pred_label
stringclasses
2 values
pred_label_prob
float64
0.5
1
wiki_prob
float64
0.25
1
text
stringlengths
105
935k
source
stringlengths
39
45
__label__wiki
0.637255
0.637255
‘Avengers: Endgame’ Script Had Hulk Name-Drop Bill Nye The Science Guy by Noah Villaverde on December 13, 2019 In the screenplay for Marvel Studios’ Avengers: Endgame, Bill Nye the Science Guy would’ve received a shoutout courtesy of one Professor Hulk. Marvel Studios released the screenplay for Avengers: Endgame as part of the film’s awards season campaign for consideration at the Oscars among other awards honoring this year in cinema. The screenplay revealed some unused dialogue from the film in page 35, in which we see Mark Ruffalo’s Hulk in a humorous conversation with Paul Rudd’s Scott Lang/Ant-Man. Here, Hulk name-drops Bill Nye as one of his friends: SMART HULK: I have seven PhD’s, an MD, the Hans Bethe Award for Physics, and I’m personal friends with Bill Nye the Science Guy. We’re good. SCOTT LANG: Yeah. And you look like that on purpose. RUMOR: ‘The Falcon and The Winter Soldier’ May Feature A Zola Appearance This scene in which Hulk name-drops Bill Nye takes place during some of the first time travel tests with the Quantum Realm at the Avengers Compound in which ends up aging older and younger before Robert Downey Jr.’s Tony Stark/Iron Man returns with his methods of time travel to introduce. Bill Nye is widely recognized for his educational television program Bill Nye the Science Guy which was on the air from 1993-1999. He also had a series on Netflix, Bill Nye Saves the World. Seeing that the screenplay placed Bill Nye in the canon of the Marvel Cinematic Universe, it’s interesting to imagine how his interactions with the Hulk must’ve been like. Bill Nye was likely more familiar with Dr. Bruce Banner in his human form and rarely saw him Hulk out, but one can only imagine what type of television programs Bill Nye would’ve hosted given the involvement of many otherworldly entities in the MCU. Desmond Chiam & Miki Ishikawa Join ‘The Falcon And The Winter Soldier’ Here is the official synopsis for Avengers: Endgame: The grave course of events set in motion by Thanos that wiped out half the universe and fractured the Avengers ranks compels the remaining Avengers to take one final stand in Marvel Studios’ grand conclusion to twenty-two films, “Avengers: Endgame.” Directed by Anthony and Joe Russo, Avengers: Endgame stars Robert Downey Jr., Chris Evans, Mark Ruffalo, Chris Hemsworth, Scarlett Johansson, Jeremy Renner, Don Cheadle, Paul Rudd, Brie Larson, Karen Gillan, Danai Gurira, Benedict Wong, Jon Favreau, Bradley Cooper, Gwyneth Paltrow, and Josh Brolin. Avengers: Endgame is now available on Digital HD, 4K Ultra HD, Blu-ray, and DVD. Source: Disney Studio Awards (via comicbook.com) DC Universe Debuts ‘Doom Patrol’ Character Posters Along with the premiere of the first teaser for Doom Patrol, DC Universe also debuted a collection of character posters for each of the members of perhaps the strangest team of characters to be adapted in live-action form for DC Comics. In particular, these new character posters highlight Timothy Dalton's The Chief, Diane Guerrero's Crazy Jane, Joivan Wade's Cyborg, April Bowlby's Elasti-Woman, Matt Bomer's Negative Man and Brendan Fraser's Robotman. These posters each follow unique designs that reflect the nature of each character and tease unique personalities amongst the group as well. You can start the gallery of new posters by clicking "Next". Which of these Doom Patrol posters is your favorite? Are you excited to see what the cast brings to these roles? Sound off in the comments below, and be sure to continue following Heroic Hollywood for all the latest news in the DC Universe. Doom Patrol is a reimagining of one of DC’s strangest group of outcast Super Heroes which includes: Matt Bomer as Larry Trainor/Negative Man, Brendan Fraser as Cliff Steele/Robotman, April Bowlby as Elasti-Woman, Diane Guerrero as Crazy Jane, Joivan Wade as Victor Stone/Cyborg and Timothy Dalton as Dr. Niles Caulder/The Chief. Here is the synopsis for the show: “Doom Patrol will find the reluctant heroes in a place they never expected to be, called to action by Cyborg, who comes to them with a mission hard to refuse, but with a warning that is hard to ignore: their lives will never, ever be the same.” Doom Patrol will premiere on February 15, 2019 exclusively on DC Universe. Noah Villaverde Cinema lover. Saxophone player. Coffee consumer. Chronic complainer. Oh, I also write. #TeamHeroic
cc/2020-05/en_middle_0016.json.gz/line4565
__label__cc
0.694096
0.305904
About HFA HFA Team Our Search Process Success After the Hire Board of Directors Search Leadership Pipeline Program Reference Auditing Careers at HFA Howard Fischer Associates’ Client Druva, Inc. Receives a New $130 Million Investment Lisa Graham2019-06-28T16:56:46+00:00 The latest investment raises the valuation of the company to more than $1 billion HFA client Druva Inc, a cloud data protection provider, has reached unicorn status – a valuation above $1 billion – with its latest round of funding, led by Viking Global investors, pushing total capital raised to $328 million. New investors Neuberger Berman and Atreides Capital and existing backers Riverwood Capital, Tenaya Capital, and Nexus Venture Partners also took part in the deal. The latest investment will be used to fuel growth and global expansion, as well as drive new product innovations. HFA recently helped Druva place Holly Cafiero as Chief Human Resources Officer. Holly brings nearly two decades of experience, at businesses including Cloud Technology Partners (HP), EnerNOC, and Hologic. Built on Amazon Web Services (AWS), Druva’s software-as-a-service platform provides data backup and restoration, ransomware recovery, and other services. Their solution is in a market dominated by legacy hardware vendors, and Druva enables customers to eliminate complexity and drive down costs by up to 50 percent. To learn more about Druva, please click here. Get in touch to get started. 1800 Kennedy Blvd. 10020 N. De Anza Blvd. One Marina Park Drive 222 Merchandise Mart Plaza, Suite 1225
cc/2020-05/en_middle_0016.json.gz/line4566
__label__cc
0.564414
0.435586
Series: Cinema Classics For our August Cinema Classics screenings, we proudly present Frank Capra’s screwball comedy classic, IT HAPPENED ONE NIGHT. The screening on 8/10 is free for Hollywood Theatre members! (1934) Claudette Colbert and Clark Gable make an iconic pairing as Ellie and Peter, a wealthy heiress in a scandalous marriage and an out-of-work newspaperman who sees Ellie’s plight as just the story to revive his career. Considered the forerunner of the screwball genre, IT HAPPENED ONE NIGHT changed the face of American screen comedy forever, bringing a sense of zippy wordplay, ever-escalating absurdity, and Depression-era class consciousness to the Hollywood romance. The first film to win all five major Oscars (Picture, Director, Actor, Actress, and Screenplay), it paved the way for legions of Hollywood romantic comedies to follow. Format Digital Runtime 105min Assistive Listening Available
cc/2020-05/en_middle_0016.json.gz/line4576
__label__wiki
0.66382
0.66382
Home Education & Community ‘Million scream’: Hong Kong protesters belt out slogans from their windows every... ‘Million scream’: Hong Kong protesters belt out slogans from their windows every night at 10pm “I’m mad as hell and I’m not going to take it anymore,” cried Howard Beale, the ranting television anchor in Sidney Lumet’s 1976 flick Network, as he urged viewers to thrust their heads of their windows and repeatedly scream the phrase. Driven to the edges of sanity, the ill-fated protagonist lets loose against what he saw as the corporate injustices of the world – not by protesting, but by simply belting out his rage. Hong Kong protesters have perhaps taken cue from the noisy tactics espoused by Lumet’s character in what has been dubbed the “Million Scream” ⁠— a call, that began on August 19, to shout protest slogans from apartments every night at 10pm. File photo: inmediahk.net When the clock strikes the hour, a chorus of cries can be heard reverberating across districts, with slogans popularised by pro-democracy protesters ⁠— including “five demands, not one fewer” and “Hongkongers, add oil” ⁠— echoing between high-rises. The grassroots practice represents one of the more playful tactics adopted by protesters in the recent wave of unrest, sparked by the government’s controversial extradition bill, now-pending withdrawal. Meanwhile, netizens have touted the practice as a way to spread the message of the movement while expressing frustration and showing solidarity among supporters. As communities across the city mobilise, the slogans that were once largely confined to rallies in central Hong Kong have since crept into the lives of those on the fringes. In a clip shared by Stand News on Sunday, students from two secondary schools in Kwai Tsing were filmed shouting the protest slogan “liberate Hong Kong, the revolution of our times” across to one another. Hours after Chief Executive Carrie Lam on Wednesday conceded to axing the reviled legal amendment, residents across the city took to their windowsills to voice their unhappiness with the embattled leader, who many accused of failing to answer to the other four core demands of demonstrators. ‘Boost morale’ “We shout at night not because we are crazy. We shout to prevent us and our city from going crazy,” 35-year-old teacher Ms Lee told HKFP. In recent evenings at around 10pm residents in my Tai Koo Shing neighbourhood shout “add oil” and “HK people” from their windows… like this: pic.twitter.com/1EuDWppjJx — Nan-Hie In (@nanhie) September 3, 2019 Lee said she began the practice from her Southern District apartment a fortnight ago after reading about it on the Reddit-like forum LIHKG. In order to avoid detection, she limits shouting sessions to around four to five times a week on random days and does not do it in the streets. “I think shouting can boost morale among protesters… [They] can feel trust and support within their community,” she said. “I felt very touched and supported when I first shouted and my neighbours responded to me, though I couldn’t locate them. So I continue to do it.” 你今晚嗌咗未? Netizens share videos of their #AntiELAB MillionScream experience. This is in Fanling: pic.twitter.com/16qIxTJX9w — #AntiELAB Fight for Hong Kong (@Fight4HongKong) August 22, 2019 Lee added that although her area is middle-class and home to many civil servants and police, residents continue to come out in force, howling for minutes on end despite occasional complaints from neighbours who have shouted foul language in return. So what’s the 10 o’clock verdict on Carrie’s gambit? Oh … (Sound on) pic.twitter.com/eTyRStbKIa — Steve Dunthorne (@Steve_Dunthorne) September 4, 2019 But this unorthodox form of protest is not unique to the city. Cacerolazo is a practice where demonstrators omit words altogether by banging kitchen utensils together to draw attention to grievances. Popular across South America, it has its roots in the 1971 Chilean protests against food shortages under President Salvador Allende. During the 2012 Argentine protests against President Cristina Fernández de Kirchner, disgruntled residents also took to the streets in a clamorous display of discontent against government corruption. And in 2013, cacerolazo was used in the Gezi Park protests against Turkish leader Tayyip Erdogan, who remains in power today. A similar tradition, known as Elvavrålet or the “eleven roar,” was played out in Lund in the 1970s when Swedish students would scream at 10 or 11pm to relieve stress. More recently, protesting crowds screamed “helplessly at the sky” against current US President Donald Trump on the one-year anniversary of his 2016 election in a collective show of angst against the polarising political figure. As for Lee, she says she was inspired to take part in the “Million Scream” by Chinese writer Lu Xun’s “iron house theory,” which stipulates a group of people in a house made of iron with no windows and limited air supply. Those who are awake must decide whether to disturb the others so they can find a way out of the house and prevent everyone from suffocating to death. “What we are doing now is waking up everyone in Hong Kong, the iron house, to fight and strive for survival,” she added. “For those who are awake, [they] should shout and wake up those who are sleeping. As long as people are shouting, there is hope.” Previous articleTiny homes: how Hong Kong’s reality became a hipster revolution Next articleUS ‘almost certain’ to pass HK human rights act With love from Taiwan: Supporters send gas masks and filters to Hong Kong protesters Video: Sexy tutors – the cram school entrepreneurs with a risqué side-business ‘I can’t sleep, I can’t eat’: How Hong Kong’s extradition bill crisis is affecting the city’s refugees and asylum seekers
cc/2020-05/en_middle_0016.json.gz/line4578
__label__cc
0.59061
0.40939
Minnesota Catholic bishops have declared January 4 "Immigration Sunday." Religious Left Puts Immigration Spin on Epiphany James R. Edwards, Jr. The Minnesota Catholic bishops have declared January 4 “Immigration Sunday.” In truth, they mean pro-amnesty Sunday or illegal immigrant Sunday. To be sure, there’s more of posturing than of piety in this spectacle. U.S. Catholic bishops, along with Protestant elites in the decrepit mainline denominations, are optimistic about the chances of winning a renewed legislative fight over immigration. They believe larger majorities in an all-Democrat Congress and a new, liberal, Democratic administration improve their prospects. That is, amnesty backers in clerical garb are betting on a lot of “hope and change” in Washington come 2009. January 4 is the Christian feast day known as Epiphany. This feast celebrates Jesus’ incarnation and the visit of the Magi. But the Minnesota Diocese of New Ulm’s Hispanic ministry director has redefined that signal event to serve the hierarchy’s political purposes. The Star-Tribune quoted her, “That feast celebrates the unity of being one human family. This is a chance to recognize and celebrate the gifts and benefits immigrants share with us.” Huh? Really? Her spin on Epiphany could be read as stretching the truth — otherwise known as bearing false witness. No statements or activities by Big Religion give balanced Christian perspectives. Rather, they assume illegal aliens should be legalized and gain their ultimate goal: permanent U.S. residency, even American citizenship. These religionists favor expanded legal immigration (though it’s choking the system and the country already), cheap foreign labor for their Big Business allies and ending any real enforcement. Texas Cardinal Daniel DiNardo endorsed a 2002 Bishops Conference policy position, backing mass amnesty. He recently participated in a one-sided conference in Houston called “Clergy Summit: Welcoming the Stranger and Immigration Reform.” DiNardo claimed amnesty is the only way. “Without some form of broad-based legalization, the problems will just fester and fester,” he told the Houston Chronicle. The Minnesota nun quoted before asserted to TV affiliate Fox News 12, “”People have a right to migrate, to look for a better life for their families and at the same time acknowledging that countries have a right to protect their borders but do it in a just a[nd] humane manner.” I’ve got news for this nun and her ilk. No, people don’t have some inherent right to force themselves on a sovereign nation or to migrate without conforming to the specific terms and conditions that nation sets for their stay. Rather than lobbying for amnesty, opposing the faithful enforcement of immigration laws, labeling opponents as “hateful” and “anti-immigrant” (as did a Methodist bishop at the Texas conference in November), religious officials should try to foster honest debate and resolution of this issue. But that would require their neutrality in the political fight. These political advocates in robes and collars should have the decency to acknowledge that Christians’ views opposite to legalization are legitimate. They should give their fellow Christians a fair hearing. They should defend them from name-calling and Leftist tactics intended to stifle open debate. And they should drop the political gamesmanship: picking sides against the majority of their lay members in a legitimate, political issue on which both sides may claim moral authority. What’s more justifiable a biblical position than Romans 13, where the Apostle Paul teaches obedience to civil laws? The state doesn’t wield the sword of justice for nothing. Or taking the many Scripture passages about protecting the innocent and the powerless in the context of the law-abiding? That would make public laws protecting citizens from unjust labor competition laudable — and strategically inconvenient for the open-borders, antinational sovereignty religionists. The purpose here isn’t to rebut every factual error, false assumption or wrong claim put forth by the mouth of open-borders clergy (indeed, that’s way too big a job for a single op-ed). Instead, it’s to urge church-going Americans who disagree with their denomination on immigration to speak up on January 4. We in the pews can speak with our pocketbooks. Congregant victims of immigration brow-beatings may withhold tithes and offerings on January 4. Some might want to drop it in the offering the following week. Others might want to donate that month’s offering to an independent ministry that’s not an amnesty advocate (be careful, many religious groups involved with refugees are in league with the proamnesty forces because of government payouts they profit from.). On January 4, celebrate Epiphany for what it is: remembrance of Jesus’ coming incarnate and the Magi’s trek to the Savior. Don’t let organized religion politicize this important occasion with their liberal immigration policy agenda. No Permanent Majorities in America Life On The Straight Edge Written By James R. Edwards, Jr. James Edwards is coauthor of "The Congressional Politics of Immigration Reform."
cc/2020-05/en_middle_0016.json.gz/line4580
__label__wiki
0.526626
0.526626
Blog | Subscribe | Free Trial | Contact Us | Cart | Donate | Planned Giving Log In | Activate Digital Subscription | Search — Main Menu —Current - Fall 2019 - Blog - You Should Know - Hot Topics - A Pastor’s Reflections - About Us - - Contributors - - Free Articles - - All Issues - In The News - FROM THE EDITOR DINNER - GREAT DEFENDER OF LIFE DINNER 2019 - HOST COMMITTEE Great Defender of Life Dinner 2019 - SPONSOR TABLE Great Defender of Life 2019 Dinner Ticket - Great Defender of Life 2019 Dinner Ticket - DINNER JOURNAL ADVERTISING 2019 LEGACY - Planned Giving: Wills, Trusts, and Gifts of Stock Archive - Archive Spotlight Shop - Cart A Pastor’s Reflections GREAT DEFENDER OF LIFE DINNER 2019 HOST COMMITTEE Great Defender of Life Dinner 2019 SPONSOR TABLE Great Defender of Life 2019 Dinner Ticket Great Defender of Life 2019 Dinner Ticket DINNER JOURNAL ADVERTISING 2019 Planned Giving: Wills, Trusts, and Gifts of Stock Archive Spotlight 40 years of Life-Defending Legal Articles At Your Fingertips Koinonia: 77 Years of Fertile Faithfulness B G Carter In the beginning was the idea of a community of Christian believers who would hold and share all goods in common. Biblically described in Acts 2:44-45, this community (in Greek, a koinonia and pronounced “coy-no-knee-ah”) harnessed both the fecund imagination and the fiery zeal of Clarence Jordan—a Bible-toting, Bible-quoting Southern Baptist Minister. Despite his trenchant sermons, his delivery came in a Southern drawl with pungent humor. Moreover, his text often derived from a Greek-language New Testament, a portion of which he translated over several years into a “Cotton Patch” version couched in rural, earthy language. Holding a master’s degree in theology and a doctorate in New Testament Greek, this model farmer was intent on knowing directly and thoroughly the original meaning of the written word. To this communistic idea of common ownership with distribution according to need, Jordan brought the concept of do no harm, which had come to him in a circuitous but nonetheless dramatic fashion. Upon entering the University of Georgia’s agricultural college in 1929, Jordan’s goal was to acquire the necessary scientific knowledge to heal the land. By graduation, he expected to be awarded not only his baccalaureate but also his Army commission as a reserve 2nd Lt. in the Cavalry. However, during field exercises the summer before graduation, Jordan experienced his own somersaulting epiphany. While on horseback, one hand gripping a pistol for plugging cardboard dummies with the other brandishing a saber for stabbing the straw ones, Jordan confronted the grave incompatibility of preparing to kill one’s enemies with his Lord’s teaching to love even one’s enemies. Dismounting quickly, Jordan reported to the field commander that he no longer sought the military commission. When that officer suggested a chaplaincy as a palatable compromise, Jordan simply replied that he could not encourage anyone to do what he himself would not. Thus, the seeds of pacifism and non-violence were planted into his consciousness. (Their subsequent fruit blossomed into a welcome for conscientious objectors, opposition to the draft, and Jordan’s unwillingness to join the massive civil rights demonstrations because such protests in themselves incited violence.) The idea of koinonia acquired form quickly when Clarence and his wife Florence were joined in 1941 by a like-minded couple—Martin and Mabel England. On leave from Burma, these American Baptist Missionaries shared the Jordans’ passion to establish a demonstration plot for godly, community living. By the summer of 1942, the two couples had incorporated Koinonia Farm. Begun on 440 acres of poor red dirt near the plain city of Americus, nine miles from former President Carter’s hometown of Plains, Georgia, the community bravely espoused sharing, non-violence, and respect for all, including the land. That fervent respect for land has nourished Koinonia’s farming and borne its own fruit in the community’s organic and biological practices. Despite its non-confrontational and quiet ways, Koinonia really was a witness to a different way to work and live. During the 1950’s, particularly after the U.S. Supreme Court’s repudiation of school segregation, its witness to this difference incited some neighbors and other opponents to systematic violence. Night-riders and the Ku Klux Klan sought to intimidate. Bullets and bombs were used routinely, all in the vehement yet vain attempt to persuade this community to leave. Although one promising alternative farm site was found in New Jersey (should Koinonia be forced to relocate), further exploration revealed that people there also opposed a community where black and white folks lived together. By the mid 1950’s Koinonia routinely stationed its unarmed members and willing visitors in night-watch cars to discourage attacks by flares and fires. The Catholic Worker’s doughty editor, Dorothy Day, one night met the depth of hostility. That night, while seated in a watch car, a rifle bullet ripped through the car’s hood, ricocheted off its steering wheel, and fell flat at her feet. Although the air was cool, she refused the offer of a coat to quell her trembling chill, remarking “That ain’t cold, baby, that’s scared.” In the face of ostracism and brutality, Koinonia held steady to peace and patience, to forgiveness, and to a shared life in scorn of the consequences. On one occasion, the hostile measures against Koinonia prompted a novel counter-measure that has proven successful, and nearly indispensable for economic stability, for more than 60 years. Following two bombings that destroyed its roadside markets, in 1957 local enemies began a business boycott that denied Koinonia agricultural supplies and sought to prevent the farm from selling any of its produce or products. In swift response, Koinonia inaugurated a mail-order campaign under Jordan’s appeal “to help us ship the nuts out of Georgia.” Its success in selling Georgia pecans and peanuts at that turning point was immediate and phenomenal. Even today, sales by mail, phone, and on-line provide the community’s main source of income. When Koinonia counts its blessings, the list of long-term, faithful friends spans the decades. In the earliest years, egg production was important. Learning that Koinonia’s practices paralleled those of his own Mennonite community, one Virginia poultryman sent a brood of chicks. Later, filling the desperate need for experienced farm managers, Joe Maendel—a stout Hutterite with long beard, heavy German accent, and baggy pants—stayed on many occasions and kept in smooth operation both farm hands and farm equipment. Koinonia’s requests for money to buy land and build affordable homes were answered by many on its 12,000 person mailing list. When its property insurance was cancelled, risking violation of its mortgage, 2,000 friends pledged to fund an insurance guarantee of $50 a donor. Each outreach built upon some earlier, similar effort. In September of 1976, during a two-day meeting in the back end of Koinonia’s fruit cake and candy kitchen, Millard Fuller, Don Mosley (then Koinonia’s director), and other impromptu chefs “cooked up” the recipe for what was to become Habitat for Humanity. Its colossal success in providing decent housing to 22 million people was built upon Koinonia’s ventures into partnership housing and a Fund for Humanity. In turn, the Fuller Center for Housing (today active in the U.S.A. and in 16 other countries) held its 2005 inaugural meeting at Koinonia with a commitment to be “faith-driven and Christ-centered.” Beyond institutions and organizations is the fragrant fruit of Koinonia’s fostering other communities of faith. In the spring of 1979, three Koinonia couples (the Karises, Mosleys, and Weirs) left Koinonia’s secure plot in South Georgia to journey to North Georgia’s frontier. There, near the small town of Comer, they pitched their tents and waited for God. During nearly two years of seeking direction, these couples prayed and studied scripture. The themes of peace and justice, particularly those found in Isaiah, intrigued them. They recalled vividly Jesus’ endorsement of the ancient Jubilee as recorded in Luke 4:16-30. There, in Nazareth’s synagogue, the Christ read Isaiah’s passage and announced that the Spirit of the Lord had anointed him. He was to preach; to heal; and to set at liberty the oppressed. Upon reflection, the concept of a Jubilee—a time of recovery, renewal, and restoration—married wholesomely with Clarence’s own concept of partnering with God immediately and universally. Possibly their temporary shelter, as well as its flies, mosquitoes, and heat waves, contributed to their recognition that many of God’s children were destitute and fearful. These children of our Spiritual Father were not simply bothered or inconvenienced. They had neither food, shelter, nor safety! So many were refugees, beset and beleaguered by gang violence, ethnic cleansings, and tribal warfare. Why not partner with God and help bring about a Jubilee to them? They imagined the joy that would be their own as well as the joy they might share with them. Calling their community “Jubilee Partners,” they sought to welcome immigrants from war zones around the world; to teach them a language and urban skills. To date, Jubilee Partners has helped relocate more than 4,000 refugees. Eight years later, Ed and Mary Ruth Weir answered a calling to provide hospitality to the families of death row prisoners as well as to protest the death penalty and executions. Leaving Northeast Georgia, they relocated in 1988 to an area south of Atlanta near the Georgia Diagnostic and Classification Prison and there planted their witness, naming it “New Hope House.” Because Ed had worked for the National Security Agency and Mary Ruth for the C.I.A., few observers doubted their hard-headed realism or their heart-pounding love for all creatures— black or white, big or small. Koinonia was founded in 1942. Clarence Jordan died in 1969. How is it that his vision is alive one-half century after his death, and what’s the explanation for Koinonia’s achieving this year its 77th anniversary? In the early years, healing the eroded land led to the planting of pecan trees, next the harvesting and sales of their fruit. As Koinonia matured, it birthed partnerships for local and international housing, for refugees, and for the imprisoned. Today, Koinonia’s retreats, spiritual workshops, and internships invite all who wish to experience the vibrant and wholesome challenge of living together in one of God’s demonstration plots. Once Jordan was asked whether he deemed Koinonia a success. He replied that, in his opinion, God was less concerned with success than with faithfulness. Once the apostle Philip declared to Nathanael that he had found the Messiah. In reply, Nathanael warily asked whether anything good could come from Nazareth. Now, those who are acquainted only with the mean racism and bitter violence directed against Koinonia in past years also might wonder whether anything good could come out of Georgia. A Messiah from Nazareth? His loyal, humble minister from Georgia? The first they crucified. The second they ignored even in his death. Still, the proof of the truth announced by the Messiah and evinced by his minister is found in Koinonia’s fertile faithfulness. To erase Nathanael’s doubt, Philip merely replied, “Come and see.” And that remains Koinonia’s invite. Y’all, come! All of you. Come and witness the fertile fruit of faithfulness. Come partner with our community. Share with us God’s abundant, unending blessings. For more information about Koinonia Farm, please visit the website (www.koinoniafarm.org). 156 people have visited this page. 1 have visited this page today. B G Carter, a graduate of Mercer University, has an MA and PhD from the University of Maryland. While writing his dissertation, “Genes and Politics,” he spent a semester interning at the Hastings Center. For many years he operated small businesses in the French West Indies and Florida Keys. He is currently working on a novel. Jamie Olwell August 7, 2019 at 7:26 pm Reply Dear BG Carter, Thank you for this inspiring article. Having some knowledge of the farm, your blog truly made me want to visit! Bren Dubay August 19, 2019 at 5:17 pm Reply Your succinct, beautifully written article brought tears to my eyes. I live this life at Koinonia. The life can be hard at times, but it never fails to be fulfilling. To see this life anew through your eyes and hear it through your writer’s voice lifted my spirits. We carry on. Thank you for inspiring us to do so. Come see us! Laurajean Harbour August 25, 2019 at 8:34 am Reply Mr. Carter’s article is not only beautifully written but, it has left an indelible mark on my mind. Reminding me that even in the face of adversity and amidst the virulent decay of moral values in our society today, there are still good people doing good work and doing it well, for the long term. Thank you for this thoughtfully written piece. Mark Becker September 30, 2019 at 10:19 am Reply Excellent! Very inspiring! Melissa Stires October 16, 2019 at 11:27 am Reply What an incredible article Mr. Carter has written for us. I am moved by the resilience and faith these families. In today’s day and age, the opinion, “God was less concerned with success than with faithfulness” is rare and an example to all. I hope Mr.Carter continues to share these eloquent stories and truths for all of us to enjoy. William E. May: An Appreciation Unborn Child at Forty The Pro-Choice Abuse of Logic Get the Human Life Review Human Life Foundation Blog Free Trial Issue Tweets by @HumanLifeReview Human Life Review/Foundation The Human Life Foundation, Inc. The Human Life Review 271 Madison Avenue, Room 1005 Copyright (c) The Human Life Foundation.
