank Sturgis was one of the tramps and also a shooter, a view he holds to this day. While Sturgis was up-to-his-neck in the plot, and may have even driven the murder weapons from Florida to Texas as he claims, he is neither one of the tramps from the famous photos nor a likely shooter for JFK. However, a new book by Roger Stone claims Stugis was enlisted a few years after the JFK hit to assassinate President Richard Nixon. According to Stone, the CIA feared Nixon was going dovish on Vietnam, and they also greatly resented his detente move with China. Sturgis was told to procure weapons and make preparations for staging a confrontation between Yippies versus Zippies that would erupt in gunfire, and during this melee, Sturgis was to make sure Nixon got fatally shot. Sturgis went ahead and got the guns, but when it was finally revealed who the target was, he backed out. Later on the CIA employed the Watergate burglary as a lever with which to unseat Nixon. Last year, Stone released a book claiming Lyndon Johnson engineered the Kennedy assassination, and while I’m sure Johnson was aware of the plot, it’s unlikely his power extended to the top of the Pentagon and CIA. So even though Stone is a beltway insider once close to Nixon, I don’t fully trust his judgment on some key issues. But he does bring interesting information to the table. Some say Nixon bought his detente move with China by returning one of hundreds of funds created from black market gold stolen during WWII and then disappeared. Much of that gold originated in China and had been buried in the Philippines for years before being washed by Opus Dei working with some Bonesmen. At least that’s the story I’ve been able to piece together. But now I’m wondering more about the possible double agents planted inside the Zippies and Yippies who were going to instigate the melee so Nixon might be killed. It seems fascinating the Yippie-Zippie split was well-known at the highest levels of the CIA, almost as if they had a hand in instigating it, but as someone who once had access to Tom’s correspondence and private writings, I have to say I don’t believe he was a spook, although he may have been surrounded by them, some of whom have yet to be identified. Posted on April 24, 2015 August 30, 2018 Remembering Tseng Kwong Chi Perhaps someday someone will make a film of my book Art After Midnight and explore the New York social scene born in the shadow of CB’s by freshman art students from around the world, converging at a time when world’s collided and paradigm’s began shifting in downtown New York City. I selected Tseng Kong Chi as a primary photographer for my 1985 book, although I included all the great photographers who documented the scene, especially Harvey Wang, who took this photo of Tseng performing with Keith Haring at Club 57. I’m pretty sure this was before Tseng assumed his Chairman Mao identity, and that Club 57 was the lab where Tseng honed some skills. Club 57 was an orgy of creativity in action. When they finally make a great film about this scene, it won’t be about Basquiat, Haring or anyone else, but the entire community because everyone who attended these ceremonies made a contribution. Like most movements, 50 stars were involved, but there were 500 in the audience, and the audience is just as important as the stars when it comes to birthing new movements because they add the necessary psychic energy to lift the movement higher. And Tseng was certainly one of those 50, so its wonderful the Grey Art Gallery has recognized him with a long overdue major exhibition. Without Tseng, where would Borat be? If only I had a video camera back then and the foresight to follow Tseng around like he followed Keith—only Keith was chalking subway panels while Tseng was crashing the biggest old-money events in town with a self-created VIP name-tag and a non-speaking Mao persona. He even got photos with Henry Kissinger and Henry thought he was some visiting dignitary from China and not a performance artist. But this was performance art on a whole new scale. Maybe you know this movement took massive energy from the collision of hip hop and punk? I like to think of Tseng’s work as 3D graffiti because it was all about getting up. When a writer starts, the first mission is to formulate a word, tag, nickname, message to be promoted. The Mao character was Tseng’s tag in a way and I think he remained mute because Tseng was shy and it took a lot of confidence for him to launch into these epic social scenes and remain in character. The Grey Art exhibit includes an enormous print of a photo Tseng shot for the back cover of the book, inspired by a continuing series Tseng was working on, in which he was photographing Keith, Kenny, Bruno, Carmel, Ann, John, Min and a few others. He had a series of group shots taken just before some big ceremony or night on the town. I asked him to do the same thing for the back cover, only I wanted to include some other major characters in the book, like Patti Astor, Steve Maas, Animal X, Joey Arias, David