cc/2020-05/en_middle_0016.json.gz/line4581
__label__cc
0.692107
0.307893
Baha'-Allah and the Shi`i Du`á Saḥar, the Dawn Prayer ascribed to the fifth Imam Muhammad al-Baqir (d. c.126/743). Home › Baha'-Allah and the Shi`i Du`á Saḥar, the Dawn Prayer ascribed to the fifth Imam Muhammad al-Baqir (d. c.126/743). The opening lines of the Dawn Prayer of Muhammad al-Baqir. O my God! I beseech Thee by Thy Bahā' (Splendor) at its most splendid (abhā') for all Thy Splendor (bahā') is truly resplendent (bahiyy). I, verily, O my God! beseech Thee by the fullness of Thy Splendor (bahā'). Baha'-Allah and the Shi`i Du`á al-Saḥar (The Dawn Prayer) attributed to Imam Muhammad al-Baqir (d. c.126/743). Early Lambden Beta trans from old UK Website: PDf. Shi`i Dawn Prayer = Du`a al-Baha' WI.pdf The prayer cited above and fully translated and commented upon elsewhere on this website, is ascribed to the fifth Imam Muhammad al-Bāqir (d. c.126/743) and exists in several versions. The text can be found in numerous Twelver Shi`i devotional compilations often in sections dedicated to the Ramaḍān period. Perhaps its most famous printing is in the Mafatīḥ al-Jinān ("Keys of the Paradises") a very large (795 pages + indexes) devotional compilation by the twelver Shī`ī scholar Shaykh `Abbās al-Qummī (d. 1319/1901). In various of the numerous editions and printings of this book the Du`ā' al-Saḥar is referred to and indexed as the Du`ā' al-Bahā' (lit. `The Supplication of Splendor-Glory-Beauty'). In introducing this supplication al-Qummī writes, outlining the pious actions to be carried out during Ramaḍān period, "One should supplicate by means of the Mighty, Substantial Devotional (al-Du`ā' al-`azim al-sha`n) which has been transmitted by [the eighth Imam `Alī ] al-Riḍā' [d. 203/818]... He stated, "It is the Supplication (al-du`ā') of [the fourth Imam Muhammad] al-Bāqir [d.c. 126/743] for the dawn times (asḥār) of the month of Ramaḍān" (Mafatih, [reprinted] Beirut: Dār Iḥyā al-Turath al-`Arabī, 1422/2001, p.221). Different versions of the Du`ā' al-Saḥar/Du`ā' al-Bahā' are footnoted by al-Qummi in his Mafatih al-Jinan. He writes: "We are found a transmission from [Imam Ja`far] al-Sadiq [d.c. 148/765] in the Du`ā' yawm al-Mubahalah ["Supplication for the Day of Mutual Execration] which differs from the above [printed text]. Note also the differences between the recension (nakhsh) of the Shaykh [al-Ṭā`ifa = Abu Ja`far Muhammad ibn Ḥasan al-Ṭūsī (d. 460/1067)] and the recension (nakhsh) of the Sayyid [Add] (p.221 fn.1). These two aforementioned Shi`i authorites, al-Ṭūsī and al-Sayyid [ADD] then cite somewhat different versions of the Du`ā' al-Saḥar/Du`ā' al-Bahā'. The naskh of the Sayyid is probably that contained in the مصباح المتهجد Misbāḥ al-Mutahijjad [al-Kabir] ("The [Greater] Lamp of the Nightly Vigil") of al-Ṭūsī.... As far as the text of the Du`ā' yawm al-Mubāhalah -- printed, for example, in the Mafatīḥ al-Jinān see ed. cited pp. 320-323 and the Miṣbāḥ of Taqī al-Dīn al-Kaf`āmī (d. 900/1494-5) editions Beirut, 1414/1994, pp. 911-918 and Beirut, 1425/2004, pp. 879-881) -- transmitted by Ja`far al- Ṣādiq see my note and translation at : The Du`ā' al-Saḥar is recited by Shi`i Muslims at dawn times during the fasting month of Ramaḍān. This amazing prayer was very precious to the Bab who quoted or re-revealed it numerous times in his Kitab-i Panj Sha`n (Book of the Five Grades) and Kitab al-asma’ (Book of Names). His naming of the months of the Babi-Bahā'ī year is closely related to various of the divine attributes found within this and related versions of the Dawn Prayer. The first line of the Dawn Prayer of Muhammad al-Baqir (see above), contains no less than five terms derived from the same triliteral root from which the verbal noun bahā' and the superlative abhà (all-glorious) is derived, including bahiyy (= `resplendent', `radiant', `glorious', `luminous', etc.). Bahā'-Allāh drew attention to this in a number of his Arabic and Persian scriptural Tablets. Examples of Babi-Baha'i basmala openings drawing upon the Du`a al-Sahar. The Bab changed the Islamic basmala from bismi'llah al-rahman al-rahim, “In the name of God the Merciful the Compassionate” to “bi-ism Allah, al-amna` al-aqdas,” "In the name of God, the Inaccessible, the Most Holy.” Baha Allah, likewise, thousands of times, recreated and refashioned the basmala at the commencement of his scriptural Tablets. Many of these new basmala openings are influenced by the opening words of the Shi’i Ramadan Dawn Prayer, incorporating the words Baha' /al-Baha' (glory, splendor…), Bahiyy /al-bahiyy (splendid, luminous, glorious...), and Abha /al-abha (All-Glorious, Most splendid, etc.). This sometimes in line with the original baha' related Dawn Prayer opening. One of the most important printed volumes of scriptural Tablets of Baha'-Allah is that complied from writings addressed to the Shaykhi, Babi and Baha'i background disciple Muhammad Kázim Qazvini or Shaykh Kazim Samandar (d. Qazvin, 1918) as well as certain of his relatives. Entitled Ayat-i bayyinat ... , this compilation of Arabic and Persian writings, includes texts with a number of basmala and other passages within short epistles of considerable interest. One such four or so page Arabic Tablet ( no. 12) contained within in the Ayat-i bayyinat (pp.10-13) is a letter or "book" of Baha-Allah which commences ( like many others) with an echo of the Shi`i Ramadan Dawn Prayer : In the Name of God, the Splendid, the All-Glorious (bismi'llah al-bahiyy al-abha)! This is a letter from the Primal Point (nuqtat al-ulya) and His Baha' (Splendor-Glory...) unto he who was named in the Empyrean of Names (jabarut al-asma') as [Muhammad] Kazim [Samandar]. He was indeed reckoned one of those written down in the Archetype [Mother] of the scriptural Tablets (umm al-alwah) by the Pen of the Cause (qalam al-amr) as one of the believers. O Kazim! The breezes of holiness of the Mighty, All-Enduring Dove (varqa') repeatedly maketh mention of thee in wondrous Arabic melodies. Miscellaneous Du`a al-Sahar opening rooted phrases and benedictions. We have already noted that Bahā'-Allāh several times specifically commented upon the Arabic Ramadan dawn prayer. He frequently cited or alluded to it. We again give a few examples from passages within his Tablets addressed to Samandar. There exists, for example, writings in which sections of the first line of the Ramadan Dawn Prayer are quoted or refashioned. Referring to Samandar in one Tablet Baha’u’llah states: if the substance of this letter were sent to the beloved of the inmost heart of his eminence Samandar, may the fire of divine love be upon him, through all of the Bahā' (glory) at its most splendid (abha-hu) ... (Ayat-i bayyinat, No. 152 pp.[209-10], 209). Another slightly variant example is found within a section of text extant within a ms. Tablet of Baha'u'llah to Hadrat-i ism-i Zayn [al-Muqarrabin] dated 18th Dhu'l-Hijjah 1300 (=18th October 1883 CE): ... His eminence Ism-Allah jim-mim ["J" "M" = Jamal = Jamal-i Burujirdi (?)], upon him be of the fullness of Bahā' (Splendor) at its most Splendid (abhā'-hu)..." (Brit. Library mss. Or 15700, 4). In many of his Arabic and Persian scriptural Tablets (alwāḥ) Bahā’-Allāh cites or partially cites the opening lines of the Ramadan Du`a al-Sahar. He often draws on or utilizes its phraseology or terminology in benedictions upon Babi-Bahā'i persons. In an untitled Persian Tablet headed `He is the Powerful, the Transcendent, the Sanctified, the Exalted, the All-Glorious', a benediction is uttered upon the young Bahā'i martyr Āqā Buzūrg-i Khurasānī (executed 1871 CE) who was entitled Badī` ("Wonderful") the Du`a al-sahar is cited though slightly modified as a phrase (the 2nd person suffix and the bi are omitted) `alay-hu min kull bahā' abha-hu ("upon him be all the Bahā' at its Most Splendid (abhā). An untitled Arabic prayer of Bahá'u'lláh There exists an Arabic prayer of Bahá'u'lláh -- headed "In the name of God, the All-Glorious (al-Abhá)" -- which opens with reference to the Shí`í Dawn Prayer, the first line of which it subsequently quotes. By means of this Dawn Prayer, God had been supplicated, Bahá'u'lláh meditates, by the tongue of His Messengers (rusul), beseeched through the "tongues of those who are nigh unto God". All, in fact, were commanded to recite it at dawntimes for it contains the "Greatest Name" and is a protection against being veiled from that Name (Bahá') which is the "ornament" of God's "Self". (see AQA, Majmú`a-yi munáját 45-46). [22] لوح ميرزا عباس استراباد Extract from a Tablet of Baha’u’llāh to Mīrzā `Abbās Āstarābadī about the Greatest Name of God (Per. ism-i a`ẓam).. Tablet to Mírzá `Abbás of Astarábád Persian text from Mā’ida-yi Āsmānī, Vol. 4: 23 In a Persian Tablet to Mírzá `Abbás of Astarábád sometimes referred to as the Lawh ism-i-a`zam ("Tablet of the Greatest Name"). Bahá'u'lláh quotes from the beginning of the Ramadan Dawn Prayer and observes that the "people of al-Furqán" (= Muslims) have not heeded the fact that the "greatest name" was said to be contained within it; indeed, at its very beginning! (refer Má'idá 4:22-23 cf. ibid, 7:97). [22] In a Persian Tablet to Mīrzā `Abbās of Astarābād sometimes referred to as the Lawḥ ism-i-a`zam, "Tablet of the Greatest Name", Bahā’-Allāh quotes from the beginning of the above quoted Dawn Prayer and observes that the "people of al-Furqān" (= Muslims) have not heeded the fact that the "greatest name" was said to be contained within it; indeed, at its very beginning! (refer Mā’ida 4:22-23 cf. Mā’ida 7:97). بنام خداوند يكتا ... كتابت در سجن حاضر و توجه اليه طرف المظلوم الّذی دعا الكل الی اللّه المهيمن القيّوم و صدر آن باين كلمهء مباركه مزين بود مشاهده در غفلت اهل فرقان نمائيد مع آنكه از قبل فرمودهاند كه اسم اعظم الهی در اين دعا مذكور است و نزد صاحبان بصر بسی واضح و مشهود است كه مقام ذكر اسم اعظم در اول و ابتدا بوده چه كه مقدم بر اسمإ و مبدأ و مطلع اذكار است و در صدر دعای مذكور واقع شده با وجود اين جميع انكار نموده و عارف بحق او نشدند بلكه فتوی بر قتلش دادند الّا من حفظه اللّه بالحق و انقذه من بحر الاوهام انّه لهو المقتدر ... القدير Persian text from Mā’ida-yi asmānī, Vol. 4: 23 translated by Stephen Lambden from the Persian text. published in Mā’ida-yi āsmānī, Vol. 4: 23. c.1980 revised 2007 - Last revised 17-05-2015. In the Name of God, the One. Thy letter arrived in the [Acre/`Akka'] Prison and the gaze of the Wronged One (al-maẓlūm = Bahā’u’llāh) who summoneth all unto God, the Help in Peril, the Self-Subsisting was directed unto it. The commencement (ṣadr) of that [communication] was ornamented with this blessed phrase (kalimat-i mubāraka), اللّهم انّی اسئلك من بهائك بابهاه “I, verily, O my God, beseech Thee through Thy Bahā’ (Splendour) at its Most Resplendent (bi-abhā-hu)…”. Thou art aware of the perfidy of the people of the Criterion (ahl al-furqān) [=Qur’ān = Muslims] despite the fact that they [certain of the Imams] indicated that the Greatest Name of God (ism-i a`ẓam-i ilāhī) is mentioned in this [Ramaḍan fasting] Supplication (du`ā) [of Imam Muhammad al-Bāqir]. And it is abundantly clear and evident on the part of the possessors of insight (ṣaḥibān-i baṣar) that the position (maqām) of the mention [in the Du`ā] of the Greatest Name (ism-i a`ẓam) is at its very opening or commencement. This since it has preeminence (muqaddam) over the [other Divine] Names (asmā’) and is the genesis (mubdā’) and dawning-point (maṭlā) of the [other] commemorative lines [of the Supplication] (adhkar) being mentioned and positioned at the very inception (ṣadr) of the Supplication (du`ā). In spite then of this all repudiated it and remained unaware of its Truth. Nay indeed! They [the Shī`ī] ulamā’ issued a fatwā for his [Bahā’u’llah’s] execution, save, that is, such as were, in very Truth, safeguarded by God and rescued from the ocean of idle fancies. He [God] indeed is assuredly the Powerful, the Potent. See also : http://hurqalya.ucmerced.edu/node/424/ An untitled Tablet of Bahā'-Allāh identifying and celebrating the word Bahā' in the Du`ā al-saḥar with himself as the ism al-a`zamm the Greatest Name of God. بسمي الذي به اشرق نور البيان ... ،اللَّهُمَّ إِنِّي أَسْأَلُكَ مِنْ بَهَائِكَ بِأَبْهَاهُ وَكُلُّ بَهَائِكَ بَهِيٌّ هذا اسم الله الاعظم الذي اخبر به حجة الله و برهانه ، لعمري ما ظهر ذكر ولا بيان اصرح من ذلك طوبى، للمنصفين، الملك والملكوت فى فبضة قدرة الله و رب العالمين هدا اسم ارتعدت منه فرائص المشركينالذي لم تمنعه الصفوف ولا اقوى جنود العالم يفعل ما يشاء ويحكم ما يريد وهو العزيز الحميد واطمئنت به افئدة المقربين، أقبل وقل In My Name through which the Light of Exposition (nūr al-bayān) hath radiated forth from the Horizon of Possibility (ufq al-imkān). O Thou who gazest towards the Countenance and are one mentioned before the Throne! Today the Tongue of the Proof in the Kingdom of Exposition (malakūt al-bayān) giveth utterance to this Elevated, Blessed, Word (kalimat-i mubāraka-i `ulyā') : "O my God! I beseech Thee by Thy Bahā' (Splendor) at its most Splendid (abhā') for all Thy Splendor (bahā') is truly resplendent (bahiyy)..." This is the Greatest Name of God (ism Allāh al-a`ẓam) which was announced by the proof of God (hujjat Allāh) and His evidence [the messianic Imam]. By My Life! There hath not appeared either any mention (dhikr) nor any evidence (bayān) more lucid (aṣraḥ) than this. Blessed then be such demand justice (ṭubā li'l-munṣifiyyin)! This is a Name through which the limbs of the unbelievers (farā'iṣ al-mushrikīn) hath been made to quake and whereby the hearts of those who are nigh unto God (afida al-muqarrabīn) hath been made tranqil. So draw ye nigh and say: `The Kingdom and the Kingdom of God (al-mulk wa'l-malakūt) are in the grasp of the power of God, the Lord of all the worlds! He it is whom the [ military] ranks (al-ṣufūf) cannot hold back nor the powers of the hosts of the world (junūd al-`alam) overpower him. He doeth whatsoever He willeth and ordaineth whatsoever He pleaseth for He is One Mighty, Praiseworthy" (trans. Lambden from Behmardi, ed. La`ali-yi Ḥikmah II:183). The above cited and translated scriptural Tablet of Baha'-Allah, clearly identifies the words relating to the Arabic root of baha' in the Dawn Prayer, with the Mightiest or Greatest Name of God (ism Allāh al-a`ẓam). The Lawh-i ibn-i-Dhi'b ("The Epistle to the Son of the Wolf" c. 1891 CE) In his last major work of compilation, The Epistle to the Son of the Wolf , Bahā’-Allāh refers to the Shi`i Ramadan Dawn Prayer. He exhorts Shaykh Muhammad Taqī Najafī (d.1914), should he enter the "Crimson Ark" (become a Bahā'ī), to face the "Ka`ba of God" (Bahā’-Allāh) and recite the opening line of the Shī'ī dawn prayer. Were this to be carried out, He promises him, even the "doors of the Kingdom" would be "flung wide" open before the face of the "son of the Wolf". This anti-Bahā'ī cleric did not read this prayer as directed; he never became a Bahā'ī.
cc/2020-05/en_middle_0016.json.gz/line4583
__label__wiki
0.695945
0.695945
Many studies have investigated the linkage between ventilation rates and the proportion of the occupants reporting sick building syndrome (SBS) symptoms or, less commonly, have investigated how ventilation rates affect the severity of SBS symptoms. Most studies have collected symptom and ventilation rate data from sets of five to 160 buildings or building spaces and assessed how symptom reporting rates were correlated with ventilation rates, using statistical models to control for potential confounding by other factors. A few studies experimentally manipulated ventilation rates in one or a few buildings, or in chamber facilities, and assessed how symptom reporting rates or symptom severity varied with changes in ventilation rate. Occupants were unaware of the ventilation rates during the various experimental periods. Considering the full set of studies, ventilation rates spanned a very broad range from zero mechanical ventilation and an uncharacterized amount of infiltration to total ventilation of more than 100 cfm (47 L/s) per person. In many individual studies, building ventilation rates spanned a smaller range from approximately 10 to 35 cfm (4.7 to 17 L/s) per person. Four critical reviews of this literature were identified. In the review by Seppänen et al. [23], 20 out of 27 studies found a statistically significant increase in reporting of at least one SBS symptom among occupants of the study buildings with lower ventilation rates. In nine of these studies, there was at least an 80% increase in the fraction of occupants reporting at least one of the types of SBS symptoms in the buildings with lower ventilation rates. The second critical review [37] was performed by an interdisciplinary group from Europe and concluded that “increasing the ventilation rate …..decreases the prevalence rates of SBS symptoms.” This interdisciplinary group also concluded that “ventilation rates below 53 cfm per person (25 liters per second per person) in offices can increase the risk of health and comfort problems”. The third review [38] by another interdisciplinary group concluded that “higher ventilation rates in offices, up to about 53 cfm [25 L/s] per person are associated with reduced prevalence of sick building syndrome symptoms”. The forth and most recent review [39] considered three studies of offices that had been published between 2000 and 2011. In two studies, symptoms decreased as ventilation rates increased or indoor CO2 concentrations decreased. However, in one of these studies increased ventilation rates failed to reduce symptoms when the particle filter was old and loaded with particles. The third study of offices included in this review had a contrary finding, increased ventilation rates were associated with increased general symptoms (e.g., headache, difficulty concentrating) but not mucosal or skin symptoms; however, the reliance on ventilation rate estimates (without measurements) was a major study weakness. Since 2011, a few additional studies have been published on the relationship of office ventilation rates with SBS symptoms. In Iran, within one of two study buildings most SBS symptoms increased with decreased ventilation rates; however, the study [40] did not control for the potential confounding by other factors. In a Malaysian study of 25 offices [41], SBS symptoms were not associated with CO2 concentrations; however, CO2 concentrations were very low (medians less than 560 ppm) implying very high ventilation rates. Similarly, in a U.S. study of 16 office spaces that had generally very high ventilation rates of 34 to 90 cfm (16 to 42 L/s) per occupant, the severity of SBS symptoms was not associated with ventilation rates. In a study of 87 rooms in Taiwan [42], with control for a broad range of potential confounding factors, there were statistically significant increases in throat symptoms, tiredness, dizziness, and any symptom, and nonsignificant increases in most other symptoms, with increased CO2 concentration. Symptoms increased about 10% to 20% for each 100 ppm increase in the difference between indoor and outdoor CO2 concentration. However, in a contrary finding, eye symptoms decreased as the CO2 concentration increased. A second study from Taiwan [43] compared prevalence rates of SBS symptoms at two different time periods within a single office building. Higher CO2 in the second monitoring period (mean 876 ppm) relative to first period (mean 431 ppm) was associated with increases in all symptoms but shortness of breath, skin irritation, and lower respiratory symptoms. The increases of about 75% were statistically significant for eye irritation, tired or strained eyes, dry, itchy, or irritated eyes; difficulty remembering or concentrating; and upper respiratory symptoms. Finally, in a small study of 170 workers in two offices of Malaysia [44], there were several-fold statistically significant increases in symptoms with higher CO2 concentrations in the old building, but no associations in the new building which had very low CO2 concentrations (below 478 ppm) implying very high ventilation rates. Thus, the newer research generally finds decreased SBS symptoms in offices with higher ventilation rates, but suggests no beneficial effects of increasing very high ventilation rates. The largest U.S. study of building characteristics and occupant symptoms is the EPA Building Assessment Survey and Evaluation (BASE) Study of 100 representative office buildings. Analyses of data from this study [45] indicate a general decrease in SBS symptoms as study space ventilation rates increase from as low as 10 cfm (4.7 L/s) per person up to approximately 25 to 35 cfm (12 to 17 L/s) per person, while current U.S. building codes and professional standards generally require a minimum of 15 to 20 cfm (7 to 9.4 L/s) per person in offices. Twenty percent to 30% fewer occupants reported SBS symptoms in study spaces with ventilation rates above 20 to 25 cfm (9.4 to 11 L/s) per person, compared to study spaces with lower rates typically ranging between 10 and 20 cfm (4.7 and 9.4 L/s) per person. In work performed for this IAQ Scientific Findings Resource Bank, the published data relating ventilation rates in office buildings with prevalence rates of SBS symptoms were analyzed statistically [46]. This analysis yielded a quantitative estimate of how, on average, the prevalence of SBS symptoms varies with ventilation rate per person. The key results are provided as Figure 4 which shows the estimated curve of relative SBS symptom prevalence (RP) plotted versus ventilation rate with RP equal to unity at a ventilation rate of 17 cfm (8 L/s) per person, which was, at the time, the minimum required ventilation rate for offices [based on an assumed default occupant density of 5 occupants per 1000 ft2 (93 m2)] in the applicable ventilation standard of the American Society of Heating, Refrigerating, and Air-Conditioning Engineers [47]. The central estimate of RP is indicated by the bold red line and the 95% confidence band is indicated by the shading. The RP increases from 1.0 to approximately 1.15 (95% confidence interval: 1.09 – 1.22) as the ventilation rate drops from 17 to 10 cfm (8 to 4.7 L/s) per person. RP decreases from 1.0 to approximately 0.67 (95% confidence interval: 0.55 – 0.81) as ventilation rate increases from 17 to 50 cfm (8 to 24 L/s) per person. At higher ventilation rates, the statistical uncertainty in RP becomes large relative to the estimated deviation from unity. Figure 4. Estimated relative SBS symptom prevalence in office workers versus ventilation rate. Interpretation of Figure 4 may be facilitated by the following application example. Consider a situation in which the SBS symptom prevalence is 20% when the ventilation rate is 17 cfm (8 L/s) per person. Based on the RP curve in Figure 4, one would predict an SBS symptom prevalence of 23% (20% times 1.15) with 10 cfm (4.7 L/s) per person of ventilation and a symptom prevalence of 13% (20% times 0.67) with 50 cfm (24 L/s) per person of ventilation. The findings also indicate that, on average, increases in ventilation rates above 50 cfm (24 L/s) per person will not substantially reduce SBS symptom prevalence although the uncertainty of the estimates are high in this ventilation-rate range. The analyses underlying Figure 4 have several important limitations. The amount of original data available in a useable form was quite limited and results published since 2008 were not included in the analysis. Only eight useable studies with 43 data points were identified. Because of the limited data, distinct analyses for different types of SBS symptoms were not performed. In actuality, the relationship of ventilation rates with SBS symptoms may vary with symptom type. In addition, one would expect the relationship of SBS symptom prevalence with ventilation rate to vary depending on the strength of indoor pollutant sources, the levels of outdoor air pollution, and other factors. For example, in buildings with high indoor pollutant source strengths ventilation rates may have a larger impact on SBS symptom prevalence rates than in buildings with weak indoor pollutant sources. Thus, Figure 4 provides only an estimate of the average relationship, based on the available data. The equation shown on Figure 4 should not be used for ventilation rates below 10 cfm (4.7 L/s) per person or above 70 cfm (33 L/s) per person. Since 2011, the effects of ventilation rates on SBS symptoms has been assessed in three new intervention studies in chamber facilities that are similar to real offices. In each study, ventilation rates were changed with all other factors held constant. Occupants completed surveys to indicate their SBS symptom severity, while experiencing the different ventilation rates; however, the occupants were not informed of the ventilation rates. Compared to cross sectional studies, these intervention studies reduced the potential for error due to confounding by factors other than ventilation rate by assessing changes in symptoms within each occupant and by maintaining constant environmental conditions other than ventilation rates. However, these studies had a small number of subjects and only few hour periods of exposure at each ventilation rate condition. In a first set of experiments using a unique two-chamber system, Maddalena et al. [12] changed the ventilation rate per person between 5.5 and 18 cfm per person (2.6 and 8.5 L/s per person) while maintaining very low levels of pollutants from the chamber and its furnishings. There were no statistically significant changes in symptoms except, contrary to expectations, an increase in eye symptoms with increased ventilation per person. In a second set of experiments, Maddalena et al. [12] changed the ventilation rate per unit floor area between 0.16 and 1.1 cfm per square foot of floor area (0.8 and 5.5 L/s per square meter of floor area) while maintaining very low levels of pollutants emitted by the occupants. There were no statistically significant changes in SBS symptoms. Experiments by Zhang et al. [14], similar to the first set of experiments by Maddalena et al. [12] with minimal sources of pollutants other than occupants, yielded different findings. In their study, ventilation rates per person were varied between 3.8 and 15 cfm per person (1.8 and 7.2 L/s per person). With the lower ventilation rates, there were increases in intensity of headache, fatigue, sleepiness, and difficulty thinking clearly, but only some of the increases were statistically significant. The intensity of nose, throat, and eye symptoms was not affected by ventilation rates. The smaller low-end ventilation rates in the experiments of Zhang et al. [14] compared to Maddalena et al. [12], 3.8 versus 5.5 cfm per person (1.8 versus 2.6 L/s per person), are a possible explanation for the different findings. In a similar third intervention study [16], again with minimal sources of pollutants other than occupants, SBS symptom prevalence rates at a ventilation rate of 4.9 cfm per person (2.3 L/s per person) were compared with symptom prevalence rates at a ventilation rate of 60.0 cfm per person (28.2 L/s) per person. There were small statistically significant increases in two of three measures of fatigue with the lower ventilation rates. For other symptoms, prevalence rates were low and there were no statistically significant associations with ventilation rates. Overall, these more recent intervention studies continue to indicate reduced SBS symptoms with more ventilation, but the studies suggest limited decreases in symptoms with increased ventilation when the building and its furnishings are not a significant source of pollutants. A review of literature on ventilation in schools [17] is available from the section of this website on IAQ in schools. This review summarized eleven studies addressing how ventilation rates affect health symptoms, reported via questionnaires, in students or teachers. Six of eleven studies report statistically significant increases in some types of symptoms with decreased ventilation rates or higher CO2 concentrations [48-53] although some of these studies also found other types of symptoms unaffected by ventilation rates. The type of symptoms found to increase with diminished ventilation rate varied among studies, with reports of increased respiratory symptoms most common. The amounts by which the symptoms increased with diminished ventilation also varied considerably among studies. One of eleven studies reported a contrary finding, an increase in eye symptoms with increased ventilation rate [54] and four studies reported no associations of symptoms with ventilation rates [20, 55-57]. Overall, this literature suggests moderate and inconsistent increases in SBS symptoms with reductions in ventilation rates in schools.
cc/2020-05/en_middle_0016.json.gz/line4586
__label__wiki
0.822613
0.822613
HomeNewsNew UK Trailer for Action-Thriller OLYMPUS HAS FALLEN Starring Gerard Butler New UK Trailer for Action-Thriller OLYMPUS HAS FALLEN Starring Gerard Butler March 20, 2013 Bat News 0 The new UK trailer for action-thriller OLYMPUS HAS FALLEN has hit the net! Directed by Training Day’s Antoine Fuqua and starring a stellar ensemble cast including Gerard Butler (300), Aaron Eckhart (The Dark Knight), Morgan Freeman (The Dark Knight Trilogy) and Angela Bassett (What’s Love Got To Do With It), OLYMPUS HAS FALLEN is released in UK cinemas on Wednesday 17th April 2013. When terrorists take over the White House, a disgraced Secret Service agent attempts to rescue the president of the United States in Olympus Has Fallen, an electrifying and ingenious action thriller from acclaimed director Antoine Fuqua (Training Day). A small group of heavily armed, meticulously trained extremists launches a daring daylight ambush on the White House, overrunning the building and taking President Benjamin Asher (Aaron Eckhart) and his staff hostage inside an impenetrable underground presidential bunker. As a pitched battle rages on the White House lawn, former presidential security officer Mike Banning (Gerard Butler) joins the fray, only to find himself the last Secret Service member alive in the besieged building. Banning uses his extensive training and detailed knowledge of the presidential residence to become the eyes and ears of Acting President Allan Trumbull (Morgan Freeman) and his advisors. As the invaders begin executing hostages and threaten to kill more unless their outrageous demands are met, Banning tries frantically to locate the president’s young son, hidden somewhere in the building, and rescue the president before the terrorists can unleash their ultimate, terrifying plan. As the body count mounts and the clock ticks down, it becomes clear that Banning is America’s only hope of avoiding utter annihilation. Sequel ‘London Has Fallen’ gets official release date May 2, 2014 Matt Wavish News 0 Out of the two Whitehouse under attack films which were released last year, Olympus Has Fallen, starring Gerard Butler, Morgan Freeman and Aaron Eckhart, was the stronger and more enjoyable film. A sequel was […] The Most Amazing Actor Transformations for a Movie Role November 8, 2013 Bat Features, News 0 For his role as DOM HEMINGWAY, Jude Law gained 13kg by drinking 10 bottles of Coca-Cola a day and grew out his facial hair. To mark the release of the highly anticipated movie, we are […] ‘Oblivion’ featurette explains everything! March 14, 2013 Matt Wavish News 0 If you were unsure exactly what director Joseph Kosinski’s epic sci-fi Oblivion was actually about, then check out the latest featurette which has star Tom Cruise and the director himself telling you pretty […]
cc/2020-05/en_middle_0016.json.gz/line4588
__label__wiki
0.599338
0.599338
Muti leads CSO in wide-ranging program By M.L. Rantala Music critic CSO music director Ricarrdo Muti led the CSO in a wide-ranging, big program last week at Symphony Center with five interesting and contrasting works and featuring two orchestra members are soloists. The program kicked off with Vivaldi’s Piccolo Concerto in C Major with Jennifer Gunn as soloist. She was joined on stage by a modest subset of her CSO colleagues, who created a small chamber orchestra of strings plus harpsichord. With only about 20 musicians on stage, the effect was to create a more intimate setting and Gunn exploited this beautifully. Her tone was sweet and fetching, and she executed tricky, rapid runs with grace and flair. The strings provided a lovely cushion of support, with robust playing and idiomatic sound. The short work was over too quickly. Gunn shined again with a 2016 work by the Nebraska native Ken Benshoof. His Concerto in Three Movements for Piccolo and Orchestra is a good-natured composition with lots of meat for the soloist and a full orchestra to back her up. The concerto opens with some wistful music for piccolo and the orchestra contributes melodies of hope, with the entire movement written in an introspective vein. The middle movement heard sweet songs from the soloist as well as an attractive little duet between flute and bassoon. The concluding section opened with pep as well as rumbles from the lowest voices of the orchestra. Muti always shaped the music so as to highlight the plucky piccolo melodies and to support them with stylish work from the orchestra. This was followed by Beethoven’s Symphony No. 2, a preview of what’s to come in 2020, the 250th year since Beethoven’s birth, which will see numerous concerts devoted to this beloved composer. Muti marshaled his forces expertly, coaxing the high strings to play with lyrical grace. The winds were supple and the rhythms crisp and well defined. The energy of the music was unleashed with superb control, drawing out the playfulness as well as the tension. It was a delight. The biggest revelation of the concert was the new work by American composer James Stephenson. His Bass Trombone Concerto was commissioned for the CSO and for bass trombonist Charles Vernon. Stephenson has created complex music, often with many layers, and Vernon, for the most part, knew how to stand out and be heard. He had muscular sound and remarkable control. He moved from mystery to yearning, from bold declarations to quiet tremblings. Stephenson gave the bass trombone his moment to shine and Vernon fully embraced the opportunities. Muti led the orchestra in a sympathetic and committed performance, offering carefully calibrated sound that highlighted the interesting journey Stephenson has created. The concert closed with George Gershwin’s “An American in Paris.” The music had all the friskiness you’d expect and great playing from the back of the orchestra, with fine work on trumpet, horn, clarinet, saxophone, and others. The pleasing music was given bounce, yet there were moments when I wondered if the jazz inflections were really up Muti’s street. There were a few occasions when there should have been more lilt and a bit more jangled syncopation. Nonetheless, it was effervescent and joyful. « Grant Park Music Festival opens to rainy weather and sturdy audience » Review: “Little Shop of Horrors” 9PRtde
cc/2020-05/en_middle_0016.json.gz/line4593
__label__wiki
0.692212
0.692212
Business advice from is4profit | Companies House - Directors and Secretaries Guide | Companies House – Directors and Secretaries Guide The is4profit team September 15, 2006 This Companies House Directors and Secretaries article is a guide only and should be read with the relevant legislation. The director, or directors, must manage the company’s affairs in accordance with its articles of association and the law. Certain responsibilities apply to all directors, whether executive or non-executive, and to all types of company whether trading or not. The company secretary has a few duties set out in the legislation, and may be given others by the articles or the directors. Private companies must have at least one director. Public limited companies must have at least two directors and a company secretary. A private limited company does not have to have a company secretary but it can choose to include in its articles a requirement to have one. From 1st October 2008 all companies whether private or public must have at least one director who is a natural person i.e. an individual, and who is at least 16 years old. Any company that had only corporate directors on 8th November 2006 (the day the Companies Act 2006 received Royal Assent) will have until 1st October 2010 to appoint a natural person director. Any director appointed before 1st October 2008 who has not reached the age of 16 before that date will automatically cease to be a director on 1st October 2008. If you need more information, contact 0303 123 4500. This guide: explains some of the main responsibilities of a company’s officers; and deals with some of the key requirements in relation to the delivery of documents to Companies House. The guide will not tell you everything about being a director or secretary, but it will give you a good idea of your responsibilities as they relate to Companies House. If, after reading this guide, you are in doubt about your responsibilities, you should consider seeking professional advice. Companies House business advice Crown Copyright © 2004-2013 Tags:companies housedirectorsguidesecretaries Sick Pay Guide for Employers Fewer than 1 in 4 Directors are Women New Powers Protect Companies From Fraud ISAs, PEPs and TESSAs Guide Website Provides Recession Survival Advi... Company name and trade-mark checker laun... Computerising Accounts Company Car Tax Guide Your Pension Options SMEs at Risk of Corporate ID Fraud Business Owners Prime Targets for Identi... How to Build A Small Business That Lasts Disability Discrimination Act – Ac... Integrating Back Office And Online Syste... Reform Crackdown on Company Name Registr... Manage Your World Cup Absences Business Owners Miss Out on Breaks
cc/2020-05/en_middle_0016.json.gz/line4596
__label__wiki
0.56757
0.56757
Internet Evolution Turns into Internet Revolution in India indiadaily B-98, KOL-030304 - MARCH 3, 2005 - KOLKATA: COMMERCIAL SEX WORKERS WATCHING THE WEBSITE LAUNCHED BY 'DURBAR MAHILA SAMANNOY SAMITY' - ASSOCIATION OF SEX WORKERS - ON THURSDAY, IN KOLKATA. THE WEBSITE WILL PROVIDE A PLATFORM TO THEM. 3RD MARCH IS INTERNATIONAL SEX WORKERS DAY. PTI PHOTO First, it was the E-mail and chat which had driven people to the internet cafes in India. Now, the Internet growth in India is being driven by some new and innovative applications such as blogs, P2P, video-on-demand and online gaming. Now, people are being more Internet savvy than ever before. The numbers of Internet users has touched 3.7 crore mark in September 2006. It was at 3.3 crore in March in 2006. According to a joint study by the Internet and Mobile Association of India (IAMAI) and IMRB International, the number of active users has risen to 2.5 crore in September from 2.11 crore in March. The study also predicted that Internet user base will touch 4 crore mark by March 2007. The survey was conducted on 16,500 households, covered 65,000 persons in 26 metro cities and small towns in India. The ten thousand business and 250 cyber cafe owners are additional in the study. However, the rural areas were excluded in the study. The survey says that Indian youth are the main Internet users. The smaller cities are increasingly becoming the part of the Internet evolution in India. Smaller cities and towns have shown a whopping 142 per cent per year growth. The poor infrastructure in the rural part of India is the biggest hurdle that is restricting the Internet expansion in India. The government of India is working for the rural-connectivity through Internet but the slow implementation of the government projects in rural areas, illiteracy, electricity problem and lack of awareness among rural youth creates the main obstacle. India is No China! Some twenty websites are blocked by ISPs in India and online bloggers started loosing patience on the issue. Let me summarize the responses over the issues – Nowpublic.com says one wishes that this kind of alacrity and adeptness had been displayed in arresting terrorism and their nefarious activities, this past decade or more The humiliating juncture of having to curb/stifle the voices of well meaning citizens would not have arisen! Blogherald.com says I can understand China blocking blogs. I can understand North Korea blocking blogs. To a certain degree, I can understand some middle eastern countries blocking some blogs. But India? Give me a break. Duncanriley.com says that is India the new china? Sepia mutiny says under the title ‘the terrorists have won’. Shivamvij.com targets the government officials for not answering his call on the matter of blocking the websites. Boingboing.net went one step further, one of the blogger Manish says that The block is still spreading through Indian ISPs. This recalls Pakistan’s Blogspot ban during the Danish cartoon controversy and India’s Yahoo Groups ban in ‘03 to shut down a separatist forum. Now have a look on the views of withandwithout.com who says that there is something so surprising about this act of censorship and people took a much little time to react to it. Let me explain the view of the government as well- look at some websites, which have been blocked – # www.Dalitstan.org # www.Clickatell.com # www.Hinduhumanrights.org # www.Hinduunity.com. # www.Hinduunity.org # www.princesskimberley.com # www.bloodspot.com # www.blogspot.com # www.geocities.com # www.typepad.com Indian express writes the most bothered Internet users were the bloggers, who are unable to access Blogspot.com, Typepad.com or Geocities.com pages. It says that the order posed technical problems that resulted in a blanket ban on all blogs. According to Neha Viswanathan, Regional Editor, South Asia, Globalvoicesonline.org from London, You cannot block a single page on blogspot.com, which is why all of them are getting blocked. The Indian order was issued on July 13, however, the Computer Emergency Response Team (India), part of a global cyber-security network did not yet officially announce the ban. R Grewal, a spokesperson for Spectranet has confirmed We received a list of over 20 websites to block from the Department of Telecom, and this Blogspot.com was one of them. According to government officials, it appears that, all the websites blocked are said to express “extreme religious views.” Government sources confirmed late in the evening that some websites have been blocked based on police reports that they were fuelling hatred. They denied that the Mumbai blasts had anything to do with censorship and that security checks on the blocked sites were on since before the terrorist attacks.More sites ordered blocked by the government, including Hindutva ones, surprisingly. I am always an anti-censorship folk. Ultimately it’s about boundaries. But inspite of reacting so harshly we should try to find out the reason behind that. It’s still not clear if the government wanted a few blogspot blogs blocked (more likely) or wanted a blanket block. People started comparing India with China, North Korea and middle eastern countries, these all sound rubbish completely. This is the kind of over-reaction. Never mind the fact that India can have free and fair elections. In the end, the venture capitalists maybe taking a very close look at what the IT policy of a country says about the country’s aspirations for its citizens, international relations and its economic future. One better thing would have been done in spite of directing ISPs, the government should have asked Google to block these sites. Google regularly removes sites on Blogspot if they do not adhere to its policies. If it helps, Google has a marketing office in New Delhi. On the legal side, according to the Information Technology Act, 2000 web sites might be blocked if they contain pornography, speeches of hate, contempt, slander or defamation, or if they promote gambling, racism, violence or terrorism. According to Praveen Dalal, a cyber-law expert, such sites may be blocked within the provisions of the Fundamental Right to free speech and expression granted in India’s Constitution. The main trouble is that the ‘respected’ bloggers don’t even know the details of sites the DoT wants blocked. They started making such a hue-n-cry. To make matters even more badly, ISPs seem to be blocking entire domains on which these blogs are hosted. 11 Million Americans Don’t Know English A revelation: “All developing and underdeveloped countries have a large number of illiterates!” You are neither surprised nor amused…I bet! “Revelation? Joking or what…!” you might say. And why should you be? It’s been a Third World truth since ages. But what if you were to hear that 11 million Americans can’t read English? You might say again, “Joking or what?” But this time, it’s a TRUTH. Howsoever incredible it may sound, the fact remains that one out of every 20 American adults can’t make out the head and tail of English language, leave apart English literature, according to a federal study conducted recently. This means that no less than 11 million Americans are unfit for performing even everyday tasks. The survey studied a varied sample of 19,000 adults, who are living in homes, college hostels and even those behind the bar. As many as 30 million adults have “below basic” skills in English language. Their ability is so limited that they may not be able to make sense of a simple pamphlet, for example. However, those declared “illiterates” in the study include those, who may be well-versed with Spanish or any other foreign language but are unable to comprehend texts in English. Illiteracy is a blot for any progressive society, and more so in case of America, the “Global Superpower” (sounds hollow, no?). There must be something seriously wrong with the system of that country where a sizeable number of people don’t know even their mother tongue that also happens to be the world’s lingua franca, incidentally. Will you do something about it, Mr. Bush? At least, do give some thought to the issue if at all you get some free time after bothering for the rest of the world! Also Check Out: Projected World Illiteracy Rate – 1970 to 2015 India Cannot Afford to Be ‘Left’ out The Left Front of India comprising Communist Party of India-Marxist (CPI-M), Communist Party of India (CPI), Revolutionary Socialist Party (RSP) and Forward Bloc has made it a point to criticize India whenever there is a whiff of India collaborating with the West especially the US. (Read news report). However, the Left fails to see the gains India likely to make with being in the right side of US which is the only superpower in the world today. In a rapidly changing world, India can not afford to end up in the losing side as happened with the Cold War. Besides, both the US and India have common values like democracy, secularism, freedom of expression and issues ranging from all across the board. India can not place its bet on support from volatile nations like Iran (who was snubbed in the recent IAEA vote by India much to the Left’s dismay) and to some extent Russia (that was recently ranked as a state that is dangerously close to fail). The Left should appreciate the fact that in the present world, both the US and India have common enemies in the form of terrorists and terror sponsoring nations. With the US by its side, it can at least tackle the Pakistani military junta that is actively engaged in anti-India terror campaign and the growing military power of China. Then, there are other major issues India need to tackle. With being an US ally, it can gain major technological knowledge in fields of cutting-edge research, agriculture, nuclear power, aero-space etc. Without this, India’s overall development will be jeopardized and the dream of seeing India as a major economic and military power and becoming a developed nation in next 15-20 years would just remain so – a dream. Enough is Enough! India Should Follow the Israeli Doctrine Against Terror 1. Why terrorists dare? What makes the terrorists think that it can carry out beastly attacks against India like the one in Delhi on Oct 29 at will, whenever and however it wishes? India has been in the receiving end of terrorism from the early 80s and it has only increased in intensity ever since. India has been one of the worst victims of terror with over 25,000 deaths in the last decade alone. 2. Victims & failure of current stance against terror. Caught in the crossfire between the security personnel and the terrorists are innocent civilians in areas of low intensity conflict like Kashmir and the North East. What have we achieved against this unabated campaign of terror perpetrated by Pakistan using diabolical criminals and psychopaths? We continue to bleed and the end to this bloodshed is nowhere in sight. No matter how many terrorists are killed by our security forces, we know that the terror-cadre supply is endless. As soon as one is eliminated, the next one in the queue fills in the vacancy. Also there is no dearth of resources in this Pakistan State-sponsored religio-narco terror campaign against India. 3. Why Israel is so successful against terrorist? Israel’s former Prime Minister Shimon Peres, when on a visit to India a few years back, paraphrased the justification of Israel’s heavy-handedness against terrorists in this way – ‘You can’t negotiate with terrorists. They would simply outmaneuver you on the table. They really don’t have any agenda; their only aim is to bring about death and destruction to innocent people and spread terror and hatred amongst people. The only way to deal with this is to use maximum force possible and eliminate the terror masterminds’. 4. India is a soft state. What have India done so far in eliminating the so-called terror masterminds? We have on the contrary bowed down as a soft nation to terrorists’ demands like releasing dreaded terrorists to secure the release of a minister’s daughter who was kidnapped, or to secure the release of the passengers in a hijacked plane. For about 150 passengers’ lives, we released people like Azhar Masood who went ahead to form a terror outfit like Jaish-e-Mohammed resulting in thousands of Indian deaths since then. Wall Street journalist Daniel Pearl was beheaded in video by another released. 5. Futility of talks with Pakistan & depending on the West. We have continued talks with Pakistani puppet leaders and dictators who run the terror factory against India. This is not going to bring any end to this bloody campaign. We know that the West (especially Uncle Sam) is not going to be by our side against Pakistan as the bland message from the White House suggests that condemned the Delhi attacks but without making Pakistan accountable for harbouring criminals like Masood and Dawood. 6. Need of the hour. India should stop all these futile and resource-consuming talks with Pakistan, should have an (Israel-like) elimination policy of terror heads even if it means going deep inside Pakistan or Pakistan-controlled parts of Kashmir and bring about a legislation akin to that of the new Homeland Security laws in the US. That might bring some discomfort to ordinary citizens, but if it saves a few lives, it would be more than worth it. It is high time India shows that ordinary Indian lives would come at a very high price for Pakistan and its agents of terror.
cc/2020-05/en_middle_0016.json.gz/line4607
__label__wiki
0.669766
0.669766
Richard Hammond 'Not Dead' After Serious Motorcycle Crash During Grand Tour Filming Jason Torchinsky Filed to:Richard Hammond While filming an episode of The Grand Tour in Mozambique, host Richard Hammond wrecked his motorcycle, sustaining a head injury that left him laying unconscious in the road, far from anywhere where he could receive comprehensive medical attention. Things seem to have worked out fine, since Hammond now claims he is, in his own words, “not dead.” Very glad to hear that. According to Grand Tour Nation, a source on the show described the accident: “Richard was traveling quite fast when he came off. It cause instant horror on set. There was a lot of concern. If his injuries had been serious it wouldn’t have been easy to get medical attention. It’s very remote there and facilities are basic. The lads are known for having a laugh on set but Richard’s previous accident is still fresh in their minds. They were all shaken by the latest incident.” The “previous accident” is referring to Hammond’s well-known 288 MPH crash in a Vampire jet-dragster back in 2006. That wreck left Hammond with some brain injuries that took a lot of time to recover from, leading to renewed fears about the possible damage from this recent wreck. It’s not known if he was wearing a helmet at the time of the accident. According to the Sun, when co-host Jeremy Clarkson asked if Hammond was taken to the hospital after the accident, Clarkson said “We don’t do hospitals,” which isn’t exactly true, since Hammond spent an awful long time in one after the 2006 accident. Hammond himself has spoken about the accident, making his bold statement about his continual metabolization on his DriveTribe page: It’s true, I did fall off a motorbike whilst filming recently for The Grand Tour in Mozambique. I banged my head, yes, along with pretty much everything else apart from my left thumb, which remains un-bruised. Can’t tell you more yet about the how and why of it; that’s all for later in the year on the show. As for injuries; well put it this way, I don’t think I can get a book out of it. See? DriveTribe’s good for something! Proving you’re not dead. For the record, we’re pro- non-dead Richard Hammond as well. Danger at 288 mph: Richard Hammond Crash Pics Released The Grand Tour Season One Wasn't Perfect But In The End It Delivered The Grand Tour Finally Did It Senior Editor, Jalopnik • Running: 1973 VW Beetle, 2006 Scion xB, 1990 Nissan Pao, 1991 Yugo GV Plus • Not-so-running: 1973 Reliant Scimitar, 1977 Dodge Tioga RV (also, buy my book!)
cc/2020-05/en_middle_0016.json.gz/line4613
__label__cc
0.712052
0.287948
Speak JA JA Mag Research JA Our Stories: Talsia heals her broken heart, one poem at a time by Ashleigh-Ann Mowatt In this installment of Our Stories, poet Talsia Williams shares how writing poetry mends her broken heart….For many people, Jamaica is pictured as an island paradise – white sandy beaches, a beautiful and vivacious culture, rich and wholesome food, and attractive people. And while that image is not far from the truth, if the lens is focused on the inspirational stories of ordinary Jamaicans, you’d find a sharper, richer and truer image of the Jamaican experience…this is Our Stories! Meet Talsia Williams The evening of July 12, 2010 will always remain in her memory because that’s when she spent the final moments with one of her sisters. Talsia recalls strolling home with her two sisters on Olympic Way in Kingston 11, with smiles and bashy hairstyles, right after visiting the hairdresser. But fate decided a different destination for one of her sisters, Samantha Williams, who died hours after a car derailed its route, throwing all three girls off the sidewalk. When I sat down with this soulful poet, she explained that writing poetry helped to heal her broken heart. 1. Oh no! Where did that car come from? The car came from behind. We hardly had enough time to actually look around to see what was coming. It happened suddenly. It’s almost as if I fell asleep within minutes and I woke up to the cries of my little sister. When I looked up I didn’t actually see her, I just heard the crying. When I looked in the corner, I saw her fastened in a fence….my 4-year-old sister. I didn’t see my other sister. I was sorta in shock. I remember wondering if my feet were still intact, if my hands were working. I remember moving my feet. 2. At that moment, did you realise what happened? I realised but it’s almost like I’m wondering, ‘What? Did this really just happen?’ I checked myself, I moved my feet, and I moved my arms. Then I crawled over to my little sister and I had her in my arms. She was bleeding all over. Her legs were broken. I didn’t know what to do. Persons from the community came to assist….I held on to her. I still couldn’t find my other sister. I was crying and looking for her. And then eventually, somebody put me on a taxi and I went to the Kingston Public Hospital. 3. So when did you see your other sister? (When I was at the hospital) I saw them rush in with her. (Samantha) was practically naked because apparently the car stripped her, tore off most of her clothing. She died 2am the following morning. 4. Wow! Help me to understand how poetry helped you to heal. I wrote a lot about my feelings, about my sister. I wrote about how angry I was at the time. I think I was angry at myself for a very long. I think I took responsibility for what happened and I think over a period of time I learnt that I had to let go and to realise that I didn’t cause this. 5. Did you find out who was responsible? Who the driver was? Eventually, we had to go to court but I couldn’t look at him. So if he would come here today, I wouldn’t know him. At the time I couldn’t deal. I couldn’t look at him. 6. Now tell me about the book you dedicated to your sister. The book I wrote is called Inside Out. The first poem is actually dedicated to her, To My Sister with Love. There are other poems I have written (about the incident) but I didn’t put them in the book because of course they were comprised of expletives (laughs) and so I decided not to…. To My Sister with Love was actually published in the Sunday Gleaner. 7. Are all your poems centered on family life? No. The first part of my book, a Woman’s World, are really poems of issues that women go through. I talk about abuse…the first poem in that section is Pretty Woman which I believe is my baby poem (laughs). I believe this poem will take me to all the places that I desire to go in life because of its simplicity and the truthfulness of it. It talks about abuse, sexual abuse of women. So a part of the book is dedicated to women; the different struggles, especially black women. Generally, the book is a reflection of my innermost thoughts and feelings. 8. What is your style of poetry? (Chuckles) That’s an interesting question. I think I write for the soul…I don’t try to live up to any standards, whatever I believe will heal the soul I tend to write about it. I write about things that people can relate to, things that they’ve experienced. 9. Finally, what is your message to persons who have lost a loved one to a similar tragedy? I think you will always have that funny, unsettling feeling when you talk about an incident such as the one I expressed earlier. But the truth is, at some point, you have to will yourself to not necessarily get over it but to get on with your life. (For me) it took many years, I’m talking about 5 years before I could admit that this happened to me and I’m hurting…and you have to will yourself so you can live on…so you can go on to live a fruitful life because that is most important. And I believe the person who passed on would have wanted you to continue to live and live well. And if it is that you need help, there are counsellors and there are places you can go (for help). You warm my heart Talsia! Thanks for sharing your story. Beautiful Black Girl by Talsia Williams I almost called myself ugly, Laughingly, The thought tugged at me The synthesis of a laugh and a polluted thought frightened me, How could this be? Beautiful black girl like me Walking with hands on knees; Shoulders bent and bowed head This can’t be! I must have forgotten, I must not have believed, The intricacies of me: My bold laugh My soft heart And my joyful thoughts The thought again hauled me A string of tear cascaded Fallen to my knees In grave disbelief, At the thought I had just conceived Follow Talsia Williams on Facebook, Twitter and Instagram. Our Stories is a feature which sheds light on real, social issues in Jamaica through the inspirational stories of Jamaicans with lived experiences. Are you a Jamaican with a story to share? Contact us [email protected] death family poetry Ashleigh-Ann Mowatt Ashleigh-Ann Mowatt is a journalist who practises her craft everyday. Ashleigh-Ann loves to tell stories, human interest stories or stories of the heart. She hopes that by sharing these stories, she is ultimately helping persons to lead better lives. Check out her other stories on her blog, http://livewellja.com/ The Typical Jamaican Family 10 Things You Did Not Know About Shaggy 12 Things You Did Not Know About Romain Virgo A conversation with a Jamaican Empress 5 Questions with Calibe Thompson, the first Jamaican... Interview with Jamaican Photographer Ray Chen Join our newsletter to get the latest articles, news, & videos. WATCH: Black Uhuru NPR Tiny Desk Concert WATCH: Jamaican, Joe Lick Shot Interview – The Father of Music Sound Effects Random Jamaican Recipes Miss G’s Simple Non-Pork Jamaican Stew Peas Recipe... Chef Sian’s Conch Salad Recipe Four Jamaican Foods Listed in Saveur Magazine’s List... Chef Sian’s Jamaican Hardough Bread Recipe Chef Noel Cunningham BBQ Wings Copyright © Simbis Inc. All rights reserved. Privacy Policy & Terms of use. Stock Photos from Photos.com, iStockPhotos.com, 123rf.
cc/2020-05/en_middle_0016.json.gz/line4614
__label__wiki
0.535498
0.535498
Supporting BRI's international growth BRI Gets Ready to Take On The US BR International (BRI) is an Australian company that is rapidly developing a reputation as a leading provider of global supply chain management solutions. The company provides its end-to-end supply chain solutions to a diverse range of organisations, from small businesses to large enterprises. Established almost 40 years ago, BRI took on a new lease of live in the early 2000s when the company was acquired by current directors, Aaron Poole and Michael Bourne. Still in their thirties, the pair were enthusiastic, ambitious and had an eager eye for opportunity. Both were familiar with BRI and believed there was tremendous potential to grow the business. “In the end, we selected InfoMotion. Their system met our immediate RFQ so there was no need to add time for further customisation, and clearly, the company has done some research because they show a great understanding of what a third party logistics provider needs.” Aaron Poole, Director In the nine years since, Poole and Bourne have worked constantly to achieve their vision. They have increased BRI’s scope of activity within Australia, embarked on a joint venture within Asia, and expanded their geographic coverage with the establishment of offices in New Zealand, Hong Kong, Vietnam, Holland and China. To keep pace with customer demand, the number of staff has jumped from 14 to 100. And now, in 2013, BRI is looking for ways to gain a foothold in the lucrative North and South American markets. “Our aspiration is to continue to grow at the rate we’ve been growing,” Poole acknowledges. Earlier this year, Poole was considering the systems and processes that BRI would need to support its next phase of growth when he realised that something wasn’t quite right. “The warehouse is a very important part of our value added service. Orders arrive on a daily basis. Warehouse staff handle goods, forklift drivers shift pallets around the floor and we have a need to manage the outer and inner carton process. The need for a WMS [warehouse management system] tool to keep track of what is going on every single minute of the day is essential to our success. We found that our current system was not moving with the needs of our customers,” he explains. “We had an in-house developed system that wasn’t able to grow with the business and clearly our competitiveness was suffering. In addition to this, clients’ needs and desires change on a regular basis so again our current system was not suitable.” The company needed to implement the latest technologies – such as radio frequency [RF] and hand-held scanners, voice technology, advanced picking and packing capabilities – if it wanted to stay ahead of the competition and ensure higher levels of service to customers. To find the right warehouse solution for BRI’s future, Poole prepared an RFP [request for proposal], outlining the company’s expectations. High on his list of essentials were ease of use and the ability to streamline functionality within the warehouse. The software had to be flexible, have room to grow, and be capable of integration with customer information systems. It had to offer value for money and ideally, Poole wanted a solution that was Australian owned, developed by a vendor committed to the logistics industry and who would be equally committed to BRI’s business. At a technical level, Poole’s requirements included system to system integration, bar coding, complete back-office integration, real-time inventory updates, an RF capability with handheld technology extension, strong report management, advanced picking and labeling technology and inventory management through to allocation. Critically, given BRI’s international activities, Poole also wanted the assurance of a system that had been successfully deployed overseas. Rising costs dictate a fast deployment Ever ambitious, Poole set a four-to-eight week deadline for deployment of the system at BRI’s Australian headquarters, a warehouse located in Sydney. “It was an extremely aggressive target but we needed to get the system in,” Poole admits. “The existing system was not doing what was needed and labour costs were increasing as a result. InfoMotion saw our need, accepted the timing and were prepared to do whatever was required.” As soon as the Sydney warehouse was up and running, Poole began planning further roll-outs for Melbourne, Brisbane and Perth. These are now under way and are expected to be completed before the end of the year. ROI within two months Although only one warehouse is currently operating on InfoMotion, Poole confirms the company is already receiving a return on the software investment. Automation has eliminated most manual practices in the warehouse, including the picking and receiving functions. “This has allowed us to take between 100 and 120 hours of labour per week out of the Sydney operation,” Poole notes. Order accuracy has improved and impressively, Poole says there has been a five per cent improvement in key performance indicators (KPIs) such as orders that are “Delivered in full on time” (DIFOT). Operating and inventory holding costs have been reduced. Productivity is on the rise, and management finally has full order visibility through to customer integration. “The excitement for us is that we’re still in the birth stages. BRI has warehouses and offices all around the world so once we finish in Australia, our next step is to roll the system out globally, to warehouses in Shanghai, Shenzhen, Ho Chi Minh, New Delhi, Rotterdam and more. We’ve already told InfoMotion that we want our China warehouses on line in early 2014 and we expect to have all sites completed by end of next year,” Poole concludes. By then however, given Bourne and Poole’s determination to keep growing, BRI may need to start planning for addition deployments, only this time in the Americas. Vellex Streamlines Their Freight and Logistics Operations Vellex Streamlines Their Freight and Logistics BRI Gets Ready to Take On The US BR International (BRI) is an… MBC Streamlined Their Entire Operation With Our System MBC STREAMLINED THEIR ENTIRE OPERATION WITH David Barry Logistics implements paperless warehousing to boost efficiency to boost Supporting BRI's International Growth Our WMS integrated perfectly with Searoads existing systems Our WMS perfectly with Searoad's existing systems Our flexible 3PL System is just what M3 Logistics needed OUR FLEXIBLE 3PL SYSTEM IS JUST WHAT M3 LOGISTICS WA Freight Shifted Gears With Our Fully Integrated System WA Freight Shifted Gears With Our
cc/2020-05/en_middle_0016.json.gz/line4616
__label__cc
0.745875
0.254125
The Zongshen Moto Club Philippines (ZMCP) Date posted on October 4, 2019 The Philippines is really rich in beautiful and wonderful places that are best to experience on board a motorcycle. That is one of the reasons why we have plenty of motorcycle riders and clubs today. On November 11, 2011, different riders with different mindsets, goal and endeavors in life were united in one group because of their passion for the Zongshen Moto R/X 155 (Zongshen is a Chinese brand known as Motorstar in the Philippines). They named their group Zongshen Moto Club Philippines (ZMCP) and their club was established with respect, camaraderie, loyalty and friendship as foundation. ZMCP had their first get-together held at Shell Julia Vargas on April 20, 2012. The group’s first ride was on April 29, 2012 and their destination was Jariel’s Peak in Infanta, Quezon. ZMCP was formed not just to enjoy rides. The club also supports events for a cause. On October 13, 2013, the group supported “Ride to Provide”, an activity for the benefit of the kids in Compostela Valley. ZMCP was also the official “moto marshals” for the 7, 000 pedal bikers which travelled from Tiendesitas going to Pasig, Ortigas, San Juan and Quezon City. They also supported “Ride to Provide 2” which was held in the Malolos Convention Center in Bulacan. The activity aimed to help the victims of the super typhoon Yolanda and ZMCP assisted by being the moto marshals. ZMCP’s Iloilo and North Luzon chapters also provided help for the Yolanda casualties. Standing proud and thankful for having members that not just enjoy riding but also supporting and helping those who are in need, ZMCP is like a big family wherein no one is left behind and everyone respects each other. The group encourages all Zongshen motorcycle owners and riders to visit their FB page (www.facebook.com.ph/groups/zonshen.motard) and join them in exploring the beauty of our country and participating in meaningful and charitable events and activities. *This article was published in InsideRACING’s Volume 12 Number 2 2014 issue. Incredible Journey of Marinduque Riders Club Elite, Inc. (MRCEI) Two Wheels Move the Soul Cousins’ Holiday Loop Ride Renzzy Vigo the Versatile Pocketbike Racer
cc/2020-05/en_middle_0016.json.gz/line4618
__label__cc
0.690346
0.309654
justin@jamlawoffice.com Q&A With Attorney McCrea Justin Anton McCrea Child Custody Change of Venue Special Education Law Divorce Lawyer in Sacramento County There thousands of people in California that get married each year. Of course, when they enter the marriage they have no intention of ending it. The fact is, though, close to 50% of marriages end in divorce in Sacramento. The average length of a marriage is about 8 years. The chance that your marriage will end in dissolution increases each time you tie the knot. When someone decides they no longer want to be married, California does not require a reason beyond irreconcilable differences. If you are considering filing for divorce in Sacramento, contact our Sacramento divorce lawyer. At The Law Office of Justin Anton McCrea, we understand that not all relationships turn out as anticipated. We are sensitive to the difficult and emotional situations that ending a long-term relationship involve. Whatever you discuss with us remains confidential. Our Sacramento divorce lawyer will evaluate your circumstances and advise you of your rights. You probably don’t know how to begin the process or you may have already filed for divorce and don’t know how to proceed. Our dissolution of marriage lawyer will advise you of your best option moving forward no matter where you are in the process. Even if you think you might be able to represent yourself in a divorce, you should definitely consult a divorce attorney in Sacramento. We know your rights and will assert them. Don’t let the process take longer than it needs to because you are not sure what to do next. How Do I File for Divorce in Sacramento? To file for divorce in Sacramento, you will need to obtain the proper forms that apply to your circumstances. This will include a summons and a petition for dissolution of marriage. You will also be required to disclose financial information. If you have children, it may be wise to file for custody and support at the same time. A divorce attorney can represent you and will take care of the required filings at the Sacramento family court. What is the Difference Between a Legal Separation and a Divorce? The difference between a divorce and a legal separation is that a divorce will end the marital relationship whereas a legal separation does not. Many people opt for a legal separation because they have not lived in the county in which they want to file for a long enough period of time. Others may file for legal separation for religious reasons. How Long Will it Take for My Divorce to be Finalized? The time it takes to finalize your divorce depends on the circumstances involved. Generally, it takes at least 6 months and 1 day before a divorce is finalized in Sacramento divorce court. It may take longer especially when assets are disputed or one party does not cooperate during the process. This often occurs where one party is hiding assets or refuses to disclose financial information to the other party. The California Family Code requires that you disclose all of your financial information to the other spouse. Failure to do so can result in penalties such as an award of attorney fees to the non-offending spouse. Our Sacramento Divorce Lawyer Handles: Domestic Violence Restraining Orders Marital Settlement Agreements Division of Debts Call to Speak With Our Divorce Attorney in Sacramento If you are are filing for divorce or have been served with divorce papers in Sacramento County, contact The Law Office of Justin Anton McCrea for effective divorce representation. Our dissolution of marriage attorney will review your circumstances and give you sound legal advice. Without skilled legal counsel, you may be giving up rights. We are here for you during this difficult time. If you want a divorce and the ability to move on with your life as quickly as possible, call our Sacramento divorce lawyer at 916-601-9441 or contact us online. This site is attorney advertising for the State of California. Justin Anton McCrea is licensed by the State Bar of California to practice law in California. The information on this site is not legal advice. By contacting us, it does not mean an attorney client relationship has been formed. If you have a legal issue, contact an attorney as soon as possible. Sadfishing in a Divorce or Child Custody Case What do I physically remove from my old non-functional computer? How Do I Start the Sacramento Divorce Process? 3 Common Reasons for Filing for Divorce in Sacramento, California Help With Divorce Documents in Sacramento Affordable Help Filing for Divorce in Sacramento Hidden Assets in a Divorce Family Problems in Estate Planning Law Office of Justin Anton McCrea Copyright 2018 - Law Office of Justin Anton McCrea Sitemap | Privacy Policy | Terms of Use | Website Design by Justin McCrea
cc/2020-05/en_middle_0016.json.gz/line4623
__label__cc
0.668238
0.331762
Jesse Adams Stein COMMISSIONED CATALOGUE ESSAYS Stein, JA 2014, ‘The thinking man’s food processor: Domesticity, gender, and the Apple II’ in Interface: People, Machines, Design, Powerhouse / Museum of Applied Arts & Sciences (MAAS), Sydney, pp. 26–31. Stein, JA 2014, ‘Who gives a … ? Contemporary design and an ethic of care’, in CUSP – Designing for the next decade, Object Australian Design Centre, Sydney. Stein, JA 2011, ‘Conversations from the Wonder Chamber: Jesse Adams Stein in conversation with Matthew Connell’ in L Muller L & B Dean (eds), Awfully Wonderful: Science Fiction in Contemporary Art, Performance Space, Sydney, pp. 14–19. MEDIA / SHORT ARTICLES (Selected) Stein, JA, ‘Does Australia need the “Right to Repair”?’ Ewaste Watch (republished from Repair Design), 30 September 2019. Lee, T., JA Stein, A Crosby, C Cooper & K Scardifield, 2019, ‘Design and repair must work together to undo our legacy of waste,’ The Conversation, 12 July 2019. Stein, JA, 2018, ‘Don’t be too quick to dismiss “dying trades”, those skills are still in demand’, The Conversation, 6 December. Stein, JA, 2018, ‘Conversations in the Shadow of Australian Manufacturing’, History Lab, 4 December. Rowden, E, and Stein, JA, 2018, ‘Reading List: Public Architecture’, Places Journal, March. Stein, JA, Crosby, A, and Lockhart, C, 2017, ‘Out of hand: Expressing data, exposing nature and extending time’, ArchitectureAU, 19 April. Stein, JA 2017, ‘Is 2017 the year to ditch the term “innovation”?’, The Conversation, 19 January. Republished as ‘Stop using innovation as a meaningless buzzword’, The Age, 20 January 2017. Stein, J.A. 2017, Public submission to NSW Parliament Inquiry into Museums and Galleries, Sydney. Stein, JA 2014, ‘Kickboxing Face’, Seizure, vol. 6, January, pp. 47–53. Stein, JA 2013, ‘Different Strokes’, Sydney Morning Herald (Spectrum), 4 May. Stein, JA 2013, ‘Two Thumbs up for Sydney’s Ugliest Building’, Sydney Morning Herald, 1 March. Stein, JA 2013, ‘Frank confessions from an oral history newcomer’, Voiceprint 49 (October), pp. 10-13. Stein, JA 2012, ‘Links to the right paths take the city forwards’, Sydney Morning Herald, 17 Dec. Stein, JA 2011, ‘Eames Overload and the Mystification Machine: The IBM Pavilion at the 1964–65 New York World’s Fair’, Seizure, vol. 2, pp. 57–63. Stein, JA 2011, ‘The Ultimo Dream’, in DIY Urbanism (exhibition catalogue), Right to the City, Sydney. Stein, JA, 2010-2012, Penultimo, a (now dormant) blog about the suburb of Ultimo. Stein, JA, 2008, ‘The (Abridged) Sordid History of Recycling in Chicago‘, F Newsmagazine (April 1). (Contributor) 2008, Current: Contemporary Art from Australia & New Zealand, Dott Publishing (Art & Australia), Sydney. Stein, JA 2007, ‘Mandatory What? Australia vs. America: Voting in the age of apathy and authoritarianism‘, F Newsmagazine (November 6). Stein, JA 2007, ‘More Fair Dinkum Than Thou’, New Matilda, 8 October. Stein, JA 2007, ‘Rob McHaffie’, Art & Australia, vol. 44, no. 4, p. 320. Stein, JA 2006, ‘Giles Ryder’, Art & Australia, vol. 44, no. 3, p. 640. Stein, JA 2006, ‘Louisa Dawson’, Art & Australia, vol. 44, no. 2, p. 480. Technology | Design | Craft | History
cc/2020-05/en_middle_0016.json.gz/line4630
__label__cc
0.578355
0.421645
Into the Clarities nearer the light, into the clarities come Platonicus Christianorum Sæcularis Mediated Ars Publica Identity Politics: Impact versus Intent, 2.5 of 4 February 16, 2019 February 16, 2019 / gregorystackpole Continuing from the first half of Part 2. Jonathan Haidt & Greg Lukianoff Jonathan Haidt (pronounced “height) and Greg Lukianoff wrote an article for The Atlantic in 2015 about how trigger warnings and the language of microaggressions reinforces exactly the opposite kinds of reactions that ought to be fostered for psychological and emotional health. Since then, Jonathan Haidt, who has been involved in research that certainly relates to these issues, has been included on many panels concerning the rise of the identitarian left. Haidt has noted (see this video here) that there is a good kind of identity politics, but it bears almost no relation to the victim-oppressor power framework that is used to interpret everything. In an excellent conversation with the much-maligned Peterson, he does talk about the modern notion of identity politics and social justice: “there are some people who see inequality, and want to end it; there are some people who see inequality, and want to reverse it.” He calls this “common enemy identity politics” vs. “common humanity identity politics”, the former entailing a “permanent condition of guilt and shame” for having certain identities, leading to perpetual conflict. Haidt and Lukianoff wrote a book that was a follow-up to that article titled The Coddling of the American Mind: How Good Intentions and Bad Ideas are Setting Up A Generation for Failure (New York: Penguin, 2018). There, they confront the idea that words can be violence (pp.94ff.), and note that interpreting words as violence is a choice, and one that leads to pain and that does not lead to emotional or psychological health. Speech and violence are distinct. They connect this to Cognitive Behavior Therapy, as well as to Buddhist, Stoic, and Christian texts of moral ascesis. Interpreting speech as violence, however, sanctions the use of violence in response to speech. Haidt also talks about the origins of microaggressions (his paper summary here), relying on the research of Manning & Campbell. In the book, The Coddling of the American Mind, the two of them deal with the prioritization of impact over intent: More generally, the microaggression concept reveals a crucial moral change on campus: the shift from “intent” to “impact.” In moral judgment as it has long been studied by psychologists, intent is essential for assessing guilt. We generally hold people morally responsible for acts that they intended to commit. If Bob tries to poison Maria and he fails, he has committed a very serious crime, even though he has made no impact on Maria. (Bob is still guilty of attempted murder.) Conversely, if Maria accidentally kills Bob by (consensually) kissing him after eating a peanut butter [43] sandwich, she has committed no offense if she had no idea he was deathly allergic to peanuts. […] It is undeniable that some members of various identity groups encounter repeated indignities because of their group membership. Even if none of the offenders harbored a trace of ill will, their clueless or ignorant questions could become burdensome and hard to tolerate. […] [46] It is crucial to teach incoming students to be thoughtful in their interactions with one another. A portion of what is derided as “political correctness” is just an effort to promote polite and respectful interactions by discouraging the use of terms that are reasonably taken to be demeaning. But if you teach students that intention doesn’t matter, and you also encourage students to find more things offensive (leading them to experience more negative impacts), and you also tell them that whoever says or does the things they find offensive are “aggressors” who have committed acts of bigotry against them, then you are probably fostering feelings of victimization, anger, and hopelessness in your students. They will come to see the world –and even their university– as a hostile place where things never seem to get better. If someone wanted to create an environment of perpetual anger and inter-group conflict, this would be an effective way to do it. Teaching students to use the least generous interpretations possible is likely to engender precisely the feelings of marginalization and oppression that almost everyone wants to eliminate. For people who have not seen this kind of new morality in practice, this probably sounds ridiculous, and over-exaggerated. As professors across U.S. college campuses have noted, however, this morality seemed to have appeared out of nowhere starting in 2013. It may seem like it’s “out there”, but it won’t remain so for long. I’m already seeing how the sensibility from this new morality is beginning to exercise a controlling influence on how material is taught in high school. Jonathan Haidt (& Kwame Anthony Appiah) There was a conference at NYU Law School on March the 2nd of 2016 about, basically, freedom of speech with regard to trigger warnings &c. The event is populated with remarkably insightful and articulate panelists. The language of impact vs. intent appeared several times across the duration of the many conversations. Jonathan Haidt and Viviana Bonilla López had several excellent exchanges there, one of which concerned the tensions between classical liberal arguments with regard to freedom of speech (Haidt) vs. speech that contributes to systemic oppression (Bonilla López). The exchange begins here (that’s Haidt), continuing here (with Bonilla López). Bonilla López talks about “impact” there, and “accountability for our impact”, with regard to the way that she claims our speech can harm our fellows and reinforce their marginalization and systemic oppression. It’s worth your time to take the five-or-so minutes needed to hear both sides, and the mutual replies (Haidt’s reply is here, Bonilla López’s counter-reply –with Haidt clearly offering words of disagreement– is here, where she talks about how the institutions of higher education were built to perpetuate the marginalization of the marginalized, and that “violent acts” are “thrown her way” in classrooms that don’t meet trigger-warning-type standards of advertising their content; there are other replies [1]). Now, Bonilla López laudably suggests we should “assume best intentions”, which is very good. I wish it were typically so among the advocates of this language. Call-out culture seems to be where this whole thing leads without other principles that would intervene to arrest that motion, and, as noted recently, call-out culture is very cruel. Sam Kriss, in his recent post concerning the Covington Catholic students, laments this kind of mob behavior. I suggest that it is built into the word we often hear in our high schools, “snitch”, and suggests a widespread mistrust that our institutions and systems that are responsible for peace and justice can deliver the justice they are set up to deliver — the tribe, not the state (or city, or school), is what is to be trusted; it is the tribe’s justice that is real justice. The shaming that the mobs of call-out culture generate follow the myopic kind of power matrix that Haidt outlines above, with the added layer of reasons and justifications being a cloak for the raw exercise of power: Shaming is okay as long as it’s directed at men by women, the powerless against the powerful. But that doesn’t address what to do afterward, if someone is found to have been wrongfully shamed, or when someone rightfully shamed wants to put his life back together. […] The more online shame cycles you observe, the more obvious the pattern becomes: Everyone comes up with a principled-sounding pretext that serves as a barrier against admitting to themselves that, in fact, all they have really done is joined a mob. Once that barrier is erected, all rules of decency go out the window, but the pretext is almost always a lie. […] There is no content to a shame storm. It is mindless by its very nature. It is indifferent to truth, even in cases where the truth could possibly be determined. Therefore, like the Ring, it cannot be used for good. […] We should all develop a robust sense of what is and is not any of our business. Shame can be useful —and even necessary— but it is toxic unless a relationship exists between two people first. A Twitter mob is no more a basis for salutary shaming than an actual mob is for reasoned discussion. [1a] Best intentions may be on the lips of the likes of Bonilla López, but the morality she represents does not, on the ground, behave that way. One key feature of the new morality –the one that generates the whole “impact over intent” idea– is to secure allies in your grievance against perceived oppressors, and to reach for institutional support to “address” the issue, rather than to deal with things privately. As for reasons being a cloak for the raw exercise of power: there is a reason I mentioned, in the first half of this post, that the ideals of the identitarians and the social justice warriors (not necessarily the same crowd, as I have discovered between writing the first half of this post and finishing this second half –the politics of dignity & recognition can conflict with the politics of just redistribution— though the latter dissolves into the former here for all intents and purposes) are quite other than the politics these ideals actually fund. I know someone who was a student at Claremont McKenna College (CMC) during the riots, and who knew the eight or so students who agitated the riots. The Dean Spellman did offer some infelicitous words in her response to the expressed frustrations of students (I’m not sure that students who came to her were ever “unsafe“), but it was reported to me that these eight-or-so students are largely misanthropes, who just want society to burn, and who blame racism and oppression for their bad grades, and for the fact that they are bad students. That does not mean that there is not a real insensitivity or even injustice occurring in some cases that drives these kinds of conflicts. [1b] Real insults and offenses need to be addressed, but the cause of justice and reparations is not aided by this language; it doesn’t help us deal with cases of failures of character or habitual neglect of care and decency. As for the allegedly misanthropic students who allegedly externalize their problems, the crowd who gathered around the (apparently it started within a general student council meeting as a way of addressing the legit grievance of the infelicitous wording, which, in context, is infelicitous) was sympathetic until, after an Asian CMC student began speaking, and saying things the agitators didn’t like, they saw them grabbing the mic away from her. The crowd lost interest in supporting these students after the incident, I am told. Because these kinds of people are always grieved, though, and because the larger culture is sympathetic to the victim (not a bad thing), there will always be fresh blood to join a new mob, on the pretext of justice, that is after power. Here, Haidt begins another reply, now to an intervening discussion about whether learning can occur in a classroom where professors hold to a position that makes students uncomfortable. He thinks that trigger warnings are “political warfare by other means”. Bonilla López replies to him by talking about “accountability”, where the “positive intentions” of a professor who speaks and nonetheless has a “negative impact” and “hurt[s]” a student is something that a professor should be “accountable” for. Waldron interjects that he agrees, but that “accountability” means that professors should not “silence themselves”, but should rather be prepared to give an account for why they said this-or-that thing in the classroom. The moderator (Kwame Appiah) then suggests that “what is needed” is that there is an atmosphere in which people can be asked to give an account within the classroom, and reasons can be exchanged. Suk then noted that “accountability” can basically be a cipher for power tactics, deploying the university as a mechanism for punishing professors and, in serious cases, firing them. “Hostile environment” claims can be used to shut down conversations, the very mirror of the social justice left’s stated claim that some speech is “violent speech”. Haidt then stated that “accountability sounds like a great idea”, but wondered “how it would play out in practice”. He immediately goes into the story about the event in his own teaching career which made him wary of the illiberality of the social justice left. This is why you see headlines like “I’m a Liberal Professor, and My Liberal Students Terrify Me“. Professors are combing through their syllabi to eliminate anything that could offend the feelings of the most sensitive students, because the self-appointed “vindictive guardians of what they see as the moral order” will punish them through the mechanisms of “hyper-accountability”. Suk responded to Haidt by saying that when professors whitewash their course materials from any controversial content, it diminishes the teaching experience. She also says that professors should “stand up” to this “cultural development”, and include controversial material, even if they’re falsely accused as being racists or homophobes. A student asks Bonilla López about the line between trigger warnings and difficult people or groups who use this language to disrupt the learning environment: where does the responsibility fall with this, given that professors are trying to teach difficult material, and some students end up in these classes who find it too difficult? Whose fault is that? Bonilla López replies that it is “scarier” to be the student “impacted every day of their lives because of an identity that they hold” by the class material than it is to be the professor who could be called to give an account. We should, rather, call to the professor’s attention that this-or-that thing that was said meant this-or-that to them, so that the professor is made aware. There is a burden on marginalized individuals to say these things. Those who were not aware of this before, because they held a kind of “privilege”, now need to be aware. Another student stated that there is a difference between educating those with privilege about the experiences of those who are marginalized, and obstructing learning because someone is uncomfortable. No one gave Haidt a generous interpretation of his intentions when he was called to give an account to administration. Where is the line? The balance of power currently does not seem to be in the professor’s favor. Bonilla López replied that we need to “believ[e]” people who say they are hurt, have experienced trauma, listening to them, and “giving validity” to their experiences. We should not label people as “too sensitive”, we need to listen to them. Haidt followed up on this by saying that Bonilla López is right on this particular matter, that “diversity is hard”, and that we need to know how to have these difficult conversations. He also suggested that students have assigned to them for their summer reading list, not books about racism and colonialism and other books “that train kids to be upset about privilege”, but John Stuart Mill’s On Liberty, Dale Carnegie’s How