McDermott and Peter McGough. I probably talked it over and we decided it should be kept down to a dozen to be manageable. And at the last second, Kenny Scharf dropped out, and although Jean Michel was invited of course, I didn’t realize including Jean could only be guaranteed if we’d taken the photograph at his place on Great Jones. There may be people left out of this photo still harboring faint grudges today, and I wish we’d just invited all 50 stars and made it like Sergeant Pepper’s. Next time I’ll know better. As the objective reporter, I didn’t want to insert myself into the photo, so I didn’t even attend the shoot. In hindsight, another mistake. But Tseng did call me as soon as John Sex walked in the door. “He doesn’t have his hair up,” said Tseng, massively disappointed. I think we’d both envisioned John in the center with his giant pompadour. “Don’t worry,” I said. Later when I saw the photo, I noted Joey had come prepared to upstage John’s hairstyle with something more epic than a giant blonde pomp—black devil horns. Oklahoma City 20 years later: spooks surrounded by dimwits Did you think this horrific terror incident wasn’t going to peel like an onion? Because that’s what’s been happening over the years. I noticed this quote today: “…agencies are as often investigating and arresting each other’s shadowy operatives as they are cooperating. Nowhere is this more apparent than in regard to Elohim City, where several of the key “extremists” may well have been government agents unwittingly egging one another on. This kind of compartmentalization, while perhaps understandable in intelligence operations, nonetheless can lead to tragedy. That may be what happened in the case of Oklahoma City, when ATF’s efforts to nab the German were thwarted by other entities.” Roger Charles The Oklahoma City Bombing is considered the worst domestic attack in American history, but that ignores the presence of several Middle Eastern spooks in the operation. The New American obtained a copy of the sworn affidavit of FBI Special Agent Henry C. Gibbons (dated April 20, 1995) relaying the testimony of an eyewitness near the scene of the explosion who “saw two individuals running from the area of the Federal Building toward a brown Chevrolet truck prior to the explosion.” “The individuals,” says the FBI affidavit, “were described as males, of possible Middle Eastern descent, approximately 6 feet tall, with athletic builds.” It was strange how the entire world media immediately jumped on the bombing as an act of Arab terrorism and instantly related it to the initial foiled attempt to down the World Trade Towers, but 48 hours later, everything suddenly shifted and the crime was placed solely at the feet of MK/Ultra patsy Tim McVeigh. Funny how that move seem to backfire, though, because enlistments in the militia movement, which had soared after Waco, fell off a cliff after Oklahoma City. Suddenly being a domestic right-wing survivalist lost all glow post McVeigh. But I always suspected the German spook Andreas Strassmeir as being heavily involved. He was whisked out of the country quick like those rich Saudi’s who feted many of the 9/11 conspirators down in Florida right before that event went down. I wonder how long it will take to find all the connections between Oklahoma City and the two World Trade Tower attacks. Andy the German comes from a long line of political insiders and he quickly became head of security at Elohim City, where this plot was likely hatched. Yet both elements, the highly-connected German spook, and the two Middle Eastern men, would be universally ignored by the mainstream media. As more data filters in, however, the hoodwinks become harder to hold down. One of my favorite characters in this drama is BATF honeypot Carol Howe, who did weapons training with Andy. Howe penetrated the Christian Identity Movement by writing a letter to leader Dennis Mahon stating she was “23, pure Aryan, considered beautiful, and wanted to fight for her race and culture.” Hard to believe, but the dimwitted radical right has at its roots the much more sophisticated Knights of the Golden Circle, a pre-Civil War, pro-slave secret society that recruited among the educated and wealthy. After the Civil War, however, the Knights began their gradual de-evolution to their current status: a smattering of spooks surrounded by dummies who actually believe in the dogmas, a world in which almost everyone suspects the other guy of being a spook if his IQ is over 80. And it appears spooks operating in this world seldom know each others’ true identities and many believe they are playing the other guy, when, in fact, they are pawns in the game getting played. You can tell how high spooks are on the chain, however, by who survives. McVeigh was probably a spook working some deep-cover assignment involving hypnosis as well as wearing a biometric chip. He was so cool at his execution, I have to believe someone convinced him the execution was going to be faked and he should act dead for the press until they were ready to relocate him in witness protection. And it’s suspicious McVeigh had zero statement to make before the execution, and left only a poem as his final statement. “I am the master of my fate: I am the captain of my soul. My head is bloody, but unbowed.” That’s about as nebulous as it can get. The 44th Anniversary of 420 One fine fall day in 1971, an enlightened group of high school students at San Rafael High School in Marin County invented 420 as a secret code for cannabis. These Waldos were the younger generation of the Merry Pranksters, and I say that because both groups manifested an immense amount of creative energy, and continue to do so, and 420 was just a tiny piece of their contributions. Someday a book or film on the Waldos will be made that brings their story to life, because their 420 ceremony is now as big (or bigger) on the astral plain as the Prankster’s Magic Bus, which means 420 is approaching Wizard-of-Oz like significance in the universal group mind. Like the Pranksters, the Waldos were sacred clowns who invested fun into all their adventures, and both used cannabis as a tool to elevate those energies. There are lots of lessons to be learned, but the most important is the necessity to band together in groups to pass through life’s ceremonies. Both the Waldos and Pranksters had strong harmony that keeps them unified to this day. You can’t manifest culture on your own, it has to be done in groups. You’ll also notice both the Pranksters and the Waldo’s have a zen-like appreciation for living-in-the-moment, and injecting theatricality into daily life to invest it with deeper meaning. I organized 420 ceremonies for a long time before I discovered the Waldos, and when I finally flew out to meet them, I ended up jamming and playing with them for days. In fact, It was very similar to what happens when Ken Babbs and I get together. Someday I hope we can bring all my jam buddies across the world together for an epic 420 jam session. This was actually my first year in a long time celebrating 420 in New York City. I took the afternoon boat ride around Manhattan with the original Cannabis Cup Band on Saturday. It was an epic experience and I got to share some thoughts about cannabis and spirituality, and we lit the seven candles. We could use a daily 420 boat ride like this because it sells out instantly. Twist one way to make a conservative, and twist the other to make a liberal. So easy to put both in a crowded environment with limited resources and fan the conflict with propaganda. Please don’t fall for the phony left-right, liberal-conservative mind game. Respect everyone, especially the spirit of your ancestors and your future descendants. Don’t surrender your moral integrity to a mythical avatar, and realize the more you know, the less you know. There is really only one rule: don’t hurt anybody. The convergence of the internet and artificial intelligence has placed you in the most exciting, most promising moment in history. So, enlighten up! Subscribe to The Tin Whistle The Tin Whistle can help navigate the fake news mindfield. Your address remains confidential, and you'll receive nothing but the blog feed. Click the image to get the book Mark Passio and the Illuminati Hoax Who is the real King of Cannabis? Why Mark Passio is just another rabbit hole The Mysterious Mr. Watson Killing the Irish Beatles The Two Oswalds The Missing Men in the Psychedelic Revolution Nothing is Everything Ernest Hemingway was a spy for the Kremlin The Three Tramps New York City’s best grower/dealer? Cannabis Castaways Forever Fun Chef Ra Escapes Babylon The first documentary on the emerging hemp movement john titus on Turk’s Head Steven Hager on Turk’s Head kent simon on Turk’s Head 9/11 Conspiracy Counterculture history Finchley Boys Lincoln assassination Google site verification google7a7a1bcb5ad43d8b.html Steven Hager Counterculture iconoclast who documented hip hop's birth, founded the Cannabis Cup and unveiled the JFK and Lincoln assassinations. About The Tin Whistle Proudly powered by WordPress
cc/2019-30/en_head_0021.json.gz/line1731951
__label__cc
0.555304
0.444696
Home › Artists & Periods › Artist › Claude Monet Daniel Wildenstein (1917-2001) was an art historian and member of the Académie des Beaux-Arts (Paris). From 1939 onwards, he was Director of the Wildenstein Galleries of New York, London and Tokyo. He edited several international journals, e.g. the magazine Arts from 1956-1962 and the Gazette des Beaux-Arts after 1963. He co-founded the Fondation Wildenstein in 1970 (it was renamed the Wildenstein Institute in 1984), and was a prime mover in many exhibitions of international repute. Daniel Wildenstein also edited the catalogues raisonnés of various 18th, 19th and 20th century artists. He was a world authority on Impressionism, and published catalogues of the works of Gauguin, Manet and Monet. Daniel Wildenstein (Author) No other artist, apart from J. M. W. Turner, tried as hard as Claude Monet to capture light itself on canvas. Of all the Impressionists, it was the man Cézanne called “only an eye, but my God what an eye!” who stayed true to the principle of absolute fidelity to the visual sensation, painting directly from the object. It could be said that Monet reinvented the possibilities of color. Whether it was through his early interest in Japanese prints, his time as a conscript in the dazzling light of Algeria, or his personal acquaintance with the major painters of the late 19th century, the work Monet produced throughout his long life would change forever the way we perceive both the natural world and its attendant phenomena. The high point of his explorations was the late series of water lilies, painted in his own garden at Giverny, which, in their approach toward almost total formlessness, are really the origin of abstract art. This biography does full justice to this most remarkable and profoundly influential artist, and offers numerous reproductions and archive photos alongside a detailed and insightful commentary. Taschen, 2014 Morning at Antibes Print The Large Bathers Print Under the Pines at Evening Print Chanticleer: A Pleasure Garden
cc/2019-30/en_head_0021.json.gz/line1731955
__label__cc
0.738881
0.261119
Press Release: Key Leadership Changes: Don G. Schick Transitions to Chairman of the Board, Peter Smith to President & CEO Calgary, AB – June 11, 2019 – Strata Health Solutions Inc. today announced that Don Schick, the company’s Founder, President and CEO, will be named Board Chairman effective July 1, 2019. Peter Smith will serve as the President and CEO for the global corporation based in Calgary, Alberta upon Don’s transition. An experienced entrepreneur and champion of innovation, Don founded Strata Health in 2001 with the introduction of our intelligent patient navigation technology, truly pioneering an entirely new eHealth category. During Don’s tenure as CEO, his leadership was instrumental as Strata expanded patient flow functionality across the Canadian care continuum, and successfully entered multiple international markets. Now 18 years later, Strata Health is a global leader in patient flow and transition care pathways, operating in six countries and employing over 70 staff. “Time flies when you’re having fun – has it really been 18 years? I have led three start-ups over my career, but truly, I view Strata Health as my life’s work,” comments Don. “It’s been a dream collaborating with forward-looking clinicians and leaders, working beside incredibly dynamic and dedicated young staff, all while being entrusted to make a true difference to patient’s lives. It just doesn’t get better than that – and really, we’ve barely touched the potential of Strata Health.” “Pete is so well positioned to further enhance Strata’s Canadian and global reputation for leadership, innovation, integrity, and successful outcomes,” Don continues. “The Board and I undertook a North American wide competition for this role, and Pete’s combination of experience, skills and intelligence made him the right person for the job. I look forward to supporting Pete, our staff, and our clients in my new role.” With a powerful combination of business, information technology, and healthcare expertise, Peter Smith has over 25 years of experience spanning a broad spectrum of industries, technologies, and roles. Peter joined Strata Health in 2013 as the Vice President of Information Technology and has been the Executive Vice President for North America since 2016. As the incoming CEO, Peter will be responsible for leading the company’s global expansion into new markets and verticals, championing product innovation, engineering the business to scale efficiently, and retaining the customer service focus and rewarding work environment Strata is known for. “I am honoured and excited to have the opportunity to lead this incredible business Don has built from the ground up. Don has been, and will continue to be, a great mentor for me as we embark on a new chapter for Strata Health,” Pete explains. “Our greatest strength is our people. This team of talented, dedicated staff is truly second to none. Together, we will continue to provide world-class service to our customers, while innovating our leading technology, and remaining a trusted advisor to all of our customers,” Pete declares. “Watch for us, as we expand our collaboration with other leading healthcare technology firms, offering holistic solutions in a rapidly evolving healthcare paradigm.” Who is Strata Health? With almost 20 years of experience in the patient care industry, Strata Health is the leading provider of intelligent, digital tools for resource allocation, patient transitions, and patient flow innovation across the care continuum. Strata Health supports healthcare clients on three continents, helping over 2 million patients worldwide get the care they need faster. Strata’s software solutions are improving the healthcare experience for patients, clinicians, and health jurisdictions around the world. For more information, please contact info@stratahealth.com.
cc/2019-30/en_head_0021.json.gz/line1731956
__label__cc
0.513969
0.486031
A huge amount of PRIDE: Looking at the world from a different dimension Manufacturing Product Engineering In this series, we celebrate the diversity of our people across Jaguar Land Rover. We meet Theresa Gallagher who opens up about being asexual. Theresa is one of those people you immediately admire, as she speaks candidly about being asexual. Keen to raise awareness, she is under no illusions about the challenges facing this rarely discussed, tiny minority of people in the UK. People who are asexual cannot easily be defined. However, a basic explanation is that an asexual man or woman does not experience feelings of sexual attraction, with most asexual people not wanting to take part in ‘normal’ physical intimacy. Having joined Jaguar Land Rover’s Powertrain Manufacturing Engineering team in September 2017, Theresa is working on a six-year apprenticeship that includes a degree from Warwick University. While she has broached the subject of her sexual identity before she hasn’t in the workplace until now. “I have talked to people on my course at Warwick Trident College about being asexual, but this is the first time I have raised it in the workplace. “One of the key things I want to get across is that asexual people exist. We’re approximately one per cent of the UK population, and hopefully I can raise a bit of awareness about who we are.” Theresa can feel romantically attracted to both genders but by her own admission there’s no need or desire for a sexual element in any relationship. “Asexual people have no high-profile role models. We’re rarely discussed in the media and I think a huge amount of people do not know what is involved, or perhaps realise that we are out there and we might be a colleague or a friend. “We are definitely not as visible or organised as other LGBT+ people, and when I first felt that I should discuss it at college I thought to myself ‘how the heck do I start with this?’” Theresa loves working at Jaguar Land Rover and has made a big commitment to leave her family home in North Wales, but it has not always been easy. “I had to do most of the working out for myself after joining Jaguar Land Rover and moving down to Coventry. But it was not the best time for me and I had to request time away from work due to stress. “I realise this was partly down to me discovering that I was asexual, which was a sizeable thing to come to terms with, and also having to previously steer any discussion about relationships in another direction which was never great.” Theresa is very clear that she does not want to be treated notably differently and to a certain degree asexual people have not experienced the same levels of prejudice other members of the LGBT+ community continue to experience. “There’s obviously a great deal of work to be done in recognising asexuality in society, and it would be great if Jaguar Land Rover could play a part in that.” “It’s important to explain that asexual people see things differently. If you do have a colleague who is open about being asexual just bear in mind they may not want to be part of conversations about intimacy or whether someone is attractive. In some cases even some ‘banter’ can be very uncomfortable and upsetting.” While society still has much to learn about the asexual community, one thing is for sure, without Theresa’s courage and candidness many colleagues across Jaguar Land Rover would be none the wiser.
cc/2019-30/en_head_0021.json.gz/line1731963
__label__wiki
0.835617
0.835617
Land Rover South Africa inspires fans ahead of the Rugby World Cup Land Rover South Africa took the Rugby World Cup to the people ahead of the tournament kicking off in Japan later this year. To promote the biggest rugby competition in the world, Land Rover helped fans get close and personal to the trophy their country won at the Rugby World Cup in 2007. Two Land Rover brand ambassadors and former Springboks – Jean de Villiers and Bryan Habana – were on hand to collect the Webb Ellis trophy as it arrived at OR Tambo International Airport. It was carefully placed in a convoy of Land Rover Discoverys which chauffeured the cup across the country. First stop was in Pretoria, where Land Rover South Africa held a competition on the radio for rugby fans to win prizes and tickets to see the DHL Stormers against the Vodacom Bulls, and an unique opportunity to see the Rugby World Cup in person. The final stop of the journey was to a youth rugby academy, where Jean de Villiers and current South African captain Siya Kolisi met with a group of children to give them some of their wisdom about teamwork, education and perseverance. After the week-long tour of South Africa, the trophy is heading to the USA before heading to Canada, Brazil and concluding its 18 month global tour in Chile, with the first match kicking-off in Tokyo on 20 September between hosts Japan and Russia.
cc/2019-30/en_head_0021.json.gz/line1731964
__label__cc
0.536942
0.463058
Increasing the fees to the applicants, Bangladeshi freelancers in danger Workership is a popular Marketplace for Bangladeshi Freelancers. There is a lot of work in the Marketplace as well as the number of Free-lancers is more than that. At this market, the fee was cut to 10 percent. The fee will be increased from June next, the official said. According to the new policy of work, working with a client, 20 Google Glass will take 7,000 people from Bangladesh United States-based Google Glass Startup and Healthcare Company ‘Agmadex’ announced the appointment of more than 7,000 people from Bangladesh in the next 5 years. This plan was announced recently at a press conference held in the Augaidix Building. It was reported at the press conference that Steven Yeşayyed, augusted co-founder Pelu Tran and venture partner of the company’s wealth investor, Boishakh’s business through social network The day is changing. The concept of career and business is going to change. Starting from small traders, big corporate houses are now coming out with new business through social networking. In Bangladesh at the moment, more than 24 million people use social network Facebook. Users are in no way a consumer. As a result, they are now planning a Freelancing training for young people in remote areas Ishikhan.com, a Training provider, has come forward to develop and enrich the country’s Freelancing sector. This Institution Will provide Free Freelancing Training online for 3 to 5 months for young people in remote areas across the country. Ishihon.com chief executive Ibrahim Akbar said that under this Training, the middle and upper educated youth from any district of the country will get Storm For ‘outsourcing freelancing’ poster on Facebook November 11, 2017 3 Comments Someone posted a poster stuck on the road on Facebook. After this Outsourcing Freelancing, the poster called Social Media is going through a storm of discussion. Many top IT officials have talked about this. The poster says Outsourcing Freelancing is going on for a 50% discount on the occasion of Eid. After 6 months course, 4000-50000 Money earn 100% guarantee! In the Bangladesh second place in the position of the World freelancer Rank India has topped the list of world’s second largest Freelancing population in the world. The other topmost countries are the USA, Pakistan, Philippines and United Kingdom respectively. This information has been published recently in a report by the Oxford Internet Institute. In this report, it has been shown that most Freelancers live in any country in the world and any
cc/2019-30/en_head_0021.json.gz/line1731967
__label__cc
0.606535
0.393465
February 16, 2010 By John Corcoran 126 Comments How to Fight Back Against Cybersquatters Who Sit on Personal Domain Names You’ve probably already googled yourself, but what about looking up your personal domain name? You might be surprised what you find. Although some people’s personal names might be registered to a company or a professional located in a far-away state or country, for many people, their name may be sitting primarily unusued because it has been “parked” by a cybersquatter. At least, until the right price comes along. Fortunately, there is a law which is designed to protect individuals whose personal name URL has been captured and held hostage by a cybersquatter. The Anti-Cybersquatting Consumer Protection Act, 15 U.S.C. § 1125 et. seq. (“ACPA”), was passed by Congress for the very purpose of protecting individuals and trademark holders against cybersquatters who register internet domain names containing trademarks or real names without that person’s consent with the specific intent to profit from such name by selling the domain name for financial gain. 15 USC § 8131 states as follows: Any person who registers a domain name that consists of the name of another living person, or a name substantially and confusingly similar thereto, without that person’s consent, with the specific intent to profit from such name by selling the domain name for financial gain to that person or any third party, shall be liable in a civil action by such person. In any civil action brought under § 8131, a court may award injunctive relief, including the forfeiture or cancellation of the domain name or the transfer of the domain name to the plaintiff. The court may also, in its discretion, award costs and attorneys fees to the prevailing party. That’s a big “stick” intended to get cybersquatters to comply. I recently had a client contact me whose personal name URL had been clearly grabbed up by a cybersquatter looking to sell for profit. The website that was parked at the domain looked like a crude search engine. A banner ad at the top of the page announced that “this URL is for sale.” They wanted $1,700 to release the person’s name. It was clear that this website was nothing more than a bare bones, basic “site” parked temporarily. Cybersquatters typically erect a minimal site for the purpose of qualifying under the “work of authorship” exception under 15 USC § 8131(B). Under this exception, a person who in good faith registers a domain name and then builds a “work of authorship” is not considered a cybersquatter or subject to the penalties under § 8131. In fact, in our case the client had actually contacted the owner of the domain numerous times over the years regarding ownership of the URL. Each time, the client was solicited to pay thousands of dollars to purchase the URL. Each of these solicitations helped us to craft an argument that the owner of the URL had the specific intent to profit from selling the name. The next question for us was what to do about this apparent violation of the ACPA. Our options were as follows: send a demand letter to the registered owner of the domain, which is typically available via public records File a lawsuit in federal court under the Anti-Cybersquatting Consumer Protection Act, or Try to mediate the dispute through Uniform Domain-Name Dispute-Resolution Policy with ICANN, the international body that controls domain names. Sending a demand letter to the cybersquatter is the cheapest of these options, although there is a risk the cybersquatter will simply ignore the demand. Filing a lawsuit to recover the domain name could quickly cost more than the few thousand dollars being demanded for the URL. And mediation costs $2,000 for 1-5 domain names. Therein lies the rub. The cybersquatters typically charge just enough for their URLs that they’ll make a profit, but not so much that a person will go to the trouble and expense of hiring a lawyer and filing a lawsuit or filing a request for mediation. Of course, some cybersquatters charge far more than $1,700 for a person’s name and it is worth it to pursue these methods. John Corcoran is an Associate with Plastiras & Terrizzi law firm in San Rafael, California (Marin County). He advises clients on small business issues, intellectual property, real estate matters, estate planning, and general civil litigation. He may be reached at [email protected] or (415) 472-8100 x211. Filed Under: Employment Law
cc/2019-30/en_head_0021.json.gz/line1731969
__label__wiki
0.739742
0.739742
Posts Tagged ‘ Koto ’ Yukiko Matsuyama – Crème Brulée The koto, a 13-string zither or harp like instrument, originated in China and came to Japan in the 7th-8th century. Today, it is the national instrument of Japan. The koto isn’t unknown in the world of smooth jazz. The most popular band with the koto as lead instrument is certainly Hiroshima. Osaka, Japan born Yukiko Matsuyama was classically trained in this instrument from age 9. Since 1993 Yukiko lives in Los Angeles and was influenced by Western styles like jazz, new age, pop and world music. Although her music runs under the label world music, she is melting these styles with the traditional Japanese koto music. Yukiko presents on her album Crème Brulée ten original compositions. She is supported by Diana Dentino (piano & keyboards), Greg Vail (sax & flute), Vince Van Trigt (bass), Mike Bennett (drums & percussion), and furthermore Daniel Mulliken (cello), David Brock ( violin & viola), Chris Darrow (guitar), Dave Wood (guitar), and Michael Kotzen (cajon). Stimulated by her own self-effacing humor Yukiko introduces into her music with the title What Is Zat? Don’t await scaring Asian hymns. Yukiko’s instrument is integrated into smooth jazz and performed in a truly American style. Continue reading Yukiko Matsuyama – Crème Brulée Yukiko Matsuyama Yukiko Matsuyama’s new release, Crème Brulée, is a joyful blend of Smooth Jazz and World music that will excite & delight! Japanese Koto with traditional western instruments, the Koto Yuki Band beautifully executes 10 original compositions by Matsuyama. Greg Vail’s soulful sax blends joyously with Yukiko’s Koto. Note: this is not your traditional “relaxation / meditation” Koto CD. You’ll find yourself taking this with you in the car, on bike rides, and wherever you want to feel the positive vibrations of happy music. The band features Diana Dentino – piano & keyboards, Greg Vail – sax & flute, Vince VanTrigt – bass, Mike Bennett – drums & percussion, with help from Daniel Mulliken – cello, David Brock – violin & viola, Chris Darrow – guitar, Dave Wood – guitar, & Michael Kotzen – cajon. Crème Brulée is now on sale at CDBaby. Hiroshima – Legacy Sometimes music is touching me so deep, that I must spread the word like a herald. Hiroshima‘s new album Legacy is motivating and pushing me into this direction. I use the old world herald in full conscience. It’s the melting of old traditional Japanese with modern jazz instruments which makes Hiroshima’s music somehow antique in the sense of an “old master”, a term for an European painter of skill who worked before about 1800, or a painting by such a painter. Equally their music is so modern and unique that one cannot compare their Asian-American jazz fusion with the music of any other group. The new album is a collection of songs from Hiroshima’s first musical decade. The songs were not taken from the previous albums but re-recorded by the band’s current lineup, the founders Dan (sax) and June Kuramoto (koto), joined by taiko drummer/percussionist Shoji Kameda, drummer/percussionist Danny Yamamoto, keyboardist Kimo Cornwell and bassist Dean Cortez. Further guest musicians are Terry Steele, Jim Gilstrap and Yvette Nii (vocals), Richie Gajate Garcia (percussion) and the string arrangements of maestro George del Barrio. “When you start looking back at fifteen records over thirty years, that’s a lot of material to choose from, ” comments Dan Kuramato. “So we narrowed the scope to the first ten years, which includes five records – two of which were gold. We tracked everything live in my home studio for this new recording, with almost no overdubs. In many cases, the songs on this record are fairly similar to the originals. In some cases, they\’re very different.” The album starts with the GRAMMY nominated Winds Of Change from Hiroshima’s album Odori (1980). The new recorded version is more orchestral and focused on the ancient Japanese instruments. Mighty taiko drums are underlining the modern drum beat. Dan’s fabulous sax is shimmering over the ancient sound. Continue reading Hiroshima – Legacy
cc/2019-30/en_head_0021.json.gz/line1731973