to Win Friends and Influence People, the Sermon on the Mount, and the Dhammapada. “Yes: we need to give one another the benefit of the doubt, and this is what has disappeared. The idea is accuse first, and then social media after that. If you think someone has done something, talk to that person first; don’t bring in the adult reinforcements.” One student asked Haidt how he could be consistent in his holding of a free-speech perspective, given that what seemed to have happened in his classroom –that Haidt objected to– was that a student had an objection, expressed it, and then took to social media where others held it, and expressed it. Haidt then said he didn’t see how it was a free speech issue, or an inconsistency in his position. Haidt reiterated that the issue under discussion was “accountability”, that “the process is the punishment”. “We’re all really busy“, and if we’re going to lose a month of research, we’re going to scrub our syllabus. “If we think that classrooms are safe spaces,” and if we think that professors are accountable to their students’ “safety”, then “that is not a place where I want to teach.” Appiah replied to Haidt and Bonilla López that “we haven’t developed appropriate norms of responsibility”, that this does not mean there should be laws against irresponsible speech, but that we must build a culture of responsibility, and that we must establish (a) that someone said something, and that (b) it has the significance we’re claiming it has, before we make accusations. “I’m afraid that that does not look like the world of the web to me.” Bonilla López urged that we listen to and learn from our students about what hurts them, what language is appropriate, “what things you can say, what things will strike them this-and-that way; this information is out there”. Haidt interrupted her final words by noting that “that would not protect you”, and spoke about the situation at Claremont McKenna College in 2015. [2] “It’s basically a Maoist shame circle”. “Listening to students will not protect you. The new regime is: if anyone is offended, you have committed an act of aggression. Microaggression, but it’s an aggression nonetheless, even a form of violence. And so, this is where we are.” My Personal Frustration I don’t want to open myself up to ad hominem attacks, as I think the reasons given thus far –and which I intend to give in future posts– are sufficient and public. If I may, I will offer some reasons why this particular principle of the social justice identitarian left upsets me on a personal level (their other principles upset me on other levels personally, in addition to my other criticisms of them). I want (A) to have intimacy with other people, even across differences of opinion (without needing to hide mine, or for anyone to fear being ostracized) and (B) I want to have the right to call “nonsense” to things going on in, or commitments held by, any community or institution to which I belong. I want to have intimacy with people, and that requires that they be sincere, and vulnerable. It means we need to be able to rely upon habits, conventions, and customs that we share in order to make space to inhabit together. It also means that we need the freedom to negotiate this space, if we need to create it, or build upon what we have in common. I need to be able to “show up” as who I am, and the other person needs to be able to do the same. Yet this kind of identitarian language seems uninterested in building anything, and incapable of it; it is locked into an over-determined sense of what it means to belong to this-or-that community, and it hides the real sources of the kind of profile-based oppression they say they are fighting (which are not rooted in speech, but in material arrangements). I want to be understood, and to understand others, and in order to do that, we need to be able to open our hearts; but these rules would police all of that, and teach people to play the game and groom themselves to say the right things to evade being flagged and attacked (it would just drive bigotry deeper underground); these rules would mean that my intentions, or your intentions, don’t matter, and that the interpretations of those who don’t like you or me gain power over the meaning of what we say. How can we have intimacy if we aren’t allowed to be heard for what we intend to say? [3] This gutting of the role of intention, and the logic for doing so, seems to shut down any criticism from anyone who is not part of the party line, privileges certain kinds of projects and outrages as being more important than others without the ability to propose alternatives. The emotional grammar it reinforces is rigid and merely blinks at anything that is not clearly friend or foe, and seeks to resolve any middle ground to war-party positions. I want to have dialogue, and this shuts down dialogue. Even the in-group can’t dialogue. Dialogue means that the parties cannot control where they will end up — and the identitarian social justice warriors want to control the outcomes. Even conservatives and my conservative friends are open to debate; the best of them hone their positions and refine their commitments in the light of defending and even shifting their publicly-displayed positions. I wish identitarianism didn’t hold sway over the environments of my liberal friends, because it means that I have to suss-out my fellow non-identitarian liberals, because for the rest, relationships are difficult — and dangerous. There is one reply by another panelist Jeannie Suk on the question of systemic oppression and preventing the language of violence from creeping into non-violent forms of frustration and alarm, and another reply by Jeremy Waldron, who says that we “can’t run a University as a reinforcement society”, so we need to learn how to criticize and be criticized and to respond to criticism. Kwame Anthony Appiah solicits Jeannie Suk to answer how to address the idea that the classroom is an oppressive environment; Suk replies that “distress” cannot be subjective, that there must be objective, substantive standards that need to be laid out in order to determine whether a classroom environment is actually a hostile environment that undermines learning, and that the idea of trauma is not helpful to set these standards, because of how it is not suited to outline the conditions that need to be met in order to determine whether the classroom has, in fact, become oppressive. [1a] See here. It responds to this video. [1b] So hear one Palestinian-American CMC student’s report here. My friend from CMC does not know about this particular incident, and doesn’t remember any follow-up on it. My friend does, however, affirm that there were a couple professors this one knew who would say some vulgar, offensive, abrasive, insensitive things, or who would offer female students an extra ten points on tests because girls “were inherently worse at math” and somesuch — a kind of charity-nested-in-bigotry that is impossible for me to untangle at the moment.. See the Guardian, Inside Higher Ed., The Atlantic, and The New York Times. Granted, there are times when the motives for what we say are not available to us, but that doesn’t mean that access to the real sources is likely to occur if we follow the logic of the way that the identitarian left pursues social justice. The unconscious is accessed by other means. Header image found here. Ars Publica, Books Bradley Campbell, Jason Manning, Jonathan Haidt, Kwame Anthony Appiah, The Politics of Identity ← Identity Politics: Impact versus Intent, 2 of 4 the book (is an extension of the eye) — Jen Mazza → One thought on “Identity Politics: Impact versus Intent, 2.5 of 4” Pingback: The Burden of Unfinished Things | Into the Clarities Start a conversation! Cancel reply Follow Into the Clarities on WordPress.com Acts of the Apostles Adolf von Harnack Alasdair MacIntyre Alexander Golitzin Ambrose of Milan Anastasius I Dicorus Aristotle Astrology Augustine of Hippo Aurelius Prudentius Clemens Ausonius of Bordeaux Authority Axiology Basil of Caesarea Benedict Anderson Benedict of Nursia Boston College Brian Tierney C. S. Lewis Capitalism Carolus Magnus (Charlemagne) Cary Nederman Charles T. Mathewes Charles Taylor Christianity Christianization Christian Times Class Stratification Community Conscience Constantine I Consumerism Cosmology Crispin H. T. Fletcher-Louis Criticism Cyprian of Carthage Daniel David Bentley Hart Dead Sea Scrolls De Civitate Dei Contra Paganos De Doctrina Christiana Denys Diocletian Disenchantment Dissent Donatism Dunkin' Donuts Eamon Duffy Edward Gibbon Erasmus of Rotterdam Eric Perl Erik Peterson Eusebius of Caesarea Evolution Francis Fukuyama Francis Oakley Freedom Friedrich Nietzsche Friedrich Schleiermacher Fyodor Dostoyevsky Gabriel Biel Gerard O'Daly Gospel According to John Gospel According to Luke Gospel According to Mark Gospel According to Matthew Gregory Palamas Gregory the Great Hans Jonas Harry Y. Gamble Hebrew Bible Hegel Heiko Oberman Hippolytus of Rome Historical Consciousness Historical Distance Homer Immigration Interpretation of Scripture Isaac the Syrian Isidore of Seville Jacques Maritain James Dunn Jerome Jesus of Nazareth Joel Marcus John Bremer John Calvin John Chrysostom John Dillon John Duns Scotus John of Paris John Parker John Watt Jonathan Haidt Joseph Canning Judaism Julian Huxley Kierkegaard Kwame Anthony Appiah Leo I Libido Dominandi Magisterial Reformers Mainline Protestantism Marcus Terentius Varro Marcus Tullius Cicero Mark Lilla Marsilius (Marsiglio) of Padua Martin Heidegger Martin Luther Martin of Tours Marxism Mary Midgley Materialism Mendelssohn Michael Allen Gillespie Mind Minimum Wage Modernity Modern Theology Niccolo Machiavelli Origen of Alexandria Orosius of Braga Orthodox Church Orthodoxy Paganism Papias of Hierapolis Paulinus of Nola Paul of Tarsus Paul Rorem Pavel Florensky Peter Berger Peter Brown Peter Lombard Plato Platonism Plotinus Poems Poetry Pope Gelasius Popular Culture Poverty Protestant Reformation Psalms Pseudo-Dionysius Pythagorean Quintus Aurelius Symmachus Ramsay MacMullen Rationalization Reginald Haynes Barrow Reinhard Hütter René Descartes Revelation to John Revivalist Protestantism Richard Crouter Ritual Robert A. Markus Robert Holcot Roman Catholicism Roman Empire Ronald Hathaway Rufius Antonius Agrypnius Volusianus Schleiermacher Scholasticism Scientific Revolution Secularism Secularity Secularization Seneca the Younger Sergius Bulgakov Simone Weil Slavery Social Differentiation Sophists Soren Kierkegaard Steven Ozment Stoicism Tertullian Thales The Brothers Karamazov The Iliad Theodor Adorno Theodoret of Cyrrhus Theodosius I The Odyssey Theology and the Bible The Politics of Identity The Reformations The Republic Thomas Aquinas Thomas de Zengotita Torture and Eucharist Urbanization Value Walter Ullmann Wilhelm Dilthey William Cavanaugh William of Ockham Wolfhart Pannenberg World War II
cc/2020-05/en_middle_0016.json.gz/line4633
__label__wiki
0.77522
0.77522
Legal Advice With Perspective info@irelandstapleton.com Rebecca L. Almon Timothy G. Atkinson Sarah W. Benedict Eric R. Benson Tom Downey Kelley B. Duke Michelle B. Ferguson K.C. Groves Mark E. Haynes Jeffrey S. Hurd Russell W. Kemp James J. Killean Mark E. Lacis Benjamin J. Larson William H. Parsons Jr. Emily J. Powell Dino A. Ross William E. (Bill) Tanis Erica L. Tarpey Thomas J. Wolf James G. Benjamin Charles L. Borgman Bernie Buescher Wilton W. Cogswell, IV Regina T. Drexler Barbara Weil Laff Walt Lemanski John G. Lewis Michael R. Miller James K. Tarpey Jennifer L. Gilbert John E. Jennings, III Zachary R. Mueller Zach Price Josephine B. Reid Lidiana Rios James R. Silvestro Michelle R. Thom Kobi A. Webb Ryan G. Wilcox Elizabeth P. Woodward Government Relations & Regulatory Affairs Mr. Haynes engages in an active litigation practice primarily involving business disputes. He represents individuals, businesses and political committees in matters involving all aspects of commercial litigation. He also serves as pro bono counsel and as a board member for Friends of Patan Hospital (USA), Inc., an organization that supports the work of Patan Hospital in Nepal. He helps the group with obtaining and maintaining 501(c)(3) status, corporate matters and regulatory filings. He received a B.A. with honors from the University of Wyoming and a J.D., cum laude, from the University of Michigan in 1982. He served as an officer in the U.S. Army, including a tour as tank company commander. Prior to joining Ireland Stapleton, he was with the firm of Gorsuch, Kirgis, Campbell, Walker and Grover from 1982 – 1986 and joined Morrison and Foerster in 1986, becoming a litigation partner in 1990. Mr. Haynes was with Pryor, Carney and Johnson and Pryor, Johnson, Montoya, Carney and Karr between 1993 – 2005 where he served as head of the firm’s commercial litigation practice. Legal Experience Handling major litigation for the bankruptcy trustee of a bank holding company concerning the ownership of a large tax refund vis a vis the FDIC as receiver of the failed bank. Cagle v. Mathers Family Trust, 11 SC 496. Won an appeal to the Colorado Supreme Court. The client was Martin Harper CPA, a CNA insured. Mr. Harper was sued for his role in providing accounting services to certain partnerships. The partnership agreements had forum selection clauses requiring that suit be filed in Dallas, Texas. We obtained a dismissal in the trial court that the Colorado Court of Appeals reversed. We obtained a unanimous reversal of the Court of Appeals from the Colorado Supreme Court. Eagle View Development LLC v. Bondi & Co. LLC, Civil Action No. 2008 CV 1718. Two week trial of a claim of accounting malpractice against a regional accounting firm, a CNA insured in which plaintiffs sought approximately $2.7 million. The court entered a defense verdict on all claims. Represented several clients in connection with SEC subpoenas and investigations. Two-week trial before the District Court of Montrose County, Colorado, in a complex case concerning contracts and leases relevant to a fixed-base operator general aviation business at the Montrose Regional Airport, in opposition to Montrose County, the airport operator and a competitor. The result was mixed, but considered very favorable by the client. Professional Security Alliance, Inc. v. Hanson Professional Corporation, Case No. 02-CV-381. District Court, Adams County, Colorado. This was a two-week trial of an accounting professional negligence case defending Hanson Professional Corporation (insured by CNA). The trial was conducted by Mark Haynes and Bob Carney sharing responsibilities, Mr. Carney handled opening statements and approximately half of the witnesses, and Mr. Haynes handled closing arguments and approximately half of the witnesses. This case was tried because plaintiff refused to negotiate within the amount of the reasonable case exposure. The damages awarded by the trial court accorded with our valuation of the case. District Court, City and County of Denver, Colorado. The two-day trial of suit against former employee for alleged theft of trade secrets. Case settled after trial. District Court of Mesa County, Colorado. One-week trial of lawsuit between two owners of a Grand Junction nursing home alleging breach of fiduciary duty and misappropriation of funds between the two of them. All claims against our client were dismissed and our client was awarded attorneys’ fees. Contributor, “Bankruptcy Exemption Manual,” West’s Bankruptcy Series, 2018 American Bar Association, Sections of Litigation, Business Law and Intellectual Property Colorado Bar Association Denver Bar Association mhaynes@irelandstapleton.com Download Mark Haynes’ vCard Download Mark Haynes’ Biography University of Michigan, J.D. cum laude, 1982 University of Wyoming, B.A. with honors in history, 1975 Phi Beta Kappa, Phi Kappa Phi, Department Honors in History Phi Alpha Delta Law Fraternity, Book Award in Conflicts of Laws Admitted to practice in Colorado U.S. District Court for the District of Colorado The New Year Brings New Wage Requirements to Colorado New Employment Laws Impacting Colorado Businesses Fair Labor Standards Act Protections Apply to Employees of Marijuana Companies The reach and speed you need Content © Ireland Stapleton Pryor & Pascoe, PC
cc/2020-05/en_middle_0016.json.gz/line4635
__label__cc
0.534495
0.465505
kitaab connecting Asian writers with readers globally The Lounge Chair Interviews Special Interview series – Urdu writers Books Revisited Kitaab Bookstore Kitaab TV Kitaab Newsletter Kitaab Authors Countries in Focus By A. Jessie Michael Of all the major festivals in the world, none I think is more universally celebrated than Christmas. There is something in the air in December that reaches far and wide. When I arrived in China in 2012 to teach, I found a dismal artificial, Christmas tree with tangled streamers, in my classroom, in March of all months! The students who had put it up had no notion of the origins or the meaning of Christmas (or any other religious festival) except that it was universally fashionable to celebrate this thing called Christmas, in December, with a tree. It did not occur to them that it should have been taken down in January. It was in Florida and Australia that I discovered the Christmas Shops. I could not imagine that they stayed open all year round. At Christmas, Floridians have Santa Clause, sleigh, reindeer, and lights and whatnots on their rooftops, down the driveway and all around the garden. Sydney lights up the city and has amazing light displays of the nativity on the outside walls of a Church. Singapore lights up Orchard road and makes it a tourist attraction. No city is spared this dressing up. In the Gardens Mall in Kuala Lumpur near where I live, this year it is a White Christmas! There were white trees laden with white cotton and white streamers; there were white swans, still, on a glassy lake and deer motionless under cotton laden trees. There were even polar bears in mid-prowl on snow. Outside it was 33 degrees Celsius. The hotel lobbies in the city are even more beautifully done up. When our children were small, we used to take them hotel-lobbies just to view the decorations. The origins of Christmas are religious and holy but always seen as a time for joy for everyone. Over the years with the advent of Santa clause with his legendary beginnings and his multiple selves, followed by Rudolph and his red nose competing with the Baby Jesus, Christmas has taken on two separate lives, the sacred and the secular. The first sings of the Child in the manger and the other of jingle bells and chestnuts on the fire. The sacred is Middle-Eastern, the secular is undeniably Western what with snowflakes and sleighs- bells. Yet there is no tension between the two. Somewhere in between, the twain do meet. The droves of people at the Mall with their children and cameras seem genuinely happy. The mood is infectious. I know for a fact that many non-Christians and total non-believers put up trees and exchange gifts just not to miss out in this season of goodwill. For believers in my city and in other towns in Malaysia, I know the churches will overflow at every service — the Christmas eve services and the morning ones. It is always the case. The giving-trees are up where one can hang gifts for orphans. Christmas choir performances are on full swing if you care to check your events page on Facebook. At the same time, embassies are running their Christmas charity bazaars. There are the untold tales of those who celebrate with almsgiving. They visit the prisons, the homeless, the orphans or the aged with food, gifts and cheer. It is the season of giving and prayer and the season of joy, one in which even the saddest of hearts will smile a little and the hardest of hearts will melt a little. Everybody is in the mood, even the naysayers, who, like Scrooge, stomp their foot and say — “Bah! Humbug!” Scrooge then did a volte face. Charles Dickens had captured the essence of the season beautifully in his novel written in 1843, A Christmas Carol — that charity, compassion and love reign supreme in this holy season. Mitali Chakravarty December 25, 2019 2019, christmas, Essay, Festival Shanghai — A nostalgic journey back with Zafar Anjum Zafar Anjum writes about his Shanghai trip in 2011 Shanghai Bund by night Initially I was not sure if I was going to Shanghai at all, but the visa came through. I had tried once before but was not lucky enough to get the visa (in that instance, the paperwork was not complete and so on; it’s a long story). I was totally unprepared for the journey this time. This was one of those rare journeys which I undertook without reading anything about the city that I was visiting. I think there was some innocence about this unpreparedness, this ignorance. I took Shanghai as she revealed herself to me. I didn’t go there with any fixed images, so I was neither overwhelmed nor underwhelmed when I stepped into Shanghai. Before going to Shanghai, one of my colleagues had shown me pictures of his visit to the city nearly ten years ago. In his collection, there were pictures of skyscrapers, the famous Bund, and some Chinese temples. In the pictures, the sky looked muddy, overcast with smog. Only that image of a smog-laden Shanghai stayed with me. Avoid the beggars in Shanghai, my colleague warned me. There will be plenty of them and they will approach foreigners like you, he said. I noted his advice. From my Indian experience I knew how to avoid beggars, so I was not worried about encountering them. Mitali Chakravarty November 1, 2019 China, travel, Travelogue, Uncategorized Short Story: A Modest Disposal by Richard Lord The traffic on the Amity Causeway linking Singapore and Malaysia was especially heavy for a Thursday, which put Dennis Quek even more on edge. He took a deep breath as he approached the first entry point station, hoping that he could swallow any obvious distress signs that the inspection machine might detect. Finally, Dennis reached the front of a long queue. His car was pulled automatically into the right spot before the inspection machine. The hazy blue light filled the whole car, followed by the voice of the machine. “One person in vehicle. A driver, no passengers.” Dennis nodded. He then turned his head to the right, ready for the facial identification. This time it was the warm, lemony light that filled the front of the inspection machine. Dennis squeezed out an awkward smile, thinking this was best for the situation. The smile was starting to get uncomfortable when the machine finally announced the identification. Mitali Chakravarty September 23, 2019 2018, Book Excerpt, Short Stories, Singapore, speculative fiction, The Best Asian Speculative Fiction More Online Avenues for Books in Asia with Tencent’s China Literature & Singtel Merger Despite studies projecting that millennials may prefer reading paper books over e books, China Literature, a pioneer online literature company, is tying up with Singtel to bring literature to readers online. China Literature, a unit of Tencent Holdings and China’s largest e-book and online publishing website, boasts 9.6 million e-books from 6.4 million authors and they plan to grow bigger with the merger. “We are the biggest owner of intellectual property (IP) in China, but that’s not the end of the story,” said vice-president Luo Li of China Literature. China Literature earns its income by charging readers for their services. Last year it generated an annual profit of 30.36 million yuan. However, Mr Luo Li stated that online readers would be charged lesser once the income from the IP business rose. Mitali Chakravarty June 24, 2019 2019, books, China, Chinese Literature, E-books, international publishing, Literature, writers Short Story: The Siege by Tan Kaiyi He felt the ground for the reassuring grip of his cleaver. Once he had it in his hands, he crouched down and heard for sounds. The night was dead quiet. Not a good sign. It was a shade of absolute silence that was all too familiar to Lao Seng. He gripped his cleaver tightly. He peered over the barrier that marked out the activities area for the elderly to look at the field between the two blocks. The electric lamps had dimmed as well, creating a darkened no man’s land. Something metallic hit the floor violently and from the sound, Lao Seng knew where it was. One of the offering bins had been toppled and thrown against the pavement. The sleepers in the apartment upstairs would only hear it as a minor nuisance before they roll up their blankets to return to slumber. For Lao Seng, it would be a different story. He eyed the area under the tree where the offering bin lay. It was now somewhere in the covered walkway between the two blocks. In its place, was a black figure, hunched over like an ape. Its form was indistinct, as if one could see through it. Dark smoky trails rose out of it, like it was burning from a black fire. The ape figure was rummaging through ashes of the joss paper as well as several food pieces scattered around the field. It was hunched over, totally focused on picking through the burnt heap. Mitali Chakravarty June 17, 2019 2018, Book Excerpt, short story, South-East Asian writing, The Best Asian Speculative Fiction Poetry: Bak Kut Teh (Pork Ribs Tea) by Godwin Tan Godwin Tan is a Master of Law candidate at Queens’ College, University of Cambridge, and holds a Bachelor of Laws from University College London. His poems have been published in various anthologies, including The Cambridge Pamphlet (CUPPS 2018) and Happy Birthday to Me: A Collection of Contemporary Asian Writing (Dahlia Publishing 2010). Mitali Chakravarty June 10, 2019 2019, Poetry, Poets, Singapore New Releases from Asia: June, 2019 Title: The Billionaire Raj Author: James Crabtree Publisher: Oneworld Links: https://singapore.kinokuniya.com/bw/9781786075598 About: India’s explosive rise has driven inequality to new extremes, with millions trapped in slums as billionaires spend lavishly and dodge taxes. Controversial prime minister Narendra Modi promised ‘to break the grip’ of the Bollygarchs, but many tycoons continue to thrive amidst the scandals, exerting huge influence over business and politics. But who are these titans of politics and industry shaping India through this period of breakneck change? And what kind of superpower are they creating? A vivid portrait of a deeply divided nation, The Billionaire Raj makes clear that India’s destiny – prosperous democratic giant or corrupt authoritarian regime – is something that should concern us all. Title: Indigo Girl Author: Suzanne Kamata Publisher: GemmaMedia Price: US$14.95/ Rs 1,326.00 https://www.amazon.com/Indigo-Girl-Suzanne-Kamata/dp/193684673X https://www.amazon.in/Indigo-Girl-Suzanne-Kamata-ebook/dp/B07RV7PG7D/ref=sr_1_1?keywords=Indigo+girl+by+Suzanne+Kamata&qid=1559100922&s=gateway&sr=8-1 About: Fifteen-year-old Aiko Cassidy, a bicultural girl with cerebral palsy, grew up in Michigan with her single mother. For as long as she could remember, it was just the two of them. When a new stepfather and a baby half sister enter her life, she finds herself on the margins. Having recently come into contact with her biological father, she is invited to spend the summer with his indigo-growing family in a small Japanese farming village. Aiko thinks she just might fit in better in Japan. If nothing else, she figures the trip will inspire her manga story, Gadget Girl. However, Aiko’s stay in Japan is not quite the easygoing vacation that she expected. Her grandmother is openly hostile toward her, and she soon learns of painful family secrets that have been buried for years. Even so, she takes pleasure in meeting new friends. She is drawn to Taiga, the figure skater who shows her the power of persistence against self-doubt. Sora is a fellow manga enthusiast who introduces Aiko to a wide circle of like-minded artists. And then there is Kotaro, a refugee from the recent devastating earthquake in northeastern Japan. As she gets to know her biological father and the story of his break with her mother, Aiko begins to rethink the meaning of family and her own place in the world. Mitali Chakravarty June 1, 2019 2019, Asian writing, Beyond Asia, books Writing Matters: In conversation with Felix Cheong By Mitali Chakravarty He wears a tattoo of a typewriter on his right arm as a mark of his trade, as his “stigma”. He wrote a poem about his tattoo. He writes what he believes, no longer with a typewriter (as he did when he started to write in the 1980s). This is a writer, who, despite staying rooted to his surroundings, sees no boundaries in literature. He reads what comes his way and does not specifically think of literature in terms of regions, like ASEAN. That writing is universal and remains borderless is well borne out in his interview as in his writing and the influences they have had… The author of 13 books across multiple genres, including five volumes of poetry, two children’s detective novels and a trilogy of humour stories, Felix Cheong has been invited to perform his works at international festivals all over the world, including Edinburgh, West Cork, Austin, Christchurch, Sydney, Bangalore, Hong Kong and Ubud. Cheong is the winner of Singapore’s National Arts Council’s Young Artist Award in 2000, and holds a Master’s in Creative Writing from the University of Queensland. In 2010, he was named by Readers Digest as the 29th Most Trusted Singaporean. He is currently an adjunct lecturer with the University of Newcastle, Murdoch University, Singapore University of Social Sciences and LASALLE College of the Arts. Felix Cheong’s latest collection of poetry is B-Sides and Backslides: 1986-2018. Felix Cheong Mitali: You have been writing poetry for more than two decades now. What made you start writing poetry? Felix: Like sex, you always remember the first time. It began innocuously enough when I was in junior college (high school in Singapore). As a geeky teen blessed with all the social skills of a wallflower, I could only impress a classmate, on whom I had a crush, by writing her a Valentine’s Day poem. It was handwritten on a card I had made; such was the entrepreneurial spirit I had back then. But as Auden famously says, ‘poetry makes nothing happen’; so nothing happened. In any case, it was bad poetry at its finest hour, which I would have cheerfully disowned now! Mitali: In your latest book, B-Sides and Backslides, you have spoken of how both T. S. Eliot and Beatles fascinated you. What is it in T. S. Eliot’s poetry or in the Beatles’ compositions that had this effect on you? Do they still draw you as much or do you feel that you have got over your fascination? In “We are the Salary Men”, you say that while ‘We may be the hollow men but the least we own is our honesty to know…’ Felix: Beatles’ music was instrumental in making me pay close attention to words and by extension, poetry. I remember spending hours – talk about the devil finding work for idle hands to do! – trying to write down what they were singing (thank goodness there was no Google back then). Through the sheer act of transcription, I had my first lesson in poetic rhythm. I loved – and still do – the musicality of their lyrics, such as “A Day in the Life”, “Eleanor Rigby” and “She’s Leaving Home”. Eliot’s poetry, particularly “The Love Song of J. Alfred Prufrock’, affected me in a different way when I read it at the still-impressionable age of 22. It sprung me into a modern diction that spoke to my sense of alienation. It was also Catholic in the way it articulated spiritual emptiness. I recall memorising parts of the poem while preparing for my first-year university exams. His cadences and imagery would imprint themselves on my early poetry. Sucharita Dutta-Asane December 21, 2018 2018, ASEAN, Asian writing, Interview, Poetry, Poets News: Apply now – Speculative fiction writing workshop on AI futures From Digital Asia Hub We’re thrilled to announce a 2-day event, aimed at generating ideas and pieces that […] Sucharita Dutta-Asane December 3, 2018 2018, Artificial Intelligence, Fiction, Singapore, speculative fiction, workshop Poetry: Proscenium and Last Yarn by Iain Lim Jun Rui Proscenium and Last Yarn by Iain Lim Jun Rui Iain Lim Jun Rui an aspiring poet and filmmaker. A […] Sucharita Dutta-Asane November 22, 2018 2018, Asian writing, Poetry, Poets, Singapore
cc/2020-05/en_middle_0016.json.gz/line4655
__label__cc
0.640586
0.359414
Arrium ASX Announcement- Administrator update The Administrators of the Arrium Group Companies have today issued a Report to Creditors covering the sale of Arrium Australia, the estimated distributions to be made to creditors and an investigations update. Report to creditors This report is now available in the creditor information section of the KordaMentha website for the benefit of all stakeholders. Declaration of worthless shares The Administrators of ACN 004 410 833 Limited (Subject to Deed of Company Arrangement) (formerly Arrium Limited) declare there are reasonable grounds to believe shareholders will not receive a distribution. Accordingly, a Declaration of Worthless Shares has been made pursuant to Section 104–145 of the Income Tax Assessment Act, 1997 (‘the Declaration’). A copy of the Declaration may be obtained from the creditor information section of the KordaMentha website. All enquiries related to the Declaration should be first directed to Boardroom Pty Ltd via telephone at 1300 737 760. Shareholders should seek independent tax and legal advice regarding their individual circumstances in relation to the Declaration. Michael Smith – (03) 9440 9387 or 0411 055 306. Martin Madden Placer Property secures 333 Exhibition Street for $37.5 million RugbyWA back on track
cc/2020-05/en_middle_0016.json.gz/line4668
__label__cc
0.639646
0.360354
What is Diversity & Inclusion? Strategic Areas of Focus Bottom Line Impact Vision of Success Global Diversity Strategies Executive Commitment Executive Commitment Journey Executive Alignment Key Stakeholder Development Measurement & Sustainability Understanding Systemic Diversity Issues in Healthcare April 23, 2019 /0 Comments/in Diversity in Healthcare /by The Kaleidoscope Group With dramatically shifting patient demographics and changing patient composition in the US, we are failing to observe corresponding shifts with physicians and healthcare executives. In the year 2000, census figures reported that the United States comprised of about 20% minorities. Today, minorities represent about 40% of the American population. The population of the US is changing to more Latinos, more women, and more elderly, while many healthcare organizations are primarily run by white men and women. Ultimately, these statistics highlight the need for more diversity in healthcare. Studies indicate that patients often prefer to be treated by physicians that share their demographic traits. Countless studies are proving that we prefer being around people that are similar to us. We are more likely to share vital information with those we perceive to be trustworthy – it’s a natural response to trust someone that has more in common with you. Ultimately, health care is about making the patient feel comfortable, and there is a calming effect when a healthcare practitioner walks through your door that possesses characteristics that are similar to you. Diversity and inclusion is all about reflecting and understanding the community that we serve. The more we can reflect those who we are serving, the better we will be able to serve them. About 6% of American physicians identify as African-American, while the African-American population represents about 13% of the US population. It’s clear we need to start emphasizing diversity in healthcare more. We Should be Doing More to Facilitate Diversity in Healthcare Working in healthcare requires traversing a lengthy, challenging path. We must ask ourselves, “Are the preparatory systems set up to serve people of all types of backgrounds?”. Ultimately, there’s unlimited access to sickness, but limited access to the skills and training it takes to develop professional capabilities and positions in the healthcare industry. By bridging the gap, we are developing a healthcare community that more closely reflects its patients. Ultimately, we will position ourselves to see greater levels of patient care by nurturing a greater understanding. Diversity in healthcare is not simply the act of meeting employment quotas – it’s a path to eliminating human suffering. Doug Harris, CEO of The Kaleidoscope Group, references a period where he was working with a well-known university’s med school. During conversations with the school’s administration, Harris discovers that their statistics suggest that you start applying for med school in the 2nd grade. Ultimately, if you’re not in your school’s science fair in the second grade, you’re more than likely not on a path that leads into med school. Furthermore, 96% of people color in med school are the children of physicians. What this means is that making it to med school requires grooming from a very young age. Greater Outcomes with Diversity in Healthcare We should be taking on and refining societal challenges including the costs, preparation, and resources for developing healthcare professionals. Our current system is dynamic and perhaps transient for some groups. We need to play our part by encouraging minority groups to start focusing on healthcare and STEM fields including science, technology, engineering, and mathematics. Furthermore, we need to facilitate access to these fields by providing the resources to education and mentoring. We see a close parallel with the policing situation in many predominantly minority communities. The question arises that if minority communities were policed by people who’s demographics better reflect their community, would there be different outcomes in how situations are handled and conflict is managed? The best way to find the answers to these questions is by making it happen and reviewing the outcomes. We are a diverse group of people. With more diversity in healthcare, the quality of our healthcare improves. Ultimately, it’s time to start reaching out to our minority youth and encouraging them to become the best version of themselves and start joining these lucrative and demanding fields. https://kgdiversity.com/wp-content/uploads/2019/04/kg-video-blog-healthcare-featured.jpg 720 1280 The Kaleidoscope Group https://kgdiversity.com/wp-content/uploads/2016/12/kglogo.png The Kaleidoscope Group2019-04-23 13:58:052019-04-23 15:39:13Understanding Systemic Diversity Issues in Healthcare HR As More Than Process Manager: 3 Ways Cultural Competence Will Transform You Into A Change Agent In Your Organization Clifton Strengths as a Diversity & Inclusion Tool Diversity and Inclusion Impact the Bottom-Line and Other Key Performance Metrics Doug Harris Celebrates 30 Years in Diversity and Inclusion D&I Assessment D&I Training Diversity in Healthcare The Kaleidoscope Group 416 W. Ontario Street, C-2 info@kgdiversity.com Join us on December 11th at 11am central for a powerful webinar on How To Build Inclusive Teams That Foster Inclusive Cultures. . Learn more & Register Here. Get regular updates and insights on Diversity and Inclusion, events, ideas and more. If there is one frustration that we at The Kaleidoscope... Read more → © Copyright - The Kaleidoscope Group, LLC // Some imagery courtesy Women of Color in Tech #WOCinTech The Biggest Mistake Companies Make With Diversity Training Understanding Privilege: The Next D&I Challenge
cc/2020-05/en_middle_0016.json.gz/line4674
__label__wiki
0.531166
0.531166
Unlock the adventure...one key at a time Eric Luper Eric Luper has written books for kids of all ages, including the YA novel Seth Baumgartner's Love Manifesto. He loves excitement and is always looking for his next adventure. Eric has fibbed his way into a tour of the ultra-secret Pez headquarters, rebuilt a castle in France, explored the tunnels under Paris and Istanbul, escaped hungry crocodiles in Costa Rica, and rafted down the Colorado River. He lives with his family in Albany, New York. Collect all the keys in each maze level to escape the secret library. Find out More About the Key Hunters Characters Whether Cleo is diving for the ball on the soccer field or dangling over a pool of man-eating sharks, she’s always ready for action. She’s a good friend, an amazing athlete, a natural leader, and a fearless adventurer. Sometimes a bit too fearless, if you ask her friend Evan. Cleo sometimes lets her curiosity lead her down dangerous paths... There is only one thing Evan likes more than reading, solving puzzles, and playing his trombone—telling jokes. Do you know why an elephant uses his trunk as a bookmark? So he always nose where he stopped reading! Jokes help calm Evan down in tense situations. But although he may be a bit timid at times, he’s the kind of friend you can count on when the going gets tough. Ms. Barbara Crowley Cleo and Evan don’t know how Ms. Barbara Crowley came to be the librarian at their elementary school. All they know is that she isn’t very nice…and she’s awfully mysterious. Why does she always wear an old-looking brass key on a chain around her neck? And why do Cleo and Evan often hear her clicky heels tapping a path to a rarely-visited section of the library? There is only one way to find out—follow her through a secret passage to a hidden library beneath the school! Artie Doyle At sixteen-years-old, Artie Doyle is the youngest detective with the London police department. And he has been given the biggest case of his life—the disappearance of the famous Musgrave Moonstone. But since Artie is a little…scatter-brained, he’ll need Cleo and Evan to help him. Their first clue? The moonstone is really a huge diamond! Artie Doyle’s English bulldog Watson would rather take a nap or snack on biscuits than investigate a crime. But when he picks up the scent of a clue, nothing can stop him—or his drool! Avery Phillips Avery Phillips is the chief of an international spy organization known as A.C.R.O.N.Y.M.—The Agency for the Capture and Research of Nefarious Masterminds. He knows the ‘Y’ doesn’t stand for anything, but he doesn’t care. The only thing he cares about is rescuing his top spy from the clutches of a super-criminal known as the Viper.
cc/2020-05/en_middle_0016.json.gz/line4676
__label__wiki
0.611117
0.611117
Kaylie Hogue Tyler Hadley Coach Jerry Kill Impact & Assistance Grieving Resources How to help those who grief? Kaylie Marie Hogue is the daughter of Deb and Scott Hadley of Sleepy Eye and Jeff and Shelly Hogue of New Ulm, MN. Kaylie is a 2006 graduate of Sleepy Eye High School and a 2010 graduate of Minnesota State University in Mankato. She was currently an English teacher at Martin County West High School in Sherburn, MN, Student Council Advisor, speech coach, and theatre director. Kaylie loved teaching at Martin County West and truly made an impact on the lives of her students and co-workers. She was engaged to be married to Kurt Muhl with a wedding date set of January 25th, 2014. Kaylie was at an all time high in her life both personally and professionally. In 2010, shortly after graduating from MSU, Kaylie encountered her first grand mal seizure and shortly after she was diagnosed with epilepsy. Her epilepsy seemed to be controlled by medication and her family had no worries that this disease could or would take her life. On June 5th, 2013, her family faced their worst nightmare as Kaylie died suddenly of an epileptic seizure at her apartment that resulted in cardiac arrest. Sudden Unexpected Death by Epilepsy (SUDEP), was the cause of the death. This is when a perfectly normal healthy human being, who has epilepsy, dies for no apparent reason. Our families are committed to raising awareness about epilepsy and raising funds to fight the disease that took our daughter. Please help us win the fight! KT Humble Hearts Foundation Sleepy Eye, MN 56085 kthumblehearts@gmail.com About KT Humble Hearts Foundation All Proceeds go the KT Humble Hearts Foundation to fund the following: Scholarships for Sleepy Eye Public, Martin County West, and Sleepy Eye St. Mary’s High Schools, Epilepsy Foundation of Minnesota, grieving families, families with hardships, community cohesion events. © 2020 | KT Humble Hearts Foundation | - WordPress Theme by Kadence Themes
cc/2020-05/en_middle_0016.json.gz/line4680
__label__wiki
0.569976
0.569976
Watch Bastards web-series Film cinema Home / About / Universe / Season 1 / Actors / Affiliate / Photo season 1 Photo season 1 Film cinema And the story began,....a village Upper Karbusch,...in this village, two strangers wandered....The first one named Vitaly, and the second, Paul, as it turned out later they are businessmen and they had a broken car, ...they needed help, but...instead they met a strange man, who came out of the red gates of the village house. He persuaded the businessmen he will find help and a stay for the night,but first he offered them to have some fun...and led them to the abandoned catacombs.... something happened and they lost their way ...in these endless labyrinths - Watch Bastards web-series Film cinema. Today Karbush village is 100 years old, the history of the village is the war ... but I will not tell you how the war was going on this earth ... I will tell you what I was wondering … Watch Bastards web-series - season 1 Film cinema season 1 - episode 6 (fin season 1) © Watch Bastards web-series Film cinema
cc/2020-05/en_middle_0016.json.gz/line4685
__label__cc
0.534036
0.465964
Source: https://www.writers-online.co.uk/news/creative-writing-competition-the-2016-raymond-carver-short-story/ This morning the voice is there immediately. I can’t turn it off. It’s the best thing I’ve heard all week. What voice? That writerly one—sometimes narrating the present, sometimes testing out sentences for a character, sometimes threading syllables and images in the hopes of cohesion. Mostly though, it’s a rhythm that persists in the foreground, as dear and essential to me as my own heartbeat. Yes, I said foreground. Not background. That’s important. Because my writing voice is always available to me in the background. It’s never completely gone. But since having a child, the times that voice moves into the foreground are shorter, shallower, and—let’s face it—harder to come by. Ray Carver said it best when he got honest about the impact and influence of having children. “But my kids were in full cry then, like the race track crowd I can hear at this moment, and they were eating me alive…I was still off on the siding, unable to move in any direction. If there’d once been a fire, it’d gone out… Influences. John Gardner and Gordon Lish. They hold irredeemable notes. But my children are it. Theirs is the main influence. They were the prime movers and shapers of my life and my writing. As you can see, I’m still under their influence, though the days are relatively clear now, and the silences are right.” A silence can feel right even when it contains your own private sound. A voice in the foreground. A voice that *isn’t* panicing in the background. A voice like your own heartbeat. For the last 3 years I have pulled that voice into the foreground during my focused, intentional writing times. Blessedly, that voice also pounds into the foreground every time I go running or lift weights. Sometimes when I’m driving, too. But to wake up this morning with that insatiable tempo in the foreground? Well. Let’s just say it felt like a homecoming. Let’s just say the silence felt right, even with my child next to me in bed at 6:12am, pretending to be a baby pterodacytl hungry for pistachios. #authorlife #raymondcarver #mindfulparenting #imaginemore #amwriting
cc/2020-05/en_middle_0016.json.gz/line4687
__label__wiki
0.655668
0.655668
[Munk School of Global Affairs, University of Toronto] (1) Creation Date: August, 2011 (1) Creation Date: Dec., 2011 (1) Creation Date: December 1986 (1) Creation Date: December 3, 1985 (1) Creation Date: December 4, [1986] (1) Creation Date: Demcember 6, 1985 (1) Creation Date: Jan 12, 1986 (1) Creation Date: January 1, 2006 (1) Creation Date: July 2009 (1) Creation Date: July, 2010 (1) Creation Date: July, [198?] (1) Creation Date: Jun., 2010 (1) Creation Date: June 1982 (1) Creation Date: March 1, [198?] (1) Creation Date: March 1984 (1) Creation Date: May 10, 2000 (1) Creation Date: May 1982 (1) Creation Date: May 7, 1992 (1) Creation Date: May, 1986 (1) Creation Date: N/A (1) Creation Date: Nov. 13, 1986 (1) Creation Date: November 1999 (1) Creation Date: Oct., 2011 (1) Creation Date: October 8, 1986
cc/2020-05/en_middle_0016.json.gz/line4690
__label__cc
0.737606
0.262394
Ken’s Prints Ken’s Products Learn from Ken Home / Prints / Country Living / Burra Homestead, SA Burra Homestead, SA This Limited Edition is now only available as a Hall of Fame resale print. Hall of Fame Editions may be available for this Image. That is, when other owners have listed their print for resale. Click on the available edition numbers below to see the available prints and pricing. SA611-1 From $21000SA611-10 From $15250SA611-50 From $10250SA611-4 From $14150SA611-13 From $1500250 This Limited Edition has sold out, and it now belongs to our Hall of Fame. This means if you own one of these prints, you can list it for resale. If you are interested in listing your print, SUBMIT FOR RESALE HERE If you would like some help or have any questions about this process, please click here for our frequently asked questions. Catalogue No: SA611 Edition: 50 only Image Ratio: 2.5:1 Marooned in a freshly furrowed paddock, an old cottage lies abandoned at the foothills of the Mount Lofty ranges. The old homestead is a testimony to the forgotten dreams of a family whose farm was taken over when the harsh realities of changing weather patterns made small farms unprofitable. Life on the land certainly can be tough. Product Code: SA611 Categories: Country Living, Prints About Your Print Your Ken Duncan Print will be created using the finest archival materials and processes to ensure the integrity of your artwork for years to come. It will be printed on Hahnemuhle 100% Cotton Rag using Epson Ultrachrome inks for maximum stability. Your print will be sprayed 3 times with Hahnemuhle UV matt varnish to maintain the surface integrity and protect against fading, then finished with lightweight, museum grade acrylic. Framed artworks can be delivered right to your door, anywhere in Australia (fully insured along the way), ready for you to hang and enjoy. If your print is being delivered overseas, we will send it unframed, with detailed instructions for your framer. There is a border around the image for ease of handling, but you should handle the print with great care to avoid scuffing, kinking or other damage. If you are thinking of giving a framed Ken Duncan Artwork as a gift, please keep in mind that we can add an individual touch by personalising the print with your special message, or your Company logo. The selected size is for the print itself. To see the final external dimensions including the frame, see this chart. For more detailed information, see our FAQ page. You need to allow up to six weeks for production of your Limited Edition Print, because each one is custom made after we receive your order. We can process some orders more quickly, and we will get yours to you just as soon as we can. When you order Online, one of our consultants will contact you to advise the estimated delivery date. Ken Duncan Group PO Box 3015 Wamberal NSW 2260 Australia Gallery: +612 4367 6701 Head Office: +612 4367 6777 Email: info@kenduncan.com Every effort has been made on this Gallery site to accurately represent the vibrant colours of Ken’s images. However, due to differences in computer screens and certain other variations, the images here should only to be taken as a guide. Obviously, the colour and sharpness of a finished Ken Duncan Limited Edition Print are far superior to what can be presented on a small screen. Ken Duncan is well known as the pioneer of Limited Edition Photographic Art in Australia. After a visit to New York in the early 1980’s, Ken returned home with a dream to have photography widely accepted as an art form in this country. Read More.. © 2020 Website Copyright Divine Guidance Pty Ltd. © All content and photos protected by International Copyright Law and cannot be used without prior written permission.
cc/2020-05/en_middle_0016.json.gz/line4694
__label__cc
0.728643
0.271357
Language Spanish Japanese All West Terre Haute Top West Terre Haute Sex Crime Lawyers - Indiana Nearby Cities: Terre Haute, Clinton, Brazil, Rockville, Jasonville Related Practice Areas: Domestic Violence, Criminal Defense, Sexual Abuse Patel Defense Sex Crime Lawyers Serving West Terre Haute, IN (Indianapolis, IN) If you have been convicted of a sex crime I will fight to protect you. Call today for a FREE consultation. You're more than likely visiting this page because you, a family member, or friend has been charged with a criminal offense. There's a lot of worry, stress, and ultimately the fear of freedom being lost lingering down the spine of the one charged as well as his or her family and friends. Fortunately, you've landed on the page of Indianapolis Criminal Defense Attorney, Monish Patel. Mr. Patel... Kammen & Moudy We will aggressively defend your rights against all sex crime charges. Call today for a FREE consultation. At Kammen & Moudy, providing superior service in criminal defense cases is what our lawyers always strive for. We believe in representing the best interests of our clients and we take the right steps to ensure the protection of their constitutional rights, whether we're handling: Drug offenses White collar crimes Sex offenses Violent crimes Drunk driving offenses We understand your fears and... Foley Peden & Wisco, P.A. Sex Crime Lawyers Serving West Terre Haute, IN (Martinsville) Attorney Charles H. Foley founded our Martinsville law firm, Foley, Foley & Peden, P.A., in 1930. Today, more than 85 years later, our firm is one of Morgan County's most trusted firms, bringing clients from throughout central and southern Indiana to seek our assistance as they face complex legal challenges related to the following: Bankruptcy Criminal defense Family law Estate planning... Roy Graham Law Sex Crime Lawyers Serving West Terre Haute, IN (Bloomington) Have you been arrested in the Bloomington, Indiana, area? Then you need to speak to attorney Roy Graham. With a successful track record of more than 20 years, Roy Graham defends individuals charged with just about every felony and misdemeanor charge: Misdemeanors cases include drunk driving, check deception, minor alcohol consumption, domestic violence, criminal trespass, probation violations,... Sam Shapiro Law Office Samuel Shapiro is the attorney behind our highly respected Bloomington law firm, Sam Shapiro Law Office. Sam offers representation to accused individuals in Monroe County and the surrounding areas in Southern Indiana during criminal proceedings involving the following charges: Drunk driving Drug offenses Weapons charge Property crimes Violent crimes In addition to his... Hostetter & Associates Sex Crime Lawyers Serving West Terre Haute, IN (Brownsburg) Stacy Uliana, Attorney At Law Sex Crime Lawyers Serving West Terre Haute, IN (Bargersville) Attorney Stacy Uliana founded her Bargersville, Indiana, law office with the goal of protecting the constitutional rights of those accused of crimes in the Indianapolis area. Because she focuses her practice solely on criminal defense, she is able to stay up-to-date on the newest legislation affecting her clients. By tirelessly preparing each case, she has successfully carried out numerous appeals... Maryan Law, LLC Criminal allegations may threaten people's freedom as well as their reputations. Maryan Law, LLC, provides dedicated criminal defense to clients in Bargersville, Indiana, and throughout Marion County. Looking out for the clients' rights and best interests, attorney Maryan works tirelessly on their behalf to achieve the best possible outcomes to their cases. For the convenience of clients, credit... G. Allen Lidy, Attorney-at-Law Sex Crime Lawyers Serving West Terre Haute, IN (Greenwood) The office of G. Allen Lidy, Attorney-at-Law is a criminal law firm serving clients in Mooresville, Indiana, and surrounding areas. As a criminal lawyer with 10 years of experience fighting for my clients, I will defend your rights and protect your future and freedom. I also practice family law, and will fight just as passionately for you and your family in court. If you have been charged with any... The Law Office of Melissa Winkler-York, LLC Sex Crime Lawyers Serving West Terre Haute, IN (Indianapolis) At The Law Office of Melissa Winkler-York, LLC, we assist clients in Indianapolis, Indiana, with matters concerning divorce, legal separation, visitation, paternity, guardianship, child custody and child support. Founding attorney Melissa Winkler-York started the practice in 2009 with a passion for representing clients who are going through hard times. Our legal team understands that separating a... Robert Schembs Schembs Law is a family law and criminal defense law firm based in Indianapolis, Indiana. With decades of experience behind us, including extensive courtroom experience in judge and jury trials, our firm is well-positioned to resolve your family or criminal law concerns with attentiveness and respect. While some family attorneys believe that the louder voice prevails in divorce and other... Gemma & Karimi LLP. At Gemma Law Firm, we view ourselves as partners with our clients when their backs are against the wall. From our Indianapolis, location in Indiana, we defend people against criminal charges that include the following: Drunk driving Misdemeanors and felonies Drug crimes Our attorneys have a history of reinstating driver's licenses and expunging records. The practice areas at our law firm also... Cane Legal, LLC At Cane Legal, LLC, I represent the people of Indianapolis, Indiana, with a compassionate, knowledgeable, client-focused approach. My law office is committed to providing exceptional results and professional experience as we represent clients in matters of criminal defense, including drug charges, DUI defense, sex offenses, traffic tickets, expungements and specialized driving privileges; family... Hackman Hulett, LLP Hackman Hulett, LLP offers comprehensive business and non-profit services. We are equipped to assist you with formation or dissolution of your business, contract drafting and review, non-compete agreements, and protection for your trade secrets. When working with our business clients, we often find that they either do not have an estate plan in place, or that the estate plan that they do have is... Sallee Law, LLC For the past nine years, Sallee Law, LLC, has been fighting for the rights of individuals charged with crimes or in need of a family law attorney in Indianapolis and throughout Indiana. We have the skill and tenacity to pursue the very best outcome in each situation. Mr. Sallee's prior experience as a deputy prosecutor gives him added insight into how to craft a strong defense strategy. He is well... Harwell Legal Counsel LCC Here at Harwell Legal Counsel in Indianapolis, Indiana, we provide unmatched representation and support to clients throughout the greater Indianapolis metro region and surrounding areas who have legal needs involving any of the following: Criminal defense for DUI, theft and robbery, along with other felonies and misdemeanors, including traffic violations Post-conviction relief, expungements and... Levin Law, LLC At the law office of Levin Law, LLC, I am proud to represent clients all across Indiana when they face criminal charges that could seriously affect their future. As a former deputy prosecutor in Indianapolis and deputy district attorney in rural Colorado, I have extensive knowledge of both sides of the courtroom and come prepared to protect the rights of any client. From speeding tickets to... Moore & Associates PC In the crowded courtroom your name is called. You stand before the bench, the accused. An intimidating Judge and jury wait impatiently for explanations. The Prosecutor and police demand you answer their allegations. Are you standing alone? Don’t! Let me stand with you. Together we will fight to protect your rights, to make your voice heard and to... The Law Office of Jesse K. Sanchez In investigations, arrests and criminal charges, The Law Office of Jesse K. Sanchez is the trusted source of defense for people in and around Indianapolis, Indiana. Our attorney, Mr. Sanchez, has more than a decade of experience. He advises and represents clients who have been accused of the following: Drug charges and DUI Sex crimes and weapons charges Traffic violations Domestic violence... Hayes Law Office At Hayes Law Office, criminal law is all we do. Our Indianapolis, Indiana, office has a commitment to justice and a focus on success for all of our clients. We recognize the importance of being proactive in criminal defense, which includes anticipating issues, preventing complications and protecting our clients’ rights from the very beginning of representation to completion. A Wide Array Of... Patel Defense, LLC Charged with a Sex Crime? You've come to the right place. If you're facing sex crime charges or other charges that would force you to register as a sex offender and have questions about the sex offender registry -- you should speak with a sex crimes lawyer today. A charged sexual offender faces unique problems, and a qualified sex crimes lawyer can help. Use FindLaw to hire a local sex crimes attorney to help you defend yourself. Need an attorney in West Terre Haute, Indiana? Use the contact form on the profiles to connect with a West Terre Haute, Indiana attorney for legal advice.
cc/2020-05/en_middle_0016.json.gz/line4700
__label__cc
0.706536
0.293464
Home Indiana Marion County Indianapolis Mark Cannon Mark Cannon Estate Planning, Probate, Elder Law... Mark focuses his law practice in the areas of estate planning, probate and trust administration, business formation and succession planning, business transactions, contracts and real estate law. Before beginning his legal career, Mark worked at Northwestern Mutual Life, where he implemented life and disability insurance plans for clients. After leaving Northwestern Mutual, Mark attended law school, where he earned Dean’s List recognition five times. Mark started his legal career at the Indiana Department of Revenue as an Inheritance Tax Attorney, where he audited inheritance tax returns and fielded telephone calls from attorney, CPA’s and trust officers on complex inheritance tax matters. Mark then joined a local public accounting firm where he recommended estate, gift, and income tax planning strategies for high net worth clients. Mark has been in private practice since leaving the tax accounting field in 1999. Mark has been a speaker at numerous seminars, including “Advanced Estate Planning Techniques in Indiana”; “Key Issues in Estate Planning & Probate in Indiana”; “Probate Process from Start to Finish”; "Top 10 Practice Tips for Young Lawyers & General Practitioners -- Estate Planning and Administration" and "Advanced Issues in Probate for the Paralegal in Indiana.” Mark is also active in the community. Since he is a cancer survivor, Mark is passionate about supporting the fight against cancer. Mark is a volunteer with the American Cancer Society. In 2013, Mark was awarded the American Cancer Society IN/MI Heart award for dedicated service to advocacy and the fight against cancer. Mark also served on the Board of Directors for the Indianapolis Ambassadors, a local charitable supporting organization. Mark started the Estate Planning Ministry and led a men’s bible study group at Northview Church in Carmel, Indiana. Mark currently attends Traders Point Church and lives in Brownsburg with his wife, Kirsten, their three children and J.D. (1994) | Tax, Estates & Trusts, Business/Corporate Law Honors: Dean's List Activities: ABA Regional Negotiation Competition Indiana University - Indiana University-Bloomington B.S. (1986) | Business Analysis Activities: Acacia Social Fraternity, Phi Alpha Delta Pre-law Fraternity, Intramural soccer and wrestling O'Koon Hintermeister Estate Tax Specialist RJ Pile & Company LLC Inheritance Tax Attorney Indiana Department of Revenue Estate Planning for Singles Up2Date How to Avoid Probate Like a Pro, Indianapolis, IN Top 10 Practice Tips for Young Lawyers & General Practitioners in Estate Planning & Administration, Indianapolis, IN Indiana Continuing Legal Class Key Issues in Estate Planning & Probate in Indiana, Indianapolis, IN Advanced Estate Planning Techniques in Indiana, Indianapolis, IN Heart Award Award given to volunteers who show a dedication for service in advocacy and the fight against cancer State Bar of Indiana # 17896-49 Indianapolis Bar Association Activities: Estate Planning and Administration and Business Law Sections Indiana State Bar Association Activities: Probate, Trust and Real Property Section, Elder Law and Business Law Sections FacebookJustia Profile Email Mark Cannon Katherine Moore Lebanon, IN Michael L. Schultz Randolph G. Holt Kent M. Frandsen
cc/2020-05/en_middle_0016.json.gz/line4701
__label__wiki
0.658165
0.658165
India Seeks More Women on Corporate Boards Mukesh Ambani (R), chairman of Reliance Industries Ltd, poses with his wife Nita (2nd R), mother Kokilaben (2nd L) and son Akash, before addressing the company's annual shareholders' meeting in Mumbai. India Seeks More Women on Corporate Board From VOA Learning English. This is the Economic Report. The goal appeared simple: require a woman to sit on the board of directors of all companies listed on India’s National Stock Exchange. But after one year, many companies are still trying to fill the positions. This has raised the issue of how well women are represented in top leadership jobs. Indian lawmakers passed the legislation last year. The rule is meant to ensure gender diversity and bring attention to the issue of women in corporate leadership. The rule required that women be named to all corporate boards by April 1. About 150 companies out of 1,475 listed on the stock market failed to name a woman to their boards by that date. And nearly half the companies that did meet the requirement appointed a female relative of a current board member. Among those companies was Reliance Industries. It named the Chairman’s wife, Nita Ambani, to the board. Pranava Haldea of the market research group, PRIME Database in New Delhi questions the effectiveness of the requirement. He says his organization thinks that the female relatives will share the same ideas and opinions as their family member on the board. He says that defeats the purpose of diversity. Many companies argued there was a shortage of skilled female workers able to fill the positions. Uday Chawla is head of a professional search company, Transearch India. It helped some companies look for candidates. He says the difficulty was to find women who had already served on boards. He said more professional companies want women on the board who can add value to the board instead of just meet a requirement. He says these companies demand competency and experience. Mr. Chawla said there are very few women who have the experience. Others said companies simply did not take the legislation seriously and failed to look carefully. Yet, the inability of corporate India to find women to sit on boards has brought attention to the low level of women’s participation in top management positions. Catalyst is a non-profit organization that works to build inclusive workplaces. The group released a study that said almost 50 percent of women in corporate India leave such work between the lowest and middle professional level. In the rest of Asia, 29 percent of women do. Shachi Irde is the director of Catalyst India, WRC. She says one of the reasons women leave is that women in India are mainly responsible for family care. She says companies need to put in place policies to keep more women on the job. “If you really look and ensure that the women are recognized, treated fairly, then there is a lot more of women that you can see in your organization rather than them dropping off. The challenge definitely comes when organizations don’t have inclusive policies and she is pulled between both her home responsibilities and her office responsibilities.” Ms. Irde says more women could be placed on boards if companies do not only consider women with experience as board members. Pranav Haldea says Indian companies need to recognize that more women in the workplace and in top management add value to a company. He says he does not believe more laws are the answer. He said it is more of an effort to change beliefs in the corporate world. Corporate boards in India have among the lowest percentages of women members. Women are represented most on corporate boards in Norway, Finland and France which have government requirements for female membership. And that's the Economic Report from VOA Learning English. Anjana Pasricha reported this story from New Delhi. Mario Ritter wrote it for VOA Learning English. Caty Weaver was the editor. gender diversity – n. the state of including both men and women corporate ­– adj. involving or associated with a corporation (a business or company) competency – n. ability or skill participation – n. to be involved with others in doing something : to take part in an activity or event with others management – n. the people who make decisions about a business, department, sports team, etc. Do you believe women are well represented in businesses in your country? Let us know in the comments section below. Will the US Pay Workers for Family Leave? Why Do So Few US Women Hold Top Jobs?
cc/2020-05/en_middle_0016.json.gz/line4704
__label__wiki
0.648991
0.648991
Calculating Volume and Area Learn everything you want about Calculating Volume and Area with the wikiHow Calculating Volume and Area Category. Learn about topics such as How to Find the Area of a Quadrilateral, How to Calculate the Area of a Circle, How to Calculate the Area of a Triangle, and more with our helpful step-by-step instructions with photos and videos. Articles about Calculating Volume and Area Find the Area of a Quadrilateral Calculate the Area of a Circle Calculate the Area of a Triangle Calculate the Area of a Polygon Find the Area of a Regular Pentagon Find the Area of an Isosceles Triangle Calculate the Area of a Hexagon Calculate the Area of a Rhombus Calculate the Area of an Ellipse Find the Area of a Semicircle Calculate the Area of a Trapezoid Find the Area of Regular Polygons Find the Area of a Square Using the Length of its Diagonal Determine Square Inches Find the Circumference and Area of a Circle Calculate the Case Cube of a Box Calculate Area of an Object Calculate the Area of a Sector Find the Area of a Square Calculate the Area of a Rectangle Find the Area of a Kite Find the Circumference of a Circle Using Its Area Find the Volume of a Cube from Its Surface Area Calculate the Center of Gravity of a Triangle Find Surface Area of a Triangular Prism Find the Area of a Rectangle Using the Diagonal Find the Area of a Circle Using Its Circumference Calculate the Area of a Parallelogram Find Area Find the Area and Perimeter of a Rectangle Determine a Triangle and Circle of Equal Area Determine Equal Cube and Sphere Surfaces Find the Perimeter of a Pentagon
cc/2020-05/en_middle_0016.json.gz/line4707
__label__cc
0.63463
0.36537
What To Do If Your Boss Brainstorms for All the Wrong Reasons One of the kinds of leaders who can drive employees crazy is the “Brainstormy” Boss, who creates a work environment that’s as changeable as the weather. It’s Raining Ideas! When brainstorming is used appropriately — as a technique for generating ideas — it can trigger incredible creativity as well as a feeling of joyful participation and a sense of tighter team affiliation. Brainstorming for new ideas can be fun and enlivening, opening people up and helping them make new connections between concepts, initiatives, and themselves and their colleagues. Most people like working together in a freewheeling, unguarded way to come up with new concepts and approaches. But although brainstorming can be very effective for initial ideation, it is not suitable for planning, analysis, or decision-making. Beware Brainstorming for Consensus-Building In some organizations, executives use a version of brainstorming as a kind of review process — a way to generate support for an idea or project or take the temperature of the group and see who’s on board and who’s not. This kind of brainstorming frequently begins with, “Let’s go around the room and see what everyone thinks.” And there’s often a subtext: Managers who use the “all voices on deck” approach may actually be reluctant to lead a structured planning process or to make decisions without the group’s full support. They use this pseudo brainstorming as a way to build consensus, as if the organization or the team itself is a pure democracy. Caution! Stormy Conditions Ahead When everyone is directed to weigh in, it can appear that everyone has a say. But the lack of structure may enable one or two opinionated or favored participants to commandeer the entire group, and more often than not, the reality is that some opinions count more than others. This can be demoralizing for the people who realize that their votes don’t really count. Others may suppress their true opinions if they fear office politics, don’t fully understand the situation, or feel that their positions or experience levels don’t qualify them to “vote.” They may withhold their input until they can figure out which opinions are socially acceptable, or even act out by behaving contrarily or hiding data. Managers who use “brainstorming” indiscriminately are particularly frustrating to those employees who have special training or expertise or who feel strongly about merit, preparedness, or thoroughness. When it’s obvious that group leaders are asking for everyone’s buy-in only for the security of knowing that everyone agrees with them, brainstorming becomes a charade. All Opinions Are Not Created Equal Many employers stress that all jobs have equivalent moral or ethical value. Certainly that’s true, particularly if the people in the jobs show their best efforts and behave in principled ways. But not all jobs — or all opinions — have equivalent business or market value. A better approach is to limit egalitarian “circle time” to searching for new ideas. Once ideas are being reviewed and developed, though, it can be helpful to specify that only people with relevant expertise should comment about or expand on the concept under discussion, and that the rest of the group should be responsible for describing the impact on their areas of the business. How to Handle a Brainstormy Boss If your manager is inclined to create a “brainstormy” weather system, try asking them privately, before the meeting, what kind of input they’re seeking. Specifically, find out whether they want to build support for their ideas or to use the group as a devil’s advocate to trouble-shoot any weak parts of the ideas in question. Then you can assess how best to contribute to the discussion, or whether you want to suggest an alternative forum. Onward and upward — How to Get a New Employee Off on the Right Foot What Should You Do When You Know a Project Is Bad? 4 Things Your Leaders Should Know by Now 5 Ways Non-Intervention Ruins Teams (and How to Intervene Yourself) How to Emphasize Praise for Feedback Success behavior, brainstorming, communication, feedback, group dynamics, leadership, management, organization, workplace 10:02 AM . April 30, 2013 « This is What to Do When Your Boss is Unrealistic When Appearances Can Really Make a Difference »
cc/2020-05/en_middle_0016.json.gz/line4713
__label__cc
0.507111
0.492889
Tomlin’s Touchdown: Leadership as Standard Business Since the Super Bowl I’ve been thinking a lot about Coach Mike Tomlin. Football is not my sport (people knocking each other down on purpose?!?), so I’ve never been that interested in the Super Bowl, especially when there’s no New York team in contention. Super Bowl Sunday has always seemed like nothing but an excuse for lots of snacks and beer, sort of the way Valentine’s Day is an excuse for flowers and chocolates (not that these are bad things, of course). But this year, beyond the fun of cackling at the ads, I actually got something out of watching the game: an introduction to Coach Mike Tomlin of the Pittsburgh Steelers. Oh, I admire this man! He’s cool and thoughtful under pressure. Consistently encouraging to his team. Expressive yet circumspect. And that was just during the game! The score could have gone either way, and it didn’t go his. Other guys in his spot have blamed the conditions, criticized their team, or complained about the officials’ calls (certainly there was room for that in this game). But a couple of Coach Tomlin’s post-game comments (the italics are mine) showed real leadership in the face of loss: When asked about his quarterbacks’ insufficient performance against the Green Bay Packers: “It was a losing one — just like mine.” Leaders protect their people from unnecessary potshots and take responsibility for the group outcome. Tomlin’s message: Don’t single out one of my stars if he wasn’t starry enough. I’m the guy in charge and his success or failure is mine — not his alone. When asked if there were problems with the artificial turf: “They played on the same turf that we played on. We’re not in the business of making excuses. We won’t do it. Next question.” Leaders face reality instead of looking for scapegoats. But here’s the Coach Tomlin quote that really did it for me. In one of those standard, stupid, looking-for-the-emotion, post-loss interviews, one interviewer tried to present the moment outside the Steelers’ locker room as the players returned, theoretically licking their wounds, as being touching. The reporter referred to Coach Tomlin’s having acknowledged every Steeler individually and thanked each of them for their work during the season. Of course I was impressed by the coach’s gesture to his team. It’s so important to show respect for each person’s effort, to make that personal connection about commitment and gratitude — which is the real demonstration of leadership — even if things hadn’t turned out as hoped or planned. But Coach Tomlin’s response to the reporter raised his score even higher. He seemed completely uninterested in this back-handed effort to praise him, and responded, shaking his head, “That’s standard business. We do that after every game.” That’s when I cheered! What a demonstration of leadership — a norm of personal recognition, not just for big plays, but for showing up and doing what you’re supposed to do and giving what you’re supposed to give. If only Coach Tomlin’s attitude and stance could become as popular as the NFL image and the team jerseys, or the tradition of making snarky comments about the Super Bowl ads and halftime show. Forget the chili and the Buffalo wings — this guy is hot stuff! Go, Coach! How To Manage Yourself When Your Work Goes Really Wrong This Is How to Help Employees Commit to Change Initiatives When HR and Business Leaders Disagree When You Have to Generate Your Own Advice Managing an Employee Who Wants to Impress You All the Time behavior, leadership Leadership / Self-Mastery 11:31 AM . February 15, 2011 « A Thirst to Engage Are You a Supertaster? Taste is Temperamental » One thought on “Tomlin’s Touchdown: Leadership as Standard Business” Mark Kolier says: Terrific metaphors Liz and all so very true. The Steelers beat my beloved Jets and I was (and am still) bitterly disappointed. But Mike Tomlin exhibits such class and leadership I have only the highest admiration the way he conducts himself and leads his team. Two Super Bowl appearances for his team in his first three years are evidence of his worth. I hope the Rooney family appreciates the kind of leader they have. We can all take a lesson from Mr. Tomlin.
cc/2020-05/en_middle_0016.json.gz/line4714
__label__wiki
0.788536
0.788536
Library Of CongressPublic Domain ArchivePart of PICRYL.com. Not developed or endorsed by the Library of Congress photo_albumStories star_rateUpgrade Mediachevron_right From Maine to Oregon. March file_downloadDownload save_altThumbnail200x200 save_altSmall506x640 save_altMedium810x1024 save_altLarge1265x1600 save_altOriginal2088x2640 crop_originalOrder Print label_outline Sousa, John Philip -- 1854-1932 (composer) Liebling, Leonard http://www.loc.gov/ Explore: oregon A general instructer; or, The office, duty, and authority of justices of the peace, sheriffs, coroners, constables, jailors, and jurymen, with precedents, suited to every case that can that can possibly arise, in the discharge of the duties in either of those offices. The whole alphabetically digested. To which is added a guide, to Superior, and County court clerks; an epitome of Blackstone's Commentaries; law maxims; remedies by action, and law fictions Astoria; or, Anecdotes of an enterprise beyond the Rocky Mountains, [Small Town Folkways] Historic Columbia River Highway, Troutdale, Multnomah County, OR A start in life. A journey across America. Fruit farming in California. Oregon's rocky Pacific coast Grant County, Oregon. Malheur National Forest. Unloading logs from trucks Franchère's Narrative of a voyage to the northwest coast, 1811-1814 Live boys in Oregon: or, An Oregon boyhood, Explore: maine Congress Square, Portland, Me Spring pulpwood drive on the Brown Company timber holdings in Maine. Woodsmen with pikes feeding logs into the sluiceway of the upper dam at foot of Mooselookmeguntic Lake Over-the-Horizon Backscatter Radar Network, Moscow Radar Site Transmit Sector Three Transmitter Building, At the end of Steam Road, Moscow, Somerset County, ME Fort Gorges, Hog Island Ledge, Portland Harbor, Portland, Cumberland County, ME Colby's atlas of the state of Maine : including statistics and descriptions of its history, educational system, geology, rail roads, natural resources, summer resorts and manufacturing interests / Governor John Hubbard House, 52 Winthrop Street, Hallowell, Kennebec County, ME James P. White House, 1 Church Street, Belfast, Waldo County, ME Eastern promenade, Portland, Me. Explore: orchestral music The Directorate. March The Bride-Elect: Lancers Glory of the Yankee Navy King Cotton Mother Hubbard March U.S. Field Artillery The objects in this archive are from Library of Congress - the nation’s first established cultural institution and the largest library in the world, with millions of items including books, recordings, photographs, maps and manuscripts in its collections. The Library provides Congress, the federal government and the American people with a rich, diverse and enduring source of knowledge to inform, inspire and engage them and support their intellectual and creative endeavors. Disclaimer: A work of the Library of Congress is "a work prepared by an officer or employee" of the federal government "as part of that person's official duties." In general, under section 105 of the Copyright Act, such works are not entitled to domestic copyright protection under U.S. law and are therefore in the public domain. This website is developed as a part of the world's largest public domain archive, PICRYL.com, and not developed or endorsed by the Library of Congress, https://www.picryl.com cartoons commentary Developed by GetArchive, 2015-2019 shareShare/Copy URL codeEmbed Code
cc/2020-05/en_middle_0016.json.gz/line4715
__label__cc
0.585228
0.414772
Don’t settle for less than maximum case value The oil and petrochemical refinery industry is one of the most dangerous occupations to work in, with catastrophic accidents, injuries, and deaths every year. Despite recent newsworthy deadly refinery explosions, these workplace accidents continue to cause severe injuries and death. If you have recently been injured in an accident at a plant or an industrial facility, you and your family are likely hurting. Chemical and refinery explosions have many causes and are an all too common occurrence across the country. The negligence of plant owners, violations of OSHA safety regulations, and the failure to provide appropriate safety training or equipment is putting workers at risk. Working In Plants Can Be Dangerous. The legal team of Liggett Law Group has years of experience successfully handling occupational injury and wrongful death claims. Plant Explosions Q+A What Should I Do If I’m Involved In A Plant Explosion? Victims of plant explosions should immediately seek medical attention. Injuries associated with plant explosions can be severe, so victims cannot afford to lose time before seeing a medical professional. Victims will also need to immediately contact a plant explosion lawyer. Employer and other parties often pressure victims to waive their rights after an accident, but victims don’t have to. By contacting an attorney, you can be sure someone is protecting your best interests. Why Do Plant Explosions Happen? Plants and refineries deal very volatile chemicals and tremendous amounts of pressure. This greatly increases the likelihood of an accident. However, this does not mean plant workers accept additional risks with job. Instead, this means that plant and refinery owners must do more to mitigate these risks. Unfortunately, this doesn’t always happen. Oftentimes refinery owners cut corners to save on their bottom line, but this only serves to put workers at risk. How Long Do I Have To File A Claim? In the state of Texas, workers have two years from the date of the accident to file a lawsuit. However, it is important to involve an attorney as quickly as possible after an accident. An attorney will be able to collect and preserve evidence that will help you establish liability and collect compensation. Refineries are subject to strict state and federal safety requirements designed to prevent explosions and accidents, including: Adequate staffing Maintenance of necessary warning signals and alarms to warn of danger. Providing for safe containment of flammable liquids Providing sufficient ventilation, Regularly inspections of tanks and containers holding dangerous liquids Restricting access to areas where hazardous operations are underway Requiring safety procedure training Response plans Repairing and maintaining equipment, including heavy machinery Get Help From A Personal Injury Lawyer In Lubbock If you or a loved one were injured in a chemical plant or refinery explosion, you need a knowledgeable lawyer on your side. The legal team at Liggett Law Group has years of experience successfully handling occupational injury and wrongful death claims. Contact the Lubbock plant explosions lawyers at Liggett Law Group online today or call our toll free number, (855) 955-HURT (4878), to schedule a free, confidential consultation with one of our experienced lawyers. "My son was involved in two separate accidents and Liggett Law Group resolved both with no problems. They were first concerned that he received the proper medical attention and then insured all financial concerns were addressed. They were polite, professional and a great group to work with. Thank you Liggett Law Group." Joan Baker
cc/2020-05/en_middle_0016.json.gz/line4719
__label__wiki
0.563085
0.563085
The Miracle of Headingley Part II Today was another “Cricket, am I right?” or “Cricket, blood hell” day. We have been gifted a lot of these this summer. But what happened at Headingley this weekend is easily the most remarkable thing that’s happened on a cricket field in a very, very long time. At least since I started paying attention to the sport in 2007. If you are reading this, then I don’t need to tell you what happened. But just in case, here’s the moment as it happened from the Cricinfo ball-by-ball commentator: Cummins to Stokes, FOUR runs, there it is! Flayed through the covers, Stokes has completed the Miracle of Headingley Part II! Holy hand grenades, Stokes is a monster! He throws his arms wide and roars! England win by one wicket and the series is level in the most heart-stopping fashion imaginable! And, also, if you reading this, then go read some of the better recaps on the day. I don’t have the words to describe what Ben Stokes did out there. Above I said it’s the most remarkable thing to happen on a cricket field in a long time, but honestly maybe the best thing to happen in all of sport in a very long time. Just off the top of my head: there was Lebron winning the NBA championship with Cleveland. That’s really the only one that really sticks out in recent years. And I am not even a basketball fan. I think Stokes’ performance honestly can be called one of the greatest individual triumphs in all of sport’s history. That sounds hyperbolic, but I believe it just might be true. There will be hundreds of articles about Stokes in the coming days. Some of them will read like poetry, or love letters. And, down the road, there will probably be books written about the Headingley miracle too. It will definitely take up the bulk of the 2020 Wisden, probably even more than England’s World Cup win earlier this summer. Because Stokes’ performance was just that almost unbearably remarkable. It transcends almost that entire tournament. And the Ashes are most definitely back on the table, after most pundits thinking it was all but over on Friday afternoon. But in true cricket style, England’s all out for 66 feels like a million years ago now. The game swayed back in forth in heavy wind for all five days. And then somehow improbably ended with Stokes hitting a boundary in the long shadows of a late summer’s afternoon. 135 not out off of 219 balls. Batting all told for five and a half hours. Lost in all the (super justified) ink about to spilled on Ben Stokes is the performances of two men: Jack Leach and Jofra Archer. Stokes is the hero of the day, but you can’t win in cricket alone, no matter how great a day you’re having. You need someone at other end of the crease. Someone who can hold their nerve and get you the strike back. Jos Buttler only helped out with nine deliveries before he fell. Chris Woakes eight. Stuart Broad two. Archer — after his wonderful day with the ball earlier in the Test — saw 33. Hanging in there for over 45 minutes. Leach, though, went out into the middle of the field, in the simmering cauldron of the Ashes, knowing that his was the last wicket available. If he lost it, England wouldn’t just lose the match, they would probably lose the series, the Ashes. So he put up his defense and hung out against one of the best bowing attacks in the world for an hour. He only saw 17 balls and only scored one run. But defended his wicket and efficiently got Stokes back on strike whenever possible. It was of course nowhere near Stokes’ accomplishment, but for a bowler to go out there and keep steady and allow Stokes to win the game, to be the hero, was inspiring to watch. An hour, just 17 balls, which means he was on average only seeing a delivery once every five minutes. That’s a lot of waiting, a lot of running between wickets, and then all of a sudden Pat Cummins is bowling at you and your wicket is all that stands between Australia and the Ashes. I will never be a Ben Stokes. He is one of those rare genius athletes that is just better than all of us. But we can all be Jack Leach’s. Do our jobs, work hard, celebrate the genius of a teammate, help them lift up the whole world. He’s a hero too. And his glasses and his smile make him seem almost human, unlike Stokes, who looks and feels like a superhero. We all love humanity in our athletes. And Leach was human today. Vulnerable, but still getting up every day, and doing what he can to keep all the hope possible alive. An hour. 17 balls. One run. I hope he enjoyed his post-match beer. Previous PostPrevious Cricket for Americans: 22 Aug. 2019: The World Test Championship Next PostNext On Ben Stokes, Kusal Perara and Unconscious Bias
cc/2020-05/en_middle_0016.json.gz/line4720
__label__wiki
0.909434
0.909434
London Blogs London Theater Tickets London Books Londonism Fun London Life in London London Realities Great London Buildings Great Londoners Top 10 London The Website for People Who Love London You are here: Home / Columns / Laura's London / London Exhibition Report: A Look at the Blockbuster Queen Victoria 200th Anniversary Exhibition at Kensington Palace London Exhibition Report: A Look at the Blockbuster Queen Victoria 200th Anniversary Exhibition at Kensington Palace May 24, 2019 By Laura Porter 3 Comments 24 May 2019 is the 200th anniversary of Queen Victoria’s birth at Kensington Palace. To mark the bicentenary of this historic event there is a new visitor route, Victoria: A Royal Childhood, through the suite of rooms she would have known well. And over in the Palace’s Pigott Gallery, there is a new temporary exhibition, Victoria: Woman and Crown, that considers the private woman behind the public monarch and re-examines her later life and legacy. ‘Her Majesty The Queen, Empress of India’, P & D Colnaghi & Co, 1900, Engraving of a portrait of Queen Victoria (1837-1901) published on her 81st birthday, 24 May 1900. © Historic Royal Palaces Princess Alexandrina Victoria was born at Kensington Palace, the London home of her parents the Duke and Duchess of Kent. The only daughter of Edward, Duke of Kent (the fourth son of George III), her father’s early death in 1820 meant she was raised by her mother and governess Baroness Louise Lehzen. Her protective mother knew there was a chance Victoria might become Queen but I doubt anyone knew she would one day rule over the largest empire the world had ever known. Victoria: A Royal Childhood Offering a chance to uncover history right where it happened, visitors can see a new re-presentation of the suite of rooms Victoria and her mother occupied now reimagined in an evocative and family-friendly exploration of royal childhood. It charts how an indulged young princess blossomed into the independent and iconic monarch we remember today. The Duke and Duchess of Kent had been living happily by the seaside with their baby daughter. Out walking one day, the Duke got soaked and caught a chill. Within days he was dead and his stunned wife and daughter returned to Kensington Palace in 1820. There have been informed decisions about the decor of each room as a full inventory allowed detailed research. This first room has a sumptuous squishy carpet with a pattern from 1820-30 that has been digitally printed, as has the curtains. There is a large dollhouse of Kensington Palace that you can walk around. Look into the rooms to see tiny models introducing the characters in Victoria’s life story. John Conroy is the villain of the story. He had worked for Victoria’s father, and following the Duke’s death, he became secretary to the widowed Duchess of Kent. He saw his position as the Duchess’s closest advisor as a way of gaining influence in the royal household. By the time Victoria was a teenager, Conroy controlled every aspect of the household. To Victoria, he was ‘a monster and demon incarnate’. Baroness Louise Lehzen was not just Victoria’s governess but also her dearest friend. Lehzen was the daughter of a German village pastor. She first came to England in 1819 to care for Victoria’s older half-sister, Feodore. It was most likely Lehzen who encouraged Victoria’s strong personality, declaring that she could ‘pardon wickedness in a Queen, but not weakness’. Princess at Play Family visitors will enjoy the toys in this room that they can play with. At 5 years old, a happy and imaginative Victoria was placed in the care of Governess Louise Lehzen. She was strict but devoted to Victoria. She brought structure and discipline to Victoria’s life. They enjoyed making costumes for Victoria’s dolls together. Doll dressed as Victoria’s favourite dancer Marie Taglioni in ‘La Syphide’. Made by Governess Lehzen in 1832. Marie Taglioni was famous for being the first ballerina to dance en-pointe. The exhibits bring new light to the mother-daughter relationship here as while we have been led to believe her mother was domineering and that they didn’t get on it seems that wasn’t necessarily the case. As a child, Victoria was well loved by her mother. Unusually for upper class women, the Duchess breast-fed Victoria herself. The Duchess left affectionate notes under her daughter’s pillow and filled Victoria’s days with simple routines. On the surface, it seems a gentle and privileged start in life. It seems the problems came more when she was an adolescent. While Victoria’s mother was mourning, isolated from her family and burdened by debt, she turned to John Conroy, a handsome and ambitious army officer, for support. Educating Victoria This is the room where her schooling took place. Her mother appointed Reverend George Days to manage a demanding timetable of studies, Governess Lehzen took charge of taming unruly behaviour and Victoria’s uncle Leopold became a much-loved advisor. When George IV refused to increase the Duchess’s income for Victoria’s education Uncle Leopold picked up the bill. You can see Victoria’s exercise books for her school work and her behaviour book. This was something introduced by Lehzen who asked Victoria at the end of each day how she thought she had behaved. Victoria then had to write in the book her verdict on herself. Victoria’s handwriting exercise books, 1827. Amazing handwriting for an 8 year old, eh? Meanwhile, John Conroy implemented the ‘Kensington System’ – strict rules that governed Victoria’s life. While the ‘System’ was supposed to prepare her for when she would be Queen, there were three reasons for the rules. Protection and so she could later emerge were two but the third was to break her spirit. One of the rules was that she could never walk down the stairs unaccompanied in case she might fall which meant someone had to hold her hand every time she wanted to go down. She also had to share a bedroom with her mother so had very little independence. There are these small models throughout the rooms. A Royal Performance This very red room has a large animatronic puppet theatre and seats for visitors to watch the action. Victoria loved dancing, singing and music and enjoyed frequent trips to the theatre, ballet and opera. After each performance Victoria attended, she wrote detailed reviews of the singers and dancers in her diary, noting if someone had ‘danced beautifully!’ or ‘seemed tired’. And her sketchbooks are full of the scenes and characters that captured her imagination. Victoria’s teenage years brought conflict. The death of George IV and the coronation of the elderly King Willian IV in 1830 meant Victoria was now officially heir. She was sent on tours of England and Wales to firmly establish the Princess and her mother in the public eye. She caught typhoid fever in Kent when she was 16. Using this moment of weakness, Conroy who went too and, the Duchess, tried to seize power but Victoria and Lehzen stood firm against them. Victoria’s travelling bed is on display and it is a recent acquisition. Historic Royal Palaces saw it included in an auction advert in the Metro newspaper so they attended and had to bid to acquire it. 13 year old Victoria began writing a daily diary in 1832. It was read by the Duchess and Lehzen every day so was written with them in mind. She quickly learned self-censorship. There’s a chaise longue here that you can drape yourself over for a photo opportunity. Victoria was only 5ft 1in but the public was always told she was 1 inch taller as being so small could suggest the Duchess and Conroy were not feeding her properly. Victoria’s earliest surviving dress, worn when she was about 12. The Birthday Ball On 24 May 1836 Victoria turned 17 and her mother held a lavish ball. The question of who Victoria would marry had been hotly debated since she was 11 years old. Now a young woman, several potential husbands were invited to the ball. The King had a politically advantageous match in mind – a prince from the Netherlands. But Victoria’s German family had other plans. Her first cousin, Albert, was their preference. From the moment they met, Victoria and Albert made a lasting impression on each other. (When he later returned in 1839, they fell in love and wed in 1840. They were married for 21 years.) For her 17th birthday, there was a ball in this room although I will point out it’s not that big. But there are lovely candelabras with dancing couples on the top. http://londontopia.net/wp-content/uploads/2019/05/IMG_3677.mp4 This is the room where Victoria was born. It is her bed that is on display and possibly her cradle. (We know the cradle has been at the palace for 200 years.) Her mother and father rushed back from Germany so Victoria could be born in England. The Duke was anxious – childbirth being so dangerous – so remained by the Duchess’s side throughout. The room had been a dining room but it was decided it was the best room for the Duchess to give birth as the kitchens were directly underneath for supplies of hot water and officials could gather next door to witness the birth. On the day she was born, Victoria was fifth in line to the throne. Two doctors managed the birth, including, rather unusually, Germany’s first female gynaecologist Charlotte Heidenreich von Siebold, who had travelled to London with the Duchess. (Three months later, Siebold delivered another royal baby – Victoria’s cousin, and future husband, Albert.) Red Saloon This is where she made her first public appearance as Queen. Victoria’s Coronation Dalmatica is on display that she wore on 28 June 1838 for the ceremony at Westminster Abbey. As dawn broke on 20 June 1837, The Lord Chamberlain and Archbishop of Canterbury arrived at Kensington Palace to break the news that the King was dead. This meant Victoria was now Queen. Who would have known she would go on to be the first British monarch to celebrate a Diamond Jubilee and complete a 63 year reign? At 11.30am, 97 curious Privy Councillors gathered in this room to witness the signing of the Protestant oath and the start of a new reign. Victoria left out her first name, Alexandrina, in favour of the name she had used since childhood. This was the first document she signed as Queen Victoria. The Protestant Oath, 1837. Signed by Victoria to start her reign. As Victoria was now 18 she could rule alone, dashing her mother’s plan to be Regent. She relished her new independence and within 13 days, she left Kensington to finally have her own bedroom in Buckingham Palace. She dismissed Conroy, banished her mother to the opposite side of the palace and appointed Lehzen as her Lady Assistant. Lehzen loved Victoria like a mother but also feared her at times. She kept a memorial scrapbook with locks of Victoria’s hair as well as photos which is on display here for the first time. Lehzen was dismissed in 1842 after more than 20 years of devoted service as she was no match for Prince Albert in the Queen’s affection. After her dismissal, Lehzen returned to Germany where she created this scrapbook of mementos. Victoria: Woman and Crown This new temporary exhibition explores Queen Victoria’s private life behind her carefully-managed public image. It also re-examines how Victoria balanced her role as a wife and mother with that of Queen of an expanding empire. It starts with Queen Victoria’s pure white petticoat which represents the new hope she offered to the nation. Queen Victoria’s petticoat c.1840. © Historic Royal Palaces The information panels throughout the exhibition have interesting ‘peepholes’ and quotes from her diary. Victoria fell totally and utterly in love with Albert. He became, in her words, ‘an angel whose brightness shall illuminate my life’. This portrait of Queen Victoria by the German artist Franz Xaver Winterhalter was commissioned in 1843. She was 24 at the time and the painting was a gift to her husband who described it as his “favourite picture”. This was the dress Victoria wore to the Great Exhibition in 1851. It was chosen by Albert and was originally bright pink. Albert liked to design jewellery to give as gifts to Victoria. The four green oranges on this circlet represent their four eldest children. Victoria wore it every year on their wedding anniversary. Queen Victoria had mixed feelings about motherhood. She became pregnant within two months of marrying Albert and didn’t enjoy being pregnant. She felt her duty as a mother conflicted with her role as Queen. It’s possible this was Victoria’s washing apron, worn to protect her fine clothes from splashes when watching her children be washed and put to bed. Yet, while the media now likes to portray her as uncaring towards her nine children, her diaries and sketches show her devotion to them. Etching by Queen Victoria of her daughter the Princess Royal dressed in 18th century costume. 1843. Etching by Prince Albert of their daughter Victoria, Princess Royal, and Albert Edward, Prince of Wales. 1843. For Queen Victoria, 1861 was a year of grief and loss. In March, her mother died. Then in December, Albert died unexpectantly from suspected typhoid. She sank into a deep depression and refused to make official public appearances for many years afterwards. Queen Victoria’s day dress and jacket, 1899. Victoria had always sought approval from Albert on everything she wore in public. Without him by her side, she wore black for the rest of her life. She also insisted that all servants and family wore black armbands for eight years after Albert died. As she was the most famous women in the world at the dawn of the photographic age, her standard black outfits, though born out of sadness, were easy to recognise and did remain a constant in a rapidly changing world. She wore a widow’s cap every day for the rest of her life. She even had a crown especially made to fit around it. She certainly curated her own public image. It’s not only black clothes on display as a fashionable pair of silver boots recently acquired by Historic Royal Palaces provide a stark contrast to the exquisitely made, black satin gowns she was so famous for wearing. Pair of shoes by Gundry & Son’s, 1840s. Worn by Queen Victoria. © Historic Royal Palaces The exhibition includes an art installation room on the idea of death and loss in Victorian times. There are flowers (for the Instagram selfies) and there’s even a scent added to the room for your senses to be stimulated. While there seems to be an interesting story about this small room, there was nothing there to explain it so I’m not sure many visitors will fully understand. It took conservators some time to unknot the fringing on the Balmoral Tartan Shawl but it is now looking good and on display. Queen Victoria’s Balmoral Tartan Shawl. Prince Albert designed the tartan pattern in 1853. In the early years after Albert’s death, shawls became part of Victoria’s everyday wardrobe as she wished to wrap herself in grief. John Brown had been selected by Prince Albert to be Victoria’s personal servant in Scotland. He appeared to have been of considerable comfort to the grieving Queen after Albert’s death, and inevitably rumours of the nature of the relationship between the two began to surface. Queen Victoria at Osborne by Gilbert Sprague after Landseer This 1867 painting was supposed to show the nation she was working and that John Brown was her servant. But instead, it came across that she was likely having an affair with him and the papers on the floor suggested she was neglecting her duties. Grandmother of Europe Albert believed that he and Victoria could maintain peace across Europe by marrying their children into continental royal families. As a result, their children and grandchildren were scattered across 20 royal families. By the time of her Golden Jubilee in 1887, Victoria was the most senior royal in Europe. It was a hopeful plan but not successful. Three of Victoria’s grandchildren, Tsar Nicholas II of Russia, Kaiser Willhelm II of Germany and King George V of Great Britain fought against each other in the First World War. Willhelm II exclaimed, “To think that George and Nicky should have played me false! If my grandmother had been alive, she would never have allowed it.” Queen Victoria had nine children and forty-two grandchildren. In old age, she enjoyed having the family gathered around and she like to have these occasions photographed. Empires of India In 1876 Queen Victoria was crowned Empress of India. It was in effect a personal gift from Prime Minister Disraeli to his beloved Queen. She began to read and write Urdu in 1887 when she was almost 70 years old. She learned from her servant Abdul Karim who she called “Munshi” meaning “teacher”. By 1889 he was providing regular lessons on Hindustani and Indian religion and culture. And by 1894 he had been promoted to her private secretary. Queen Victoria’s Hindustani (Urdu) diaries The exhibition ends on a lighter note looking at her Diamond Jubilee. Victoria was Queen for 63 years, from the age of 18 until her death at 82 years old. By the time of Queen Victoria’s death in 1901, around 400 million people and 20% of the earth’s land mass made up the British Empire. Queen Victoria’s parasol (1880-90). The lace was made especially for the Queen. It incorporates flowers, crowns and the letter ‘V’ for Victoria. Both Victoria: Woman and Crown and Victoria: A Royal Childhood are open to visitors from 24 May 2019. Both are included in standard admission. Admission: Adult online tickets from £17.50 Opening Hours: Monday to Sunday: 10am to 6pm Kensington Palace is open all year round. Address: Kensington Palace, Kensington Gardens, London W8 4PX © Historic Royal Palaces Filed Under: Featured, History, Laura's London, London Long Reads, Museums, Special Exhibitions Tagged With: CHELSEA AND KENSINGTON Download Our Mobile App! Read Anglotopia on your Mobile Phone. A completely ad-free reading experience. Listen to our podcast in the app. Watch our videos in the app. All without ads! Available for iOS and Android. About Laura Porter Laura Porter writes AboutLondonLaura.com and contributes to many other publications while maintaining an impressive afternoon tea addiction. You can find Laura on Twitter as @AboutLondon and @AboutLondon Laura on Facebook. Grace Frazier says Ms Porter, Though not my favorite royal, Queen Victoria was made more relatable by this article. Thank you for this lovely look at not only the beautiful tribute to her in Kensington Palace, but also at her very complicated life. RUTH DALY says EXCELLENT AND VERY DETAILED REPORT ON QUEEN VICTORIA AND KENSINGTON PALACE. THOROUGHLY ENJOYED IT. Bibi Hashim says Wish I had seen this very informative article prior to my visit in June 2019. Thank you for this excellent piece. The London Quiz Support Londontopia by Buying the 2020 Calendar Anglotopia 2020 Calendar – Shipping October/November Get the Anglotopia/Londontopia App Sign-up for Free London Weekly Updates! Trip Planning: Top 10 Exhibitions To Plan Your 2018 Trips to London Around London Guide: Our Favorite Restaurants in London – London Restaurant Recommendations for Americans – What’s Your Favorite? Support Londontopia Top 10 London: Top Ten Things to See and Do in Lewisham Top 10 London: Top Ten Things to See and Do in Stockwell Top 10 London: Top Ten Things to See and Do in Bloomsbury Top Ten London: Top 10 Things to See and Do in Paddington Top 10 London: Top Ten “Small” Museums Christmas in London: Top Ten Places for Christmas Shopping in London Top 10 London: Top Ten Things to See and Do in Stepney Top 10 London: Top Ten Things to See and do in Kennington Top 10 London: Top Ten Things to See and Do in Merton, London Top 10 London: Top Ten Things to Do in Barking & Dagenham Search our Extensive Archive Watch Our London Videos! LONDON TOP FIVE: Our Personal Favorite Bookstores in London – What’s Your Favorite? GREAT LONDONERS: Samuel Pepys – The Scribe of London The Tube: Ten Interesting Facts About the Central Line on the London Underground LONDON ICONS: Fortnum & Mason – The Grocers to the Queen The Temple of Mithras: London’s New Roman Museum in the New Bloomberg London HQ Tudor London: Top 10 Tudor Buildings in London Best Posts on Londontopia 101 London Travel Tips Top 100 London Attractions How to Find the Cheapest Airfares to London 10 Things NOT to do in London Best London Guidebooks 101 Free Things to do in London London Lingo – A London Word Dictionary Top 7 Tips for Doing London on the Cheap Top 11 Myths American Believe about London Guide to Eating in London Best Times of Year to Travel to London London Packing Tips Top 11 Movies Set in London Top Attractions off the Tourist Track Top 5 Most Amazing London Hotels Top 10 Hostels in London Best Views in London Restuarants London Taxi Ettiquette Top 12 London Views A Guide to Five of London’s Bridges 10 Random Facts and Figures about Trafalgar Square Top 100 British Slang Words London Places to Explore Buckingham Palace Canary Wharf City of London Clapham Covent Garden Cutty Sark Greenwich Hampton Court Palace Heathrow Houses of Parliament Imperial War Museum Islington Kensington Kensington Palace Leicester Square London London Eye London Transport Museum Museum of London National Gallery Natural History Museum Notting Hill Palace of Westminster Piccadilly Circus Portobello Road Putney Queen's Gallery Queen Elizabeth Olympic Park Regent's Street Royal Academy Somerset House Southbank Southwark St Pancras St Paul's Cathedral Tate Britain Tate Modern Tower Bridge Tower of London Trafalgar Square Wandsworth West End Westminster Westminster Abbey Windsor Castle About Londontopia Londontopia is simply the website for people who love London. It was founded by Jonathan & Jackie Thomas from Anglotopia.net as a place to post articles solely focused on London and its environs. Keep up with all the latest London news at Londontopia! This site is geared towards people who love to visit London and our primary audience is North American but everyone is welcome! When We’re in London Next We don’t currently have any travel plans to London but hope to visit at some point in 2020. AmoMama Entertainment News Language: Top 100 Cockney Rhyming Slang Words and Phrases New London Street Slang - Fun British Slang The London Fiver – Five of the Best Video Game Arcades in London Tower Bridge: 10 Facts and Figures About London's Tower Bridge You Probably Didn't Know LONDON TOP FIVE: Our Personal Favorite Bookstores in London - What's Your Favorite? Top 10 London: Top Ten Things to See and do in Canary Wharf and the Docklands Top Ten London: Top 10 Things to See and Do in Clapham Londinium: 10 Interesting Facts and Figures about Roman London Ten Interesting Facts and Figures about Shakespeare’s Globe Theatre Copyright © 2020 Anglotopia, LLC · Website Developed by Anglotopia, LLC · Log in
cc/2020-05/en_middle_0016.json.gz/line4724
__label__cc
0.678656
0.321344
Browse Puzzles To take full advantage of all the site's features like saving/loading puzzles, leaderboards, reward points/badges Login or Register Tomatoes, Radishes, Cucumbers And Cabbage Tomatoes, Radishes, Cucumbers And Cabbage Puzzle Details: About: In this fun new game we feature some of the ingredients for a tasty and healthy salad: tomatoes, radishes, cucumbers and fresh cabbage. Pick your difficulty level, put the vegetables back together, solve this fun puzzle and let us know what other ingredients we need for a tasty and healthy salad? Puzzle Of The Day On: 21/May/2019 Never Miss A Puzzle! Like Us On Facebook DailyJigsawPuzzles.net Very Easy Puzzle Time Stats Easy Puzzle Time Stats Normal Puzzle Time Stats Hard Puzzle Time Stats Very Hard Puzzle Time Stats Extra Hard Puzzle Time Stats Puzzle Leaderboards Login and refresh the page to see leaderboards. Extra Hard Some Other Fun Puzzles Raspberry Pie Today's new jigsaw puzzle features a pieces of delicious raspberry pie. A new fun and challenging online puzzle is here. This jigsaw features a bunch of green peas. The pea is most commonly the small spherical seed or the seed-pod of the pod fruit. The average pea weighs between 0.1 and 0.36 grams. The immature peas are used as a vegetable, fresh, frozen or canned; varieties of the species typically called field peas are grown to produce dry peas like the split pea shelled from the matured pod. These are the basis of pease porridge and pea soup, staples of medieval cuisine; in Europe, consuming fresh immature green peas was an innovation of Early Modern cuisine. Fruit and Vegetable Cart Tomatoes, bell peppers, water melons, onions, lemons, oranges, carrots and many other fresh fruits and vegetables can be found on the cart featured in this fun new puzzle. Give it a try! Let's start the day with a plate of delicious strawberry pancakes and a relaxing jigsaw puzzle. Archaeological evidence suggests that pancakes are probably the earliest and most widespread cereal food eaten in prehistoric societies. Pancakes come in a variety of shapes, size, toppings and/or fillings. In Europe pancakes are thin and filled with plum, apricot, lingonberry, strawberry or apple jam, chocolate sauce, or hazelnut spread. They may be breakfast food, appetizer, main course, or even dessert. American and Canadian pancakes (sometimes called hotcakes or flapjacks) are usually served at breakfast, in a stack of two or three topped with maple syrup and butter. Other popular topping alternatives include jam, peanut butter, nuts, fruit (like the strawberries ), honey, whipped cream. Shish Kebab is a dish consisting of meat threaded on a skewer and grilled. Any kind of meat may be used; cubes of fruit or vegetables are often threaded on the spit as well. Typical vegetables include tomato, bell pepper, onions, and mushrooms. Dried Herbs And Spices Spice up your day with today's new puzzle. Used for flavoring, coloring or preserving food, spices are seeds, fruits, roots or piece of bark. Herbs are the leaves, flowers, or stems of plants used for flavoring or as a garnish. The spice trade developed throughout South Asia and Middle East by at earliest 2000 BCE with cinnamon and black pepper, and in East Asia with herbs and pepper. Early uses were connected with magic, medicine, religion, tradition, and preservation. Spices were among the most demanded and expensive products available in Europe in the Middle Ages, the most common being black pepper, cinnamon, cumin, nutmeg, ginger and cloves. The most exclusive was saffron, used as much for its vivid yellow-red color as for its flavor. With the discovery of the New World came new spices, including allspice, chili peppers, vanilla, and chocolate. Solve this fun and colorful puzzle and let us know what spice or herb is your favorite. Have fun! Fresh Spring Salad Let's start the day and the week with something fresh and healthy like the delicious salad featured in today's puzzle. Tomatoes, carrots, cabbage, green salad leaves, radishes and some virgin olive oil it's all you need for a healthy and nutritious salad like the one in this puzzle. Enjoy. Red, Orange And Yellow Peppers Peppers are commonly broken down into three groupings: bell peppers, sweet peppers, and hot peppers. Ideal growing conditions for peppers include a sunny position with warm, loamy soil, that is moist but not waterlogged. Peppers are highly nutritious. They have more Vitamin C than an orange, and a typical bell pepper contains more than 100% of the daily recommended value for Vitamin C. They also have relatively high amounts of Vitamin B6. Chocolate And Coffee What better way to start the day then with a cup of hot coffee, a piece of delicious chocolate and a relaxing puzzle. Enjoy! Basket of Fresh Apples An apple a day keeps the doctor away. With the basket of fresh apples featured in today's new jigsaw we'll keep the doctor away for some time. Vegetable Bazaar A variety of vegetables like carrots, cucumbers, bell peppers, green beans and more in a oriental bazaar. Solve the jigsaw and see what other veggies you can spot. A puzzle featuring some red and juicy apples. How fast can you put it back together. Didn't find something you like? Don't worry we have thousands of online puzzle games for both kids and adults alike. Browse All Puzzles Daily Jigsaw Puzzles - a new online jigsaw puzzle every day. All our puzzles can be played in full-screen mode on your desktop, smart phone or tablet( iPad/iPhone(iOS) or Android powered devices). DailyJigsawPuzzles.net is your free iPad (or Android tablet) jigsaw puzzle app. Just visit using your mobile device and play our HTML5 powered puzzles. What is a jigsaw puzzle? Jigsaw Variations Jigsaw Pieces Jigsaw puzzle solving strategies Download Jigsaw Puzzles The Jigsaw Puzzles Cookies Policy / Privacy Policy All images are copyrighted by their respective owners. Where possible the appropriate accreditation is given.Third-party trademarks are used solely for describing the games indexed herein and no license or other affiliation is implied. For more info please check our Copyright Policy page.
cc/2020-05/en_middle_0016.json.gz/line4732
__label__cc
0.584526
0.415474
Tag Archives: National Library of Australia activism, Australia, Social Movement Learning, Social Movements What do we want? Grumpy old men at the National Library of Australia (book launch!) November 3, 2016 marchudson Leave a comment Last night at the National Library of Australia two grumpy old men talked about social movements and protest. That doesn’t sound too enthralling, does it? But the event – hosted by the NLA, and the launch of the book “What Do We Want: the story of protest in Australia” was a thoughtful, passionate and even (perhaps!) inspiring event. After the normal welcomes and acknowledgement of country, Clive Hamilton took to the podium to graciously list all the people who’d been involved in the realisation of the rather beautiful book (think a cross between a solid piece of academic research and a coffee table book, lavishly illustrated with brilliant photos and images; I only don’t have a copy because if I bring one more book home, the Amazing Wife will d.i.v.o.r.c.e me). He admitted that three years ago he’d turned down the initial suggestion he write it, but a month later changed his mind, and was very glad, having ‘never had so much fun in the writing and selecting images’. He especially thanked the NLA staff and his research assistant Jemma Williams. Hamilton then sat and had a conversation about the book and the history of Australian social movements/protests and their impacts with Jack Waterford, a journo and raconteur. The two have known each other since the Vietnam War Moratorium mobilisations in 1970, recalling that a senior Liberal politician characterised the marchers as ‘political bikies pack-raping democracy’). Waterford riffed on this, invoking the Marlon Brando movie ‘The Wild Ones’ and the famous ‘what are you rebelling against/what have you got?’ line. The conversation ranged freely, and it’s impossible to capture the nuance. So, some bullet points- Hamilton pointed out that all movements have a cautious ‘don’t scare the horses/let’s show how respectable wing’’ and a ‘we’re sick of waiting’ wing, and that over time the cautious wing (institutioanlised, funded) has won out. Waterford responded to this with reminisces of the ‘Black Power’ rhetoric and imagery of some indigenous activists (see here too), and how in response the mainstream papers were suddenly saying ‘yes, Aborigines have legitimate grievances x, y and z, but this is too much’ – where previously grievances x,y and z had not been admitted. [Another example of what the pointy-headed academics who study this stuff call ‘the radical flank effect’] In a conversation about a possible lack of humour/mockery in the movements nowadays “BUGA Up” (which the author remembers well) were billboard defacers from Sydney, who took careful and accurate aim at the tobacco and drinks industries. Nowadays it’d be called ‘culture jamming’. Personally, I was always more astonished by the ‘Sisters of Perpetual Indulgence’. Waterford reminisced about a magistrate (Pat O’Shane, my squiggles say) acquitting protesters who had been charged with defacing advertisements by agreeing that indeed yes, the adverts were sexist. Hamilton offered ‘three cheers for political correctness’, tracing its roots back to the (self-mocking) days when Maoists carried around their little red book, pointing out that it’s about showing respect and not being a douche (my words), no matter how the term has been hijacked by the right as a handy tool of opprobrium. Hamilton pointed out that while the left won the ‘cultural’ battles, the right has won the economic arguments [up to – and weirdly beyond – 2008]. Of the five movements he covers in the book – peace, feminism, LGBT, indigenous and environment) they both agreed that the LGBT has been the most successful. In talking about the George Duncan case (a gay law lecturer killed by off duty police in Adelaide when they threw him in the Torrens, not realising he couldn’t swim), Waterford pointed out that it was the editor of the ANU’s student newspaper, Woroni, who went to Adelaide, came back to Canberra and wrote a piece naming names who got things moving. His story was then picked up by the Adelaide Advertiser (back then, still a proper newspaper) and pressure mounted for something to be done. There was an interesting discussion about Hanson’s One Nation, Trump and Brexiters as a response to the cultural changes (from the left) and the economic changes (‘economic rationalism/neoliberalism’) people feeling disorientated and not consulted on these changes. Waterford pointing out that in 1981/2 John Howard, in the Liberal Cabinet, was challenging Malcolm Fraser’s position on apartheid (Fraser was up for sanctions, Howard wasn’t). He pointed out that the culture wars are unable to turn the clock fully back, but the right-wing culture warriors have become adept at throwing a dead cat into the room to cause outrage, and that Howard was good at creating distractions (getting the Age to fulminate about the wrong thing). The final topic was the fraught one of how social media does (not) help with changing minds and mobilising. Clicktivism etc etc. Hamilton urged protestors to take a risk and have a sense of humour. Hamilton suggested that if the Galilee Basin goes ahead (and the Queensland government seems very determined then the protests may outstrip the Franklin Dam protests. We shall see… While they spoke, dozens of images from the book were flashed up behind them, an inducement – if any were required – for the large (and largely grey) audience to part with some of their super for a super book. There was only time for three questions, sadly. The first came from Blair Palese of 350.org. She asked if the attacks on charities today are unprecedented. Waterford thought they were, but argued that the ‘left’ had set themselves up for it by accepting government cash. Hamilton recalled that after he gave a critical speech at an event 15 or so years ago, a government minister had approached one of the event’s organisers and said ‘why do you bite the hand that feeds you’. [FWIW, I would argue that while the attacks are bigger, the 2002-4 efforts by the Howard government, where they hired the IPA to be their goons in an attack on charitable status, are a fair precursor.] The second question was on the Iraq War demonstrations of 2003, and their effect, given how much bigger they were than the Vietnam War protests. Hamilton talked about how governments are now more adept at handling these things, and Wateford pointed out that the difference was the Vietnam War had actually been popular until the late 60s, with the ALP getting slaughtered on the issue in the 1966 Federal election. The final question (from me) was about hope – I said that it had been possible to believe you could transform/democratise the State, but now, with the juggernaut of climate change as well, things looked bleak – what would you say to someone who said ‘why bother?’ Waterford admitted that a council of despair is possible, but we must remember that movements DO sometimes succeed. He also lamented the lack of charismatic politicians in Australia of late, with Pauline Hanson about as ‘good’ as it gets. Hamilton made a good observation, using feminism as an example. After first wave feminism won the vote, things went quiet, but there was still activity (what the social movements guys call ‘abeyance). And if you could speak to a feminist activist in 1960, they would say ‘nothing is going to change, the patriarchy is too entrenched, there’s no hope’… That was a wrap, and then there was wine and (too few!) nibbles upstairs. Future events at the NLA look good (see here). Call me a crushing snob – Jodi Piccoult?! Addendum – What DO we need, then? I was unconvinced by the answer to my question. Charismatic leaders are a perhaps necessary but certainly not sufficient answer to the ‘what do we need’ question. I think we need social movement organisations that are capable of growing, learning, organising and winning. That are capable of not becoming dependent on either the State’s money (always with strings, and the strings can become a noose) or its good graces. That are capable of escaping the stale repertoires of marches and rallies and other emotathons. That are able to escape the smugosphere – where things are done not because they might succeed, but because they are in the comfort zone of organisers looking to attain or sustain their status within their own particular mileu. We need movements where people can stick around, and WANT to stick around, even when they become busier with kids/sick parents/heavy workloads, where they are able to exercise the skills and knowledge they have and acquire NEW skills and knowledge. Here’s a blog post about how a social movement organisation could – in a fun way – go about identifying skills and knowledge that it had and that people in a room wanted…. See also here. All the while, of course, the carbon dioxide accumulates. (The Australian centre that measures that accumulation has the appropriate name Cape Grim.) Other books readers may find useful Verity Bergmann’s 1993. Power and Protest: Movemetns for Change in Australian Society. I haven’t read Power, Profit & Protest: Australian Social Movements and Globalisation, Allen & Unwin, Sydney, 2003, but it is probably very good! Allen, Y and Noble, J. 2016. Breaking the Boundaries: Australian activists tell their stories. Adelaide: Wakefield Press Jack WaterfordNational Library of Australia
cc/2020-05/en_middle_0016.json.gz/line4733
__label__cc
0.58138
0.41862
Marianne Dyson's Science Snacks Blog Because your brain deserves a treat! Subscribe to monthly blog via www.MarianneDyson.com/contact Triangles to Mars Marianne Dyson, July 2018 At the end of July, Mars will be its brightest in 15 years because it will be only 35.8 million miles (57.6 million kilometers) away. Since no one has ever been to Mars, how do we know this distance so precisely? Triangles! If the length of one side and two angles of a triangle are known, the length of the other sides can be calculated. Way back in 1673, Giovanni Cassini (1625-1712) used this knowledge of triangles to estimate the distance to Mars. This method is called parallax. [Ref: A Teacher’s Guide to the Universe: Background: Parallax.] Half the distance (R in the diagram) between two locations on Earth is the known (opposite) side of the parallax triangle. One angle is 90 degrees. The other angle is found by observing the object from the two locations (Cassini in Paris and fellow astronomer Jean Richer in French Guiana in 1673). From the two locations (1 and 2 in the diagram), the object appears in a slightly different place in the sky (A and B in diagram) defined by the distant background stars. The difference in position reveals the angle (ɵ in the diagram). Plugging the known distance and measured angle into the tangent equation*, the answer for D is revealed. The distance (D) to a planet or star can be found by observing it from two locations (1 & 2) whose separation (R) is known, and then determining the angle (ɵ) between the observed position in the sky using distant background stars (A and B). Credit: NASA. *The tangent of ɵ equals the length of the opposite side (R) divided by the length of the adjacent side (D) which is the distance. Because the angle is very small, the tangent is approximately equal to the angle. So the equation simplifies to D (in parsecs) equals R (in Astronomical Units) divided by ɵ (in arc seconds). The farther away an object is, the “taller” the triangle and the smaller the angle, making it difficult to measure very accurately. Thus parallax measurements to planets are easier when the planet is at opposition, on the same side of the sun as Earth. Mars opposition occurs every 26 months. But the orbit of Mars is an ellipse. So the closest to Earth Mars can get is when opposition is near periapsis—when Mars is closest to the sun. Opposition and periapsis coincide every 15 years, and 2018 is one of those years. An Alternate History The years when opposition and periapsis coincide are also the best years, in terms of fuel and time spent in transit, to send spacecraft to Mars. Back in 1990, I wrote a science fiction story about a group of astronauts preparing for a trip to Mars this year so that they would take the first steps on Mars before the 50th anniversary of Apollo 11’s landing on the Moon. I rediscovered this manuscript (it was not in digital form!) in my closet recently and am in the process of turning it into an alternate history novel. So when I go out to view Mars later this month, I’ll be imagining my crew on their way there this summer. If they had followed the trajectory of InSight that launched on May 5, they’d be arriving on Mars on Monday, November 26. [Ref: Planetary Society.] But to reduce radiation exposure, they would likely have launched on May 18, “passed” InSight en route, and would be arriving on Mars on September 10, 2018. Would that day become a holiday on Mars? Imagine if the current crew of six (which includes only one woman) up on the International Space Station were instead on their way to Mars. Would they be worried about the global Martian dust storm in progress right now? Would every kid in the country know everything there is to know about their planned landing area in Isidis Planitia? I can almost hear my young self proudly telling my mom that this part of Mars was named after the Egyptian goddess of heaven and fertility. Mars in the Teapot Though no humans are yet scheduled to travel to Mars, at least we have learned how to measure the distance and send spacecraft there. InSight is a pretty cool little spacecraft, too. It has a probe that is a self-hammering mechanism that will pound itself into the ground, up to 16 feet (5 meters). It relays data back via its tether to the lander. What might it find under the surface? So later this month, look for Mars in the southeast evening sky near the Sagittarius “teapot.” Mars will be glowing orange below and to the left of the teapot with yellow Saturn above the top. Saturn was at opposition on June 27. How far is it to Saturn? If you have a good telescope, and a friend on the other side of the planet, you can figure it out yourself using triangles. Or you can just Google the answer! Writing about Space My guest editorial on Gender Parity is in the July/August issue of Analog. You can read it free online, but you might want to subscribe so you can read my fact article “In Defense of the Planet” in the upcoming Nov/Dec issue. I also did a Q&A with the magazine that should be posted later this month on the Astounding Analog Companion. My next book, coauthored with Buzz Aldrin, To the Moon and Back: My Apollo 11 Adventure, a pop-up book from National Geographic, is available for preorder now from Amazon. Look for it in stores in October. Speaking about Space I offer programs for school-aged children up through senior citizens, as well as science workshops for students and teachers. Please consider me for Author Visits. September 21-23, Science GOH at FenCon XV in Dallas. See their website for program details. Writer GOH is Larry Niven. September 29, Attending SCBWI Houston conference. October 2, Instructor for first class of Women and Space course at Rice University’s Glasscock School of Continuing Studies. October 12, Featured speaker on Friday at noon at the National Science Teachers Association conference in Reno, Nevada. See my contact page for a complete appearance schedule and photos from previous events. Author MariannePosted on July 14, 2018 Categories 2018 Science Snacks, 2018 Science Snacks, Science Snacks Goodnight Crescent Moon Lumpy Lunar Gravity Apollo 11, a view from Summer Camp Luna 13 a Solid Success Miles and Miles? Judging Distance in Space 2015 Science Snacks Science Snacks Marianne Dyson's Science Snacks Blog Proudly powered by WordPress
cc/2020-05/en_middle_0016.json.gz/line4735
__label__cc
0.689286
0.310714
Home SEC Filings ARTEC GLOBAL MEDIA, INC. (OTCMKTS:ACTL) Files An 8-K Entry into a Material... ARTEC GLOBAL MEDIA, INC. (OTCMKTS:ACTL) Files An 8-K Entry into a Material Definitive Agreement Item 1.01. Entry into a Material Definitive Agreement. Amendment of the Credit Facility Arrangement with TCA Global Credit Master Fund, LP As of November 18, 2016, Artec Global Media, Inc. (the Company) entered into an amendment of the credit facility arrangement that the Company previously entered into with TCA Global Credit Master Fund, LP (TCA) on December 24, 2015 (such amendment, the Amendment). As part of the Amendment, TCA agreed to release an additional $450,000, subject to certain terms and conditions, of which $300,000 was released as of December 30, 2016 (the Company used $100,000 of this amount to supply working capital to Silo Marketing Funding LLC, a Delaware limited liability company (Silo), which the Company acquired as described under the heading Acquisition of Silo Marketing Funding LLC below), with the remaining $150,000 held in reserve by TCA. The Company has granted TCA a first priority security interest in all of the Companys assets. As part of the Amendment, (i) the maturity dates of the three convertible promissory notes (each in the amount of $105,000) that the Company issued to TCA on December 24, 2015 were extended to May 18, 2017, August 18, 2017 and November 18, 2017, respectively, and (ii) TCA acknowledged and agreed that TCA has waived any and all defaults and/or events of default that occurred prior to November 18, 2016, and that none of such waived defaults or waived events of default shall be the basis, in whole or in part, for any future default or event of default. In connection with the Amendment, the Company agreed to pay certain fees to TCA and certain of its affiliates and, on December 30, 2016, the Company issued to TCA (i) three convertible promissory notes (each in the amount of approximately $66,667) maturing on May 18, 2017, August 18, 2017 and November 18, 2017, respectively, and (ii) one (1) share of Series X preferred stock of the Company. A description of the Series X preferred stock of the Company is included under Item 3.03 below. The Company previously filed as exhibits to the Companys Form 10-K for the fiscal year ended January 31, 2016 copies of the material definitive agreements that the Company entered into with TCA on December 24, 2015. Copies of the material definitive agreements that the Company entered into with TCA as of November 18, 2016 in connection with the Amendment are filed as exhibits to this Form 8-K. Acquisition of Silo Marketing Funding LLC As of December 30, 2016, the Company entered into a Purchase Agreement (the Purchase Agreement) with Elizabeth Honeycutt and Peter Corrao (collectively, the Sellers) to acquire from the Sellers a 50% interest in Silo, including all of the membership interests in Silo. The Company completed that acquisition on December 30, 2016. In accordance with the Purchase Agreement, and as full consideration for the acquisition, on December 30, 2016 the Company issued to the Sellers 250 shares of Series S convertible preferred stock of the Company, which, in the aggregate, may be converted into up to 25% (after giving effect to such conversion) of the issued and outstanding shares of the Companys common stock, par value $0.001 per share (Common Stock), on the date of conversion. A description of the Series S convertible preferred stock of the Company is included under Item 3.03 below. In addition, in accordance with the Purchase Agreement, the Company supplied $100,000 of working capital to Silo on December 30, 2016, and the Company has agreed to supply additional working capital to Silo in three separate installments of $50,000, to be supplied at the end of January 2017, February 2017 and March 2017, respectively. A copy of the Purchase Agreement is filed as an exhibit to this Form 8-K. Elizabeth Honeycutt (one of the Sellers) is related to Timothy Honeycutt, who is a member of the Companys Board of Directors (the Board). Nevertheless, the negotiation of the Purchase Agreement was on an arms length basis, and Mr. Honeycutt recused himself from all deliberations and decisions of the Board related to the Purchase Agreement and the transactions contemplated thereby, including, without limitation, the authorization of the Purchase Agreement, the authorization of the creation of the Series S convertible preferred stock of the Company, and the authorization of the issuance of shares of the Series S convertible preferred stock to Elizabeth Honeycutt. Silo is in the marketing industry. The Company will disclose a more comprehensive description of the business of Silo together with the Companys filing of the required financial statements for Silo, which filing will be made by appropriate means within 71 calendar days of the filing of this Form 8-K. As of the filing date of this Form 8-K, the audit of the applicable financial statements of Silo remains to be completed. Item 2.01. Completion of Acquisition or Disposition of Assets. The disclosures under Item 1.01 above, under the heading Acquisition of Silo Marketing Funding LLC, are incorporated hereunder by this reference. Item 2.03. Creation of a Direct Financial Obligation or an Obligation under an Off-Balance Sheet Arrangement of a Registrant. Amendment of the Credit Facility Arrangement with TCA Global Credit Master Fund, LP, are incorporated hereunder by this reference. Item 3.02. Unregistered Sales of Equity Securities. On November 18, 2016 and December 30, 2016, the Company engaged in the following unregistered issuances of securities in connection with the matters disclosed under Item 1.01 above: On November 18, 2016, the Company issued to TCA three convertible promissory notes (each in the amount of approximately $66,667) maturing on May 18, 2017, August 18, 2017 and November 18, 2017, respectively, as part of the consideration associated with the credit facility arrangement, as amended, described under Item 1.01 above, under the heading Amendment of the Credit Facility Arrangement with TCA Global Credit Master Fund, LP. Each of those convertible promissory notes is convertible into shares of the Companys Common Stock only upon an event of default under the Companys credit facility arrangement, as amended, with TCA; however, each of those notes provides that TCA will not be entitled to convert the note to the extent that such conversion would cause TCA to beneficially own more than 4.99% of the number of shares of the Companys Common Stock outstanding immediately after giving effect to such conversion. A copy of each of the convertible promissory notes described in this bullet point is filed as an exhibit On December 30, 2016, the Company issued to TCA one (1) share of Series X preferred stock of the Company in connection with, and as part of the consideration for, the credit facility arrangement, as amended, described under Item 1.01 above, under the heading Amendment of the Credit Facility Arrangement with TCA Global Credit Master Fund, LP. The disclosure under Item 3.03 below, which describes the terms of the Series X preferred stock of the Company, is incorporated hereunder by this reference. On December 30, 2016, the Company issued 125 shares of Series S convertible preferred stock of the Company to Peter Corrao and 125 shares of Series S convertible preferred stock of the Company to Elizabeth Honeycutt as consideration for the acquisition of Silo described under Item 1.01 above, under the heading Acquisition of Silo Marketing Funding LLC. The of the Series S convertible preferred stock of the Company, is incorporated hereunder by this reference. The securities referenced above were issued in reliance upon an exemption from registration to Section 4(2) of the Securities Act of 1933, as amended (the Securities Act) and, in each case, the recipient obtained the securities in question for investment purposes, without a view to distributing those securities, and had access to information concerning the Company, as required by the Securities Act. All of the securities identified above bear an appropriate restrictive legend. Item 3.03. Material Modification to Rights of Security Holders. Series S Convertible Preferred Stock Adoption of Certificate of Designation On December 28, 2016, the Board, by written consent, authorized the creation (using a portion of the authorized but unissued shares of blank check preferred stock of the Company) of a series of 250 shares of preferred stock, par value $0.001 per share, designated as Series S Convertible Preferred Stock, and, in connection therewith, adopted the Certificate of Designation, Preferences and Rights of Series S Convertible Preferred Stock (the Series S Certificate of Designation), a copy of which is filed as Exhibit 3.1.1 (and 4.1.1) to this Form 8-K. The Series S Certificate of Designation was filed with the Office of the Secretary of State of the State of Nevada on December 29, 2016. On January 6, 2017, the Company, upon the authorization by written consent of the Board, filed a Certificate of Correction with the Office of the Secretary of State of the State of Nevada to correct an inaccuracy in the Series S Certificate of Designation. A copy of that Certificate of Correction is also filed as part of Exhibit 3.1.1 (and 4.1.1) When issued, the Series S convertible preferred stock votes together with the Companys Common Stock, as follows: for each share of Series S convertible preferred stock held by a holder thereof, such holder will be entitled (in any stockholders meeting and in any action to be voted on or consented to by stockholders of the Company) to the number of votes (and the voting rights and powers) as such holder would have if such holder were holding that number of shares of the Companys Common Stock into which such share of Series S convertible preferred stock is convertible on such date. Each share of Series S convertible preferred stock is convertible initially into the number of shares of the Companys Common Stock equal to 0.1% of the number of shares of the Companys Common Stock outstanding after giving effect to such conversion. The description of the Series S convertible preferred stock set forth above is qualified in its entirety by the copy of the Series S Certificate of Designation filed as Exhibit 3.1.1 (and 4.1.1) to this Form 8-K. Series X Preferred Stock of one (1) share of Preferred Stock, par value $0.001 per share, designated as Series X Preferred Stock, and, in connection therewith, adopted the Certificate of Designation, Preferences and Rights of Series X Preferred Stock (the Series X Certificate of Designation), a copy of which is filed as Exhibit 3.1.2 (and 4.1.2) to this Form 8-K. The Series X Certificate of Designation was filed with the Office of the Secretary of State of the State of Nevada on December 29, 2016. Solely upon the occurrence and continuation of an event of default under the Companys credit facility arrangement, as amended, with TCA, the holder of the one (1) share of Series X preferred stock would be entitled to vote on all matters subject to a vote or written consent of the holders of the Companys Common Stock. In the event that the holder of the one (1) share of Series X preferred stock is so entitled to vote, that one (1) share of Series X preferred stock would entitle the holder thereof to that number of votes equal to the number of issued and outstanding shares of the Companys Common Stock and all other securities, as of the applicable date of determination, on a fully diluted basis, plus one (1) vote, it being the intent that the holder of the one (1) share of Series X preferred stock shall have effective voting control of the Company upon the occurrence and continuation of an event of default under the Companys credit facility arrangement, as amended, with TCA. The description of the Series X preferred stock set forth above is qualified in its entirety by the copy of the Series X Certificate of Designation filed as Exhibit 3.1.2 (and 4.1.2) to this Form 8-K. Item 5.01. Changes in Control of Registrant. As a result of the Companys issuance of the one (1) share of Series X preferred stock to TCA as disclosed under Items 1.01 and 3.02 hereof, TCA will, solely upon the occurrence and continuation of an event of default under the Companys credit facility arrangement, as amended, with TCA, be entitled to exercise voting control of the Company. The disclosures under Items 1.01 and 3.02 hereof that describe the issuance of the one (1) share of Series X preferred stock to TCA are incorporated Item 5.02. Departure of Directors or Certain Officers; Election of Directors; Appointment of Certain Officers; Compensatory Arrangements of Certain Officers. Effective as of January 5, 2017, the Board (excluding Timothy Honeycutt, who recused himself from the Board vote), by a unanimous vote taken at a special telephonic meeting on that date, appointed Timothy Honeycutt to serve in the capacity of Vice President and Chief Operating Officer of the Company until the earliest of his removal by the Board, his resignation or his Mr. Honeycutt, 42, is an influential media driver whose entrepreneurial vision has helped improve the sales of multiple companies. Mr. Honeycutt purchased his first business, a franchise of ORECK Vacuum LLC, at the age of 21, and grew the business to 6 locations over a period of 15 years. Mr. Honeycutt took his media expertise to a national level, creating television and radio spots for multiple companies and helping to significantly increase their sales. Mr. Honeycutt was appointed to the Board on April 29, 2016 and serves as Chair of the Boards Compensation Committee. In connection with Mr. Honeycutts appointment to the Board in April 2016, the Company previously issued to him a convertible promissory note in the original principal amount of $25,000, maturing 3 years from the date of issuance, accruing interest at a rate of 12.0% per annum and convertible into shares of the Companys Common Stock at a 40.0% discount to the market price of those shares. The Company did not enter into any new or additional compensation arrangements with Mr. Honeycutt in connection with his appointment as Vice President and Chief Operating Officer of the Company. Item 9.01. Financial Statements and Exhibits Exhibit No. Description of Exhibit 3.1.1 (and 4.1.1) Certificate of Designation, Preferences and Rights of Series S Convertible Preferred Stock of Artec Global Media, Inc., and Certificate of Correction Series X Preferred Stock of Artec Global Media, Inc. Amendment No. 1 to Senior Secured Revolving Credit Facility Agreement, dated as of November 18, 2016, between Artec Global Media, Inc. and TCA Global Credit Master Fund, LP Convertible Promissory Note, dated November 18, 2016 (in the amount of $66,666.66 and maturing May 18, 2017), issued by Artec Global Media, Inc. to TCA Global Credit Master Fund, LP the amount of $66,666.66 and maturing August 18, 2017), issued by Artec Global Media, Inc. to TCA Global Credit Master Fund, LP the amount of $66,666.68 and maturing November 18, 2017), Amendment No. 1 to Convertible Promissory Note, dated as of November 18, 2016, between Artec Global Media, Inc. and TCA Global Credit Master Fund, LP (this amends that certain Convertible Promissory Note, dated December 24, 2015 and originally set to mature on June 24, 2016, to extend the maturity date thereof to May 18, 2017) originally set to mature on September 24, 2016, to extend the maturity date thereof to August 18, 2017) originally set to mature on December 24, 2016, to extend the maturity date thereof to November 18, 2017) Purchase Agreement, dated as of December 30, 2016, among Artec Global Media, Inc., Elizabeth Honeycutt and Peter Corrao About ARTEC GLOBAL MEDIA, INC. (OTCMKTS:ACTL) Artec Global Media, Inc., formerly Artec Consulting Corp., is a marketing firm. The Company provides online marketing and reporting solutions, including lead generation, performance media, affiliate marketing, and other related Web services and consultation. Its segments include online marketing and media services. It owns or accesses targeted databases and utilizes technology to create local, regional and national marketing campaigns on demand providing clients with the ability to acquire new customers. It runs advertisements or other forms of marketing messages and programs through multiple channels, such as e-mail, direct mail, social media, short message service (SMS), radio and telecommunication to create responders for client offerings. Its marketing services include affiliate and performance marketing, display advertising, e-mail marketing, lead generation, creative design and consulting services. It is also engaged in the student loan debt consultation business. ARTEC GLOBAL MEDIA, INC. (OTCMKTS:ACTL) Recent Trading Information ARTEC GLOBAL MEDIA, INC. (OTCMKTS:ACTL) closed its last trading session 00.00000 at 0.00010 with 7,035,000 shares trading hands. ACTL ARTEC GLOBAL MEDIA INC. OTCMKTS:ACTL
cc/2020-05/en_middle_0016.json.gz/line4738
__label__cc
0.657708
0.342292
Restaurants Becoming Instagrammable for Millennial Market Posted by Abigale Lormen | May 1, 2019 | Business | 0 Nowadays, food photos dominate social media platforms especially Instagram. Restaurants took notice of this trend and are now pressured to remake their menu and interior decors to become “Instagram worthy,” such as custom flooring, aesthetically pleasing neon signs, and creative bathroom wallpapers. The free marketing opportunities associated with the platform benefits restaurants to attract more millennial customers. Most restaurants started by investing on the eye-catching menus like Unicorn Frappuccino and rainbow bagels. These days, aside from focusing into visually appealing menus, they’re taking it to the next level by including costlier investments – from handmade tables to customized tiles. According to Jen Pelka, the owner of a famous champagne bar “The Riddler” located in the heart of San Francisco, Instagram is like the new form of word of mouth. People discover her restaurant through the food photographs uploaded on Instagram. Pelka estimates that around half of her customers every night post photos of their time at the champagne bar. Most of her customers coming from out-of-town, also stated that they learned about The Riddler via Instagram. Because of the champagne bottle mural outside The Riddler, it draws attention from bystanders and passersby to take photos. The enamel tables of the bar which are personalized are also aesthetically pleasing which attract customers to come inside. Moreover, the photo-worthy champagne bongs and the enormous champagne collection also catches the interest of new and old customers. Pelka first saw the tables she used in The Riddler via Instagram from a Paris bistro called Clown Bar. Since the tables look visually attractive from those photos, she also ordered it for her champagne bar but personalized it into its white versions. Pelka knows that customers like to take pictures from overhead and photographs really look good on a white background. The Riddler’s tables also have the bar’s name and tagline written over it – “Hello, old friend.” Every time customers take a snap of their food and share it via Instagram, their followers would immediately have an idea where they are even without checking the post’s location tag. Despite being an Instagram-friendly bar, Pelka also tries to prevent Instagram from taking over The Riddler. When night comes, the bright lighting at the bar is slightly dimmed to fit the atmosphere. Vigor Branding principal Joseph Szala said that lighting is a key factor that clients always look for. Restaurants’ lighting should set the mood of the moment. In most instances, yellow lighting at night instead of the bright white light results in flattering photos. Similar to The Riddler, the San Francisco sandwich joint “Media Noche” also got the idea for their most photographed design element from another restaurant. Owners of Media Noche Jessie Barker and Madelyn Markoe, got the inspiration for their restaurant’s design and decor when they went on a trip to Cuba. After their trip, they collaborated with Hannah Collins Designs to recreate Havana’s atmosphere. They came up with an interior design that includes uniquely customized tiles that give a feeling of being in Havana. They also added banana wallpapers for the bathroom. Markoe said that they wanted the whole place to be photogenic, but at the same time, it should be in line with the food they offer and the restaurant’s Havana-inspired theme. Since it’s what catches the attention of most millennials today, their idea became a success. They weren’t anticipating Media Noche to be one of the popular Instagram hotspots in San Francisco. When the restaurant opened in 2017, the two owners estimate that about half of Media Noche’s customers post their experience on Instagram, whether it’s a picture of the restaurants signature Cuban sandwich or just a shoe photo against the brightly colored tiles. Media Noche also pulls in some extra revenue by allowing photographers to use the restaurant as a shooting location for photo shoots and advertisements. Branding Experts’ Caution to Restaurants Aside from getting the attention of potential customers to visit the place, the real challenge here is to get them to return. Branding experts remind restaurants that social media should only be a part of the customer’s experience. Remaining authentic to your brand is what’s more important. It’s crucial that you’re smart about how you plan the Instagram-worthy elements in your restaurant. There must be a purpose behind your plan because people can easily smell phony and you’ll only going to trick them once. According to the CEO and co-founder of State of Mind Partners, Mike Kelly, one way to keep the brand’s legitimacy is by not paying Instagram influencers who are people with thousands to millions of followers. If your restaurant’s social media presence is authentic, you can help expand your brand to new markets by introducing it to new customers while including some special touches that are relevant to a particular community. Kelly also added that Instagram is beneficial to restaurant groups when they move into different regions and territories. For instance, the vegan restaurant chain “By Chloe” in New York has been adding its signature design touches in all of its locations to attract customers to visit all the chains. Since its opening, the restaurant has initially used Instagram-worthy neon signs on its doors to attract diners. As a result, customers upload their pictures online and tag the chain. Co-founder Samantha Wasser said that when By Chloe first opened, the population of customers were mostly young females who like using Instagram. As the restaurant expanded through time, it’s customer base also grew wider. The “Instagram-worthy” trend is limited among small restaurants, but now, larger chains are also following the trend. Yum Brands’ Taco Bell, for instance, is looking into reaching millennials in the urban area through its Cantinas, which are modern urban inspired chains that serve Taco Bell’s classic menus. PreviousHigh Tide Changes OTC Stock Symbol to “HITIF” NextCognetivity Appoints Digital Health Specialist to Drive Platform Commercialization Strategy & Sales From Streets to the Street—Uber and Lyft Aiming for the Stock Market CVS Expands Market Through Membership Plans to Compete with Amazon Disney + New Streaming Service Geared For Families and True Blue Disney Fans US Pharmaceuticals File Lawsuit Against TV Ad Laws
cc/2020-05/en_middle_0016.json.gz/line4739
__label__cc
0.572091
0.427909
Steel Made at Northwest Indiana Factory Used in Navy vessels Domestic Sourcing ArcelorMittal USA has supplied steel plate to virtually every submarine in the Navy’s existing fleet. BURNS HARBOR, Ind. (AP) – The 337-foot USS Illinois submarine was built with steel made at the Arcelor Mittal USA factory in northwest Indiana. Construction on the $2.7 billion Virginia-class submarine began in March 2011. First lady Michelle Obama christened the vessel at a Connecticut shipyard in October, and it was commissioned in December. The nuclear-powered attack submarine features ArcelorMittal plates throughout the hull, including the nuclear reactor, (Munster) Times reported. But it isn’t the only Navy vessel that the steelmaker has provided materials to build. ArcelorMittal USA has “supplied steel plate to virtually every submarine in the Navy’s existing fleet,” according to plate sales manager Matt Habenicht. “As the only ‘made and manufactured in the USA’ producer of Navy armor plate, we are currently the sole qualified U.S. supplier of these grades of steel to the Navy, especially on these Virginia-class submarines,” he said in a news release. Plate made at the Porter County facility also goes into Littoral Combat Ships and DDG Destroyers. The factory also supplied plate for the new aircraft carrier CVN 78 Gerald R. Ford. “ArcelorMittal and legacy companies have a long, rich history of supporting our nation’s defense capabilities,” Habenicht said. “There is tremendous pride for our employees in this effort. When you know one of your family members or neighbors has a child or relative that may be aboard one of these ships, you pay extra attention to details when manufacturing their products.” The steel mill in Burns Harbor makes half of the 50,000 tons of steel needed for an aircraft carrier, U.S. Rep. Pete Visclosky said last week while addressing the Lake County Economic Alliance. Visclosky recently worked with fellow members of the Congressional Steel Caucus to maintain a requirement for the military to purchase only American-made steel. SOURCE: Washington Times Tags: ArcelorMittal USA Littoral Combat Ships Manufacturing Navy STEEL Submarine Previous Nordstrom, AG Adriano Goldschmied Apparel Class Action Settlement Next Made in USA is Less of an Option New Balance Adds Oversized “997” To It’s Latest Made In USA Offering
cc/2020-05/en_middle_0016.json.gz/line4742
__label__wiki
0.988211
0.988211
Madison.com Cap Times Edgewood High School to delay athletic field improvements, seek resident input EDGEWOOD HIGH SCHOOL | ATHLETIC FIELD IMPROVEMENTS From the Edgewood athletic field conflict coverage series Chris Aadland | Wisconsin State Journal Edgewood High School officials say they are delaying their plans for an improved lighting and sound system for football games at the school's athletic field to form a group to try and ease neighborhood concerns. SHELLEY K. MESCH, STATE JOURNAL ARCHIVES Edgewood High School is delaying its contentious plan for improvements to its athletic field by holding off on construction for several weeks while it forms a committee aimed at easing neighborhood concerns. In a Monday letter to the Dudgeon-Monroe and Vilas neighborhood associations, Edgewood High School President Michael Elliot and the school’s board chair and vice chair said the school would delay starting construction on lighting and sound system improvements until mid-April to form an ad hoc committee. That group would try to address resident concerns about noise and other inconveniences they say high school football games would bring to the area, the Edgewood officials said. Edgewood “is very interested in the opportunity to engage in constructive dialogue with our neighbors,” the letter said, adding that it hopes to “identify a realistic path forward that works for everyone.” Meetings would begin March 19 and last for eight to 12 weeks, according to the letter. The school said an independent facilitator would lead the “collaborative working group” meetings. It’s unclear if, or when, Edgewood intends to move forward with its plans regardless of what happens during any meetings. Elliot didn’t respond to requests for comment Wednesday. Dudgeon-Monroe Neighborhood Association leadership declined to comment Wednesday. Chris Kelly, president of the Vilas Neighborhood Association, didn’t respond to a request for comment Wednesday evening. Neighborhood pushback The Near West Side private school said late last month that it would install an improved sound and lighting system for its Goodman Athletic Field — changes that wouldn’t require Madison City Council approval. School officials have said the improvements were needed so Edgewood could play football games on its own field after using others in the area for about two decades. Please sign up or log in to view more. No credit card required. The plan drew backlash from some area residents, who said it was an attempt to bypass the City Council and public participation process by ditching original plans for a light and sound system, increased seating capacity, a concession stand, ticket booth and team room that would have required council approval. Many residents have opposed plans to bring football games to Edgewood, saying the changes would disrupt their normally quiet evenings with loud noise, light pollution and increased traffic. A chance for compromise? Edgewood said it decided to delay construction after David Hoffert, the Dudgeon-Monroe Neighborhood Association president and candidate for the District 13 City Council seat, approached the school to see if the two sides could work on an agreement. Hoffert said he approached the school to see if it would reconsider its plans or work on a compromise after its “deeply unfortunate” decision to go forward with lighting and sound improvements. “I really feel like there are very few issues that ought to tear apart a community,” he said. “And I certainly don’t think Edgewood building lights or sounds … deserves that level of strife.” Hoffert said Wednesday that he had recused himself from acting on behalf of the Dudgeon-Monroe Neighborhood Association on issues involving Edgewood while he ran for City Council, and was speaking for himself. He said he would wait to take a position on the school’s planned field upgrades to see how meetings with residents went. Hoffert also said he’s undecided on whether he’d participate in the meetings if asked because they would outlast his role as association president, and he’d either be a council member or have no official title. Tag Evers, who has been involved with the No New Stadium group and is running against Hoffert for the City Council seat, said he doesn’t see why Edgewood would need to form a new group when an existing process was already in place through the Edgewood Liaison Committee. “Why not go through that?“ he said, adding that he’d still participate in the new group if asked. Evers said he’s still opposed to field improvements for sports because it wouldn’t fit with the neighborhood aesthetic, surrounding green space and nearby Lake Wingra. While “it’s not clear what Edgewood’s intent is,” Evers said, he’s encouraged that the school appears to want to have a dialogue with the neighborhoods. “It’s good to keep the lines of communication open,” Evers said. Madison City Council Edgewood High School Athletic Field Goodman Athletic Field David Hoffert Tag Evers Dudgeon-monroe Neighborhood Association Dudgeon-monroe Neighborhood Vilas Neighborhood Vilas Neighborhood Association Capital W: Plug in to Wisconsin politics Subscribe to our Politics email! You'll get a weekly recap of the goings-on at the State Capitol, delivered free to your inbox every Friday. Chris Aadland is a general assignment reporter for the Wisconsin State Journal. Follow Chris Aadland | Wisconsin State Journal More in Edgewood athletic field conflict coverage (11 of 16) Edgewood High School to move forward with lights, sound system The original proposal would have required approval by the city's Plan Commission. Lighting and sound systems are regulated by city ordinances, so the school will just need to meet those regulations. Neighbors oppose football stadium at Edgewood High School, say it would disrupt nature of quiet neighborhood Dozens of yard signs near the private high school's campus on the Near West Side show opposition to the upgrades, despite the school's assurances that the lighting and sound system wouldn't be disruptive. Edgewood High School offers compromise on stadium plan Many neighbors continue to be opposed, saying compromise has come late and that the school has misrepresented a main reason for needing a stadium. Edgewood High School delays city review on proposed stadium The Dudgeon Monroe Neighborhood Association, which opposes the improvements, called on Edgewood to delay city consideration to better understand a recent compromise and new studies offered by the school. Edgewood High School seeks stadium with lights, sound for athletic fields Edgewood High School's proposed $1 million, 1,200-seat stadium has generated neighborhood concerns about lighting, sound system and crowd noise, traffic, parking, uses and an impact on property values. $125 million referendum would build DeForest intermediate school The proposed school for grades 4 through 6 would be built on land already owned by the district. Improvements to two elementary schools, the middle school and the high school are also envisioned. Madison City Council approves stricter standards for many Downtown events The council also approved proposals on renewable energy, dogs in city-occupied buildings and bus storage. Edgewood High School holding games on its field despite city officials saying it can't The Near West Side private school hosted a girls soccer game on Tuesday, with more scheduled, amid a bitter debate with residents about proposed improvements to its field. Edgewood stadium opponents subjected to months-long campaign of threats Edgewood president Michael Elliott said the school does not condone the harassment and was not aware that anyone with Edgewood was carrying it out. Update: Edgewood High School exploring 'legal pathways' to hold games on its playing field On Thursday, Madison’s Zoning Board of Appeals decided the school’s athletic teams can no longer play games on the school’s athletic field. Edgewood High School asks city to repeal master plan so sporting events can be held Last month, a board ruled the master plan prohibited matches and games from being held on the school's field. Edgewood is now seeking the master plan be repealed all together. Plan Commission delays vote on whether to allow Edgewood to play games on its field At the end of a meeting that lasted more than seven hours, with 100 people registered to speak, the commission delayed its vote for three weeks. WiscNews Capital Newspapers AmplifiedWisconsin ApplyMadison Wingra Printing Group © Copyright 2020 Capital Newspapers Inc., madison.com , 1901 Fish Hatchery Rd Madison, WI | Terms of Use | Privacy Policy
cc/2020-05/en_middle_0016.json.gz/line4745
__label__cc
0.667179
0.332821
OUR MADRID TOURS PRADO MUSEUM MADRID PRIVATE TOURS MADRID MUSEUMS AND ROYAL PALACE PRIVATE MADRID TOURS MADRID PRIVATE WALKING TOURS MADRID PRIVATE CAR TOURS PRIVATE VAN TOURS OUTSIDE MADRID SPECIAL PRIVATE TOURS IN MADRID DOWNTOWN AND COUNTRYSIDE TOURING DOWNTOWN AND RURAL MADRID. PRIVATE TOUR PRADO MUSEUM AND TOLEDO 1 DAY ZULOAGA, SOROLLA, ROMERO DE TORRES AND WOMEN OF THE TIME Madrid Museums FAMOUS SPANISH PAINTERS AND THEIR MASTERPIECES A WALK THROUGH THE LOUVRE MUSEUM AND PRADO PINACOTHECA We fulfill in this blog of Madrid Museum Tours what we promised in our previous one. We are going to share with you reflections on works of Ignacio Zuloaga, Joaquín Sorolla and Julio Romero de Torres. It will help us to analyze the situation of women at that time. And also to pay tribute to Sofia Kovalévskaya, Emilia Pardo Bazán and Clotilde García del Castillo. Let’s start with what happened in Madrid, on February 22, 1911. 2 courageous women walked down Carretas Street dressed in skirt pants. An outfit that María Antonieta had worn for the first time more than 130 years before. Yet, a fevered mob besieged the women. They took shelter in a store, waiting for the forces of law and order to rescue them. For the ignorant and the bellicose mass of Madrid at the beginning of the century, women had to be at home. Their duty was to take care of household chores and offspring. It was unimaginable that they read books. Secondary education for women was fraught with obstacles. Their access to university was inconceivable. The practice of sport, forbidden. But, the most serious problem was that women suffered three types of violence. Physical, sexual and moral. Worse still, violence against women had a structural character. It was considered something normal and undervalued by society and the law. Women were not only subordinated to men for legal or commercial operations. In cases of rape or adultery, she was the culprit, never the male. Such a social environment makes understandable that the attempt of those two “immoral women” to walk wearing skirt pants failed. In 1911 Ignacio Zuloaga finished his Bleeding Christ. Currently on display at the Museo Reina Sofía Madrid. This painting is an insurmountable illustration of the tragedy which was to be a woman at that time. May Zuloaga forgives me for interpreting it in my way. I see in this gloomy picture a woman crucified in the middle of 6 static persons. On her right, a priest tilts his head down. A red Nazarene, who holds a candle in his left hand, also lowers his head. And, between the two, kneels a penitent with closed eyes. Left side of the crucified woman. On a mound stands the executioner. He does not look either. Aside the executioner, a contrite-faced Nazarene, whose gaze directs towards the victim. And, at the same height as her, another hard-faced Nazarene is staring at us. The landscape is gray and the turbulent sky is painted by Zuloaga in the style of El Greco. In the background, Avila, the walled city, birthplace of Santa Teresa. Teresa of Avila dared to denounce, 351 years before 1911, the relations between men and women. Especially, between women and their male judges. For this, and more things, the holy Spanish Inquisition persecuted her. Looking at the Bleeding Christ of Zuloaga it is inevitable to think that almost nothing had changed for the women during the lapse of time between Saint Teresa and Ignacio Zuloaga… 351 years! Ignacio Zuloaga’s technique reveals a good academic apprenticeship. In his brush-stroke, we distinguish the footprint of Greco, Ribera, Velázquez and late Goya. He chose Castilian landscapes as background of his sullen characters of stoic existence. Bleeding Christ shows the shame and pain of its male protagonists. It is also a crude testimony of resignation to things that will remain the same. In February 1911, Emilia Pardo Bazán was 7 months away from her 60th birthday and would soon publish ‘Sweet Dreams’, her latest novel. Emilia Pardo Bazán was an extraordinary woman. She became the first female university professor in Spain (1916). Novelist, storyteller, poet, chronicler, historian, lecturer, advisor, editor. Plus an indomitable vindicator of women’s equal rights. Supported by her encyclopedic culture and narrative talent, she expressed her convictions. Ideas that outraged most of his male colleagues and social institutions. She defined all the barriers suffered by women who aspired to have an education. An unreachable dream for a woman. To get a full education from primary education to the University. ‘’All advantages for men, all obstacles for women”. Obstacles that bent sooner or later to the step of Dona Emilia. She was a member of the Ateneo first and president of the department of literature later. Counselor of Public Instruction. Member of the Madrid Economic Society of Friends of the Country. The essence of her feminist postulate was that men and women are equal in all fields. Areas such as the ability to educate oneself, to learn, to work, to teach and be the owner of one’s sexual will. Doña Emilia had neither the appearance of a mata-hari nor she did behave as such. She had a chubby body and voluminous double chin. According to famous writer Leopoldo Arias, Pardo Bazan was” an intruder who worked as a man in a masculine world.” To make things worse, she dared to write about feminine sexuality. Doña Emilia Pardo Bazan’s life ran parallel to her writings. She had a long love affair with Benito Perez Galdos. Emilia was the strong one in that relationship. Being the owner of her sexuality did not exempt her from committing infidelities. She called those infidelities ‘mistakes’ Mistakes that lacerated Galdos’ heart and damaged his fame as an invincible womanizer. Many men discovered their weakness after falling in love with female manipulators. Women who subjugate men using cruel coquetry. Dona Emilia did not need to resort to such feminine wiles. In love matters, she was the chief. Also a chief is the lady of ‘Reading ”. Painted by Julio Romero de Torres between 1901 and 1902. Displayed at the Reina Sofía Art Centre. This painting is the antonym of the Bleeding Christ. The protagonist of ”Reading” is the prototype of that ideal of woman profiled by Emilia Pardo Bazan. She lies on her bed in a reflective attitude. Her hypnotic gaze pierces us. An open book rests on the green cushion where the lady right arm also rests. The glazes on her tight-fitting dress suggest an anatomy of sensual curves. The fact that she didn’t shed her shoes indicates that she was in a hurry to lie down in bed and start reading. But it was time to pause and reflect on the content of the book. And this is the master snapshot that Romero de Torres captures. He draws her outline with that long, firm line that his father instilled in him. Except for the bedspread, the whole painting is green, in different shades. The background shows the influence of the bluish green of Velazquez’s Crucified Christ. A dark green covers the bedside table. Light green is the lampshade and the same light green spreads on the reader’s dress. The attractive face of the protagonist, her stylized arms are of a tenuous green. A different color from the yellowish green of the pages of the open book. A marvelous fusion of character and environment by means of the green color, in many textures. The icing on the cake is the orange – red quilt, full of passionate symbolism, that contrasts with all green textures. ”Reading” does not present that type of weak and ignorant woman, busy in her housework. I believe that the painting depicts the intimacy of a young girl who might be reading Concepcion Arenal’s essay ”Woman on the Rise”. Her posture denotes a soft character, but of iron convictions. She is not a fragile dreamer. Her strength lies in her intelligence, education, beauty and determination to overcome obstacles. Romero de Torres may have pointed out with ”Reading” the path that young women should follow to break the rules of an oppressive society. The first female university professor in history, Sofia Kovalevskaya, reached the highest personal achievement a woman could dream about. One month after the skirtpant altered public order in Madrid, a similar thing happened in Saint Petersburg. The staff of a theatre prevented some ”provocative ladies”, who wore such an attire, to enter the place. The plague of ”harem clothing”, was on the way to threaten the foundations of the society. 20 years and 1 day before the scandal of those 2 ladies in skirtpant, in Stockholm, Sofia Kovalévskaya passed away. She was of aristocratic extraction. Like her contemporary Pardo Bazan. Sofia was able to emigrate from Russia thanks a ”fictitious marriage”. Already in Germany, she had not forgotten her fellow women. Kovalevskaya’s had a total commitment to help Russian women to study abroad. Something impossible in 19th century Russia. Guided by her nihilistic ideas, she passed to action. Inspired by the Fritsche Commune of Zurich, she founded the Heidelberg Women’s Commune. This nihilistic association supported female compatriots to escape from Russia. Sofia’s nihilistic activism for the liberation of women surpassed Emilia Pardo Bazan defense of the oppressed woman. Kovalevskaya’s biography is about her tireless struggle to get a college education. And to practice math. And to teach her favorite subject at the university. 3 forbidden aspirations, in principle, because of her status as a woman. Kovalevskaya became : 1º the first female university professor in history. 2ºthe first female mathematician in Russia. 3º the first woman who graduated in philosophy at the University of Göttingen (Germany). Sofia Kovalévskaya wrote 2 novels denouncing the patriarchal, feudal and autocratic society of her country. Sofia suffered constant humiliation from the miserable academic environment. She got rejected as a professor in France and Germany. It did not matter that she had a doctorate at the age of 24 . Her thesis was three times longer than the ordinary ones. Finally, in 1889, the Swedish Academy validated Sofia’s contributions to the exact sciences. It granted her the position of professor, for life. at the Faculty of Mathematics at Stockholm University. In 1891 she fell ill with pneumonia on her way back from a frustrating trip to St. Petersburg. There, she was not admitted to the ceremony of the University’s Mathematical Academy. Despite the enormous recognition she enjoyed in the international scientific community She died in Stockholm at the early age of 41. No Russian, German, or Swedish artist ever portrayed her. Clotilde García del Castillo has been one of the most portrayed women in history. By her own husband. She was Joaquín Sorolla wife. Also his muse, accountant, administrator and dealer. In her husband’s words, “my flesh, my life and my brain”. Clotilde was the love that strengthened Sorolla. And the longing that weakened him during his frequent absences from home. Clotilde Garcia del Castillo was the incarnation of “that great woman who is always behind a great man”. In other words, she had nothing in common with that lazy, ignorant and narrow minded middle-class woman reproached by Emilia Pardo Bazan. Clotilde had the greatness to grant to the art of painting the first place in the order of life of her husband. Her humility, when she referred to her physical appearance, contrasted with the spiritual and physical beauty she radiated in all the portraits her husband made of her. Clotilde as a mother, helping with homework, sewing, in the garden, on the beach, reading a book or newspaper … Clotilde nude, ordering some pieces of ceramics of Manises . As time went by, Sorolla’s brush never stopped to paint beloved Clotilde. Inalterably beautiful, in spite of the years. When Clotilde was 45 years old, Sorolla finished the best portrait of her: Clotilde sitting on a sofa. This marvelous portrait shows mutual tenderness, affection and complicity. Between the muse and the painter. Kind of mature love that a matrimony reach after 22 years of marriage. Clotilde sits relaxed on a sofa. She crosses her hands in a slight gesture of patience and docility. Her gaze sends a direct message to Sorolla. Only he can fully understand it. Clotilde’s lips outline a slight smile. Sorolla’s famous luminous white color shines in Clotilde’s dress. Her skin is pink. Like the pink used by Velázquez, Goya, Fortuny, Rosales and, of course, Sorolla. Clotilde‘s curly hair stands out in her youthful hairstyle. Yellow, green and sky-blue colors scatter on the sofa. Background and floor are if burgundy red. Sorolla paints Clotilde with his loose, diagonal brush-stroke which enchanted his admirers. ( And made Valle Inclan sick. In fact, Joaquin Sorolla awakened in life strong passions and furious criticisms. ) Sorolla would have painted Clotilde standing. Dressed up in one of his elegant double breasted suits. Clotilde, affectionately crosses her legs in the direction of her husband. Her feet sheathed in satin shoes. The day’s posing session is almost over. Soon will Clotilde shed the white dress that Sorolla bought her especially for this portrait. She will take off her satin shoes and immerse herself in her husband’s warm arms. The fingers of the clock will stop during the embrace of these two eternal lovers. Sofia Kovalévskaya, Emilia Pardo Bazán, Clotilde García del Castillo had a common denominator. The first two, distinguished feminist fighters. The third one, a mother and housewife, constrained to play the role that society had assigned to women. Without Professor Carl Weirstrass mediation, Sofia Kovalévskaya, would have not been appointed professor at Stockholm University. Without the long and loyal relationship with Benito Pérez Galdós, dona Emilia would have been unable to please her explosive sexual voracity and tireless literary imagination. Without Sorolla and Clotilde, it would be hard for us to find such a perfect model of love between artist and wife. Zuloaga, Sorolla and Romero de Torres represented in isolated works of undeniable sociological value, 3 vertices of the feminine condition between the 19th and 20th centuries: the victim, the new woman and the ideal wife. A topic for a future blog will be how artists like Rosler, Piper, Wilson, Denes and others, focus 21st century feminism. madrid museum tours 3 best museums in Madrid you should visit + one = three All Madrid Tours → Prado Museum Tours → Museums and Palaces Tours → Madrid Walking Tours → Madrid Private Car Tours → Private Cars Tours Outside Madrid → Special Private Tours → All Madrid 1 day → Prado Museum and Toledo Tour → Legal Advice → Privacy Policy → Cookies Policy → Web Map info@madridmuseumtours.com © 2018 Madrid Museum Tours.
cc/2020-05/en_middle_0016.json.gz/line4746
__label__cc
0.718375
0.281625
Magical DIStractions Lifestyle & Family Travel Blog Disney Travel Tips DIStracted Disney Tips Disney Acronyms & Abbreviations Walt Disney World Restaurants WDW Phone Numbers Disneyland & Disney’s California Adventure Dining Aulani Disney Resort & Spa Disney Beach Resorts Universal Studios Orlando Restaurants All-Inclusive Travel Disney Quotes You are here: Home / Disney / Disney Beach Resorts / Disney’s Vero Beach Resort – Shutters Brunch Review July 19, 2016 by Lisa Sealey Disney’s Vero Beach Resort – Shutters Brunch Review Welcome to the last article in my series about Disney’s Vero Beach Resort. The resort overview can be found here, the review of the 2-bedroom lockoff villa can be found here, and the Sea Turtle Night Walk experience can be found here. Since I am used to making Advanced Dining Reservations (ADR’s) at Walt Disney World Resort, when I learned about the Sunday brunch at Shutters, I went ahead and made a reservation. It turns out that the reservation wasn’t needed since we were there in June, which is not considered “season” at beach resorts in Florida. I learned that if one travels between October and April brunch reservations are necessary, but when we were there we were only one of three occupied tables in the Shutters restaurant area. The brunch buffet was actually set up in Sonya’s, which is adjacent to Shutters and accessed through a doorway at the back. There were only 2 or 3 tables occupied in there as well. The first area, right through the door, had the custom omelet and Mickey waffle stations. Yum! Photo by Lisa Sealey I moved on to the other area first, which was to the right of the Mickey waffle and omelet station in a small room at the back of the restaurant. There was an area with seafood and sushi that included peel-and-eat shrimp, california rolls, Margarita seafood salad, New Zealand mussels, and a smoked salmon plate with capers, red onion, and chopped egg. There was an assortment of cubed cheeses with a few different types of crackers and a couscous dish. There were two different salads available, a traditional Caesar and a white bean arugula. There were also two different kinds of deviled eggs (traditional and horseradish)! There was fresh fruit; grapefruit, oranges, strawberries, grapes, honeydew, canteloupe, and pineapple. There were also three heated silver serving trays that weren’t marked, but when I checked, one contained a fish dish, one had a chicken dish, and one had a pork dish. Unfortunately, I neglected to get pictures of the “kid” station, which had mini corn dogs and an absolutely delicious macaroni and cheese, or the “traditional” breakfast area that had bacon, eggs, and potatoes. I did, however, manage to get a picture of the dessert station! There were sugar cookies, chocolate chip cookies, brownie bites, chocolate cupcakes, strawberries and whipped cream, and there was warm apple crumble in the silver dish. There were two other kinds of cupcakes as well, but they weren’t marked and none of us tried them so I don’t know what kind they were. We enjoyed our brunch at Shutters. There were enough offerings to please everyone, and the food was very good. The restaurant was quiet and we weren’t rushed at all. It was a very pleasant and relaxing experience. I would definitely do it again. Have you had brunch at Shutters? What was your experience? Come by the Magical DIStractions Facebook group and let me know! Magical DIStractions can also be found on Twitter, Instagram, Pinterest and Google+ so please take a moment to follow us. You can also sign up for the Magical DIStractions newsletter and watch videos on our YouTube channel. We will keep you up-to-date on all of the latest news! Disney’s Vero Beach Resort : A Relaxing Disney Experience (Part 2) Disney’s Vero Beach Resort – An Overview Disney’s Vero Beach Resort – Review of 2-Bedroom Lockoff Villa Disney’s Vero Beach Resort : A Relaxing Disney Experience (Pt. 1) Sea Turtle Night Walk at Disney’s Vero Beach Resort The BOATHOUSE Lunch Review – Sail in for Amazing Seafood! About Lisa Sealey Hi, I’m Lisa, and I’m slightly Disney-obsessed. Actually, my husband would say more than slightly, but that’s my story and I’m sticking to it! When not planning Disney vacations, I assume my non-Disney persona of a stay-at-home, sports, and Cub Scout mom who believes in magic and pixie dust and likes to read, sing, and attempt to do crafts. Caroline is the creator of Magical DIStractions and the owner of Magical Distractions Travel Co. You can read her travel articles here and at TravelingMom.com. She lives with her husband and two children on the Alabama Gulf Coast. LOOKING FOR A TRAVEL AGENT? Pretty Darn Cute Design
cc/2020-05/en_middle_0016.json.gz/line4748
__label__cc
0.58415
0.41585
Human Action by Ludwig von Mises [online] The Theory of Money and Credit by Ludwig von Mises [online] Denationalization of Money: The Argument Refined by F A Hayek [online, kindle ] The Age of Rand by Frederick Cookingham – how to live in a future age dominated by Randian or libertarian ideology, which the author explains how to reconcile together. What will be important to the people? How will the different ethical system change art, culture and business? Peppered with advice about how to bring about the atrophy and irrelevance of the State [kindle ]. The Beautiful Tree by James Tooley – The author is described as the world’s leading private school spotter. The schools he has found provide education on commercial terms to the worlds poorst communities. Atlas Shrugged by Ayn Rand – a mysterious “destroyer” leads a non-violent revolution against the collectivist political establishment and crony capitalism. An epic story of a dystopian near-future America told over 12 years and 1100 pages. The Moon is a Harsh Mistress by Robert A. Heinlein – an artificially intelligent computer and his cyborg repairman muddle through a violent rebellion against the harsh economic policies of Earth which threaten to starve the people of Luna within a decade. Speaker recommendations The speakers series at the Rose and Crown offers a range of libertarian perspectives. All the speakers have been well-read and some are authors themselves. The following list includes those books that have featured in the talks and books by the authors. Arguments for Liberty by Jan C Lester Escape from Leviathan: Libertarianism without Justificationism by Jan C Lester The Myth of the Closed Mind: Explaining Why and How People are Rational by Ray Scott Percival Paper Money Collapse by Detlev S. Schlichter
cc/2020-05/en_middle_0016.json.gz/line4757
__label__wiki
0.58676
0.58676
Matrix Capital Markets Group We're Known By The Work We Do. | Print | Follow us | Join our email list Capital Raises Downstream Energy Business Consulting Group Downstream Energy & Convenience Retail Managing Directors & Directors Vice Presidents & Associates Administration & Marketing Matrix Capital Markets Group Announces the Successful Sale of Aeriform Corporation RICHMOND, VA – September 11, 2006 – Matrix Capital Markets Group, Inc. announced today that it has successfully completed the sale of Aeriform Corporation, an industrial gas and welding supply distributor based in Houston, TX to Airgas, Inc., the largest US distributor of industrial, medical and specialty gases and related hardgoods. Aeriform currently has 29 locations throughout Texas, Louisiana, Oklahoma and Kansas, with a total of 240 employees and annual sales of approximately $65 million. About 58% of its revenue comes from gas & rent, with the balance from traditional welding hardgoods. Matrix served as the exclusive financial advisor to Aeriform on the transaction. “We are excited about joining Airgas through this transaction, which will offer great opportunities for our customers and our employees,” said Michael Stoddard, President and CEO of Aeriform. He added, “Airgas is not only acquiring an outstanding group of customers, but an exceptionally talented team of associates, who have worked very hard over the years to build the company it is today.” Airgas will integrate most of Aeriform’s operations into three of its regional companies: Airgas Southwest will integrate 14 sites in Texas, including locations near Houston, Victoria, El Paso, and Lubbock. Airgas Gulf States will integrate seven sites in southern Louisiana and east Texas. Airgas Mid South will integrate two sites in Kansas, and four sites in Oklahoma, and two locations in Shreveport, Louisiana. “We look forward to welcoming Aeriform associates, and to offering our new customers a broader product range to meet their gases, welding and safety product needs,” said Mike Molinini, Executive Vice President and Chief Operating Officer for Airgas. “It was a pleasure working with Mike Stoddard and the outstanding senior management team at Aeriform,” said Bill Weirich, Managing Director and Principal of Matrix, “This transaction is an excellent example of how a combination of industry expertise and a disciplined M&A process can deliver results that meet or exceed client expectations.” Mike Stoddard added, “Bill’s in depth understanding of our industry and the professional process conducted by Matrix were important factors in a successful transaction for all parties.” About Matrix Capital Markets Group Matrix Capital Markets Group, Inc. is an independent, advisory focused, privately-held investment bank headquartered in Richmond, VA. Since 1988, Matrix has provided merger & acquisition and financial advisory services for privately-held, private-equity owned and publicly traded companies. Our primary advisory services include company sales, asset divestitures, recapitalizations, management buyouts, capital raises of debt & equity, corporate recovery, fairness opinions and valuations. Matrix has served clients in a wide range of industries, including industrial manufacturing and distribution, building products, business services, consumer products, healthcare, lumber and petroleum marketing & distribution. For additional information, please visit www.matrixcmg.com. Securities offered by Matrix Private Equities, Inc., an affiliate of Matrix Capital Markets Group, Inc., Member FINRA, SIPC. Richmond, VA HEADQUARTERS Two James Center 1021 East Cary Street Baltimore, MD 400 East Pratt Street Chicago, IL 200 S. Wacker Drive Dallas, TX One Arts Plaza 1722 Routh Street Securities offered by MCMG Capital Advisors, Inc., an affiliate of Matrix Capital Markets Group, Inc., Member FINRA & SIPC © 2020 Matrix Capital Markets Group, Inc. - All rights reserved
cc/2020-05/en_middle_0016.json.gz/line4763
__label__wiki
0.562866
0.562866
It's Khloe Kardashian's birthday! As star turns 34, she's getting nothing but love from her family The year also put Khloe's emotional range to test, especially after news broke out that her boyfriend and baby daddy had cheated on her with multiple women while she was pregnant Updated On : 11:25 PST, Jun 27, 2018 Tags :Kris Jenner,Kim Kardashian Happy birthday, dearest Khloe! As the 'Keeping Up With The Kardashian' star turned 34-years-old on Wednesday, her family members, as per tradition, flocked on to social media in order to shower her with birthday wishes. The first wish for the birthday girl came from her mother, momager Kris Jenner. “Happy birthday to my bunny @khloekardashian!!” Jenner captioned a series of photographs that she posted on her Instagram page in honor of her daughter. “Beautiful, smart, kind and the strongest person I know, you amaze me every single day. You are truly an angel on earth, my beauty, and I am so proud of you. You bring laughter and love to everyone around you. You lift people up with your positivity and your passion.” “This year we celebrate you being a new mommy, and all the amazing blessings that brings,” she added. “To watch you with baby True brings me the greatest joy. I love you to the moon and back!! You deserve the world.” The first wish for the birthday girl came from her mother, momager Kris Jenner. (Source: Instagram) The next one to wish the Revenge Body star was sister Kim, who took to Twitter to share her birthday wishes with her little sister. "Happy Birthday to one of my favorite souls on this planet! @khloekardashian " is what she started her post with. The KKW Beauty star also added, "This year u have shown strength like none other. I admire you for always following your heart. I love seeing u as a mom & can’t wait for the years ahead. Let’s celebrate you today! I love you to infinity!" Happy Birthday to one of my favorite souls on this planet! @khloekardashian This year u have shown strength like none other. I admire you for always following your heart. I love seeing u as a mom & can’t wait for the years ahead. Let’s celebrate you today! I love you to infinity! pic.twitter.com/jKtjOhHbRB — Kim Kardashian West (@KimKardashian) June 27, 2018 Although the new mommy has been wished by her mother and sister Kim, she might just be still waiting to hear from her elder sister Kourtney, who is currently vacationing in Italy with her boyfriend Younes Bendjima. The couple is currently holidaying in Capri, and seem to be living the epitome of La Dolce Vita. This year has been a massive one for birthday girl Khloe, where she has seen a lot of ups and downs in her personal life. The reality TV star became pregnant for the first time after facing a lot of complications in the past, and in April this year, gave birth to a beautiful baby girl, True Thompson, with her boyfriend Tristan Thompson. The year also put Khloe's emotional range to test, especially after news broke out that her boyfriend and baby daddy had cheated on her with multiple women while she was already pregnant with their first child together. And although most people thought that the Kardashian sister would fly back to LA after her child was born, Khloe decided to stay back in Cleveland with her cheating beau, trying to make things right between the two. The reality TV star became pregnant after facing a lot of complications in the past, and in April this year, gave birth to a beautiful baby girl, True Thompson, with her boyfriend Tristan Thompson. (Source: Instagram) And even though her decision to stay back with Tristan did not go down too well with the rest of her family, the youngest Kardashian sister stuck to her guns and went on to put in all the groundwork for her relationship with the disgraced basketball player. Khloe's sister Kim, as well as her mother Kris, were quite open about their disappointment with the Cleveland Cavaliers star, and even spoke about it very publicly in the media. However, a source close to the KUWTK star revealed later that the family had finally come around to “respect her decision.” The year also put Khloe's emotional range to test, especially after news broke out that her boyfriend and baby daddy had cheated on her with multiple women while she was already pregnant with their first child together. (Source: Instagram) “Everyone knows Khloé plans on staying with Tristan, so things have been civil so far,” said the source. “They still have opinions about Tristan’s bad behavior, of course, but no one wants to upset Khloé.” And despite her mother and sister's reservations about their relationship's future, Khloé “doesn’t seem too concerned how they feel about Tristan.” “She still thinks she’s making the best choice for her and True,” said the source. “She doesn’t need her family’s approval and will keep doing her thing.” And even though her decision to stay back with Tristan did not go down too well with the rest of her family, the youngest Kardashian sister stuck to her guns and went on to put in all the groundwork for her relationship with the disgraced basketball player. (Source: Instagram)
cc/2020-05/en_middle_0016.json.gz/line4769
__label__wiki
0.729239
0.729239
You are here: Home / Hawaii Military Bases / NCTAMS PAC Navy Base In in Wahiawa, HI NCTAMS PAC Navy Base In in Wahiawa, HI DSN: 315-453-8750 NCTAMS PAC is responsible for all the communicational services and systems in the Pacific. The installation is run by the United States Navy, under Captain John L. MacMichael, Jr., but it supports all the operations led by the Department of Defense as well. The history of NCTAMS PAC began in Pearl Harbor, Hawaii. Back then, the Hawaiian king Kalakaua allowed the United States of America to build a huge coaling installation for the ships floating around in the Pacific area. The USA gained all the rights over the new construction, which was over at the end of the 19-th century, in 1888. A few years later, the Americans gained the rights for a radio station as well, which became fully active and operational in 1906. During World War I, the United States of America kept injecting more and more funds in the installation. The spring of 1915 brought in an allocation of almost half a million dollars. The authorities decided to build one of the most advanced and powerful radio stations in the world. The first message sent from this station occurred in 1916. It was nothing but a random message Captain Clerk sent to Washington to let the authorities know that the system works. According to his own words, it was a honor for him. The reply got back about half an hour later. Between the two world wars of the 20-th century, NCTAMS PAC didn’t experience a very encouraging ascension. In fact, the necessity of this radio system slowly lost its importance. Therefore, the authorities decided to pump more money and raised 12 transmitters right before World War II commenced. The United States of America joined World War II after the effective Japanese attacks over Pearl Harbor. The attacks occurred on December, 7-th, 1941. The communicational systems were extremely vulnerable, so they were later moved to a new location that was just raised in the immediate proximity. It took the authorities ten days to fully transfer all the equipments and operations. After World War II, NCTAMS PAC was relocated back to Pearl Harbor. About a decade later, the officials figured out that Pearl Harbor was not large enough to permit the continuous expansion of the center, therefore some parts of it were moved around the area, wherever some empty space was available. The current name of the installation was given on October, 20-th, 1997. The major importance of NCTAMS PAC for the United States Navy recommended some high quality facilities for a good experience on site. The troops feel like home with the diversified dining facilities, the recreational activities that imply swimming pools, fitness clubs, gyms and jacuzzi, not to mention about the bowling center. The mini mart stores on site provide great shopping opportunities for the fans, plus you can find anything you might need. The picnic spots, parks and basketball courts are excellent if you like sports, while the kids can always kill their time on some of the few skating parks and playgrounds in the area. All in all, NCTAMS PAC is definitely a great place to stay at. Photos of NCTAMS PAC Navy Base In in Wahiawa, HI Nearby Schools to NCTAMS PAC Navy Base In in Wahiawa, HI Pearl Harbor Kai Elementary School Honolulu, 1.4 miles away. 538 enrolled in this public school. Grades range PK-6 & ungraded. (808) 421-4245 Visit School Website Lt Col Horrace Meek Hickam Elementary School Honolulu, 1.44 miles away. Navy Hale Keiki School 206 enrolled in this private school. Grades range PK-3. Mokulele Elementary School Makalapa Elementary School Nearby Hotels to NCTAMS PAC Navy Base In in Wahiawa, HI Harbor Arms Apartment Hotel Hampton Inn & Suites Oahu/Kapolei Harbor Shores Apartment Hotel Best Western The Plaza Hotel Hale Ali'i Navy Gateway Nearby Car Rental Agencies to NCTAMS PAC Navy Base In in Wahiawa, HI Discount Hawaii Car Rental Lucky Owl Car Rental Nearby Restaurants to NCTAMS PAC Navy Base In in Wahiawa, HI Button Up Cafe Kehau's Kitchen Mangiamo By 604 Poke On Da Run
cc/2020-05/en_middle_0016.json.gz/line4779
__label__cc
0.678836
0.321164
Agendas November 20 thru December 31 April 2, 2013 SPECIAL MEETING August 1, 2013 (Thursday) December 6, 2013 FRIDAY SPECIAL MEETING December 30, 2013 (End of Year Meeting) January 9, 2014 (Special Meeting) January 13, 2014 (Special Meeting) December 29, 2014 (End of Year) December 31, 2014 (Special Meeting) April 14, 2015 (Equalization) July 28, 2015 Planning Committee April 12, 2016 EQUALIZATION April 11, 2017 - Begin Equalization June 1, 2017 - Special Meeting August 2, 2017 - SPECIAL MEETING March 6, 2018 (Postponed until Mar. 7) March 22, 2018 (Board of Adjustments) Thursday, December 27, 2018 (December 28th if weather causes postponement) Special Meeting - February 8, 2019 Special Meeting - February 12, 2019 April 9, 2019 (Equalization) October 21, 2019 (Special Meeting) November 28 & 29 2012 April 2, 2013 (Special Meeting) April 29, 2013 (Special Meeting) December 6, 2013 -Special Meeting December 30, 2013 - End of Year Meeting July 28, 2015 (Planning Commission Meeting) April 11, 2017-Equalization Minutes June 1, 2017 (Special Meeting) August 2, 2017-SPECIAL SESSION February 8, 2019 (Special Meeting) February 12, 2019 (Special Meeting) Building/Grounds Maintenance Pandemic Planning Extension/4-H/Youth Sheriff/Dispatch Township Officers Surplus Items for Sale Home > Commission > Meeting Minutes > 2019 Meeting Minutes > July 16, 2019 The Miner County Board of Commissioners met in regular session July 16, 2019 in the Miner County Courthouse. Members present: Roger Wentland, Garrett Gassman, Tom Reisch, Voni Durant and Alex Protsch. Absent: none. Chairman Wentland called the meeting to order. The Pledge of Allegiance was recited. Motion by Protsch, seconded by Durant and carried to approve the agenda as amended. The minutes of the July 2nd meeting were approved with the correction of Cora Schwader’s title from 911 Coordinator to 911 Director. No one appeared for Public Comment. It was moved by Durant, seconded by Gassman and carried to approve the following claims for payment: Alliance $150.00, Century Link $106.83, Santel $55.12 911 CHARGES; ICAP $654.33 COMMUNITY ACTION PAYMENT; SD Dept. of Transportation $2,958.83 CONTRACTED MAINTENANCE; Miner Co Treasurer $13.50 DOMESTIC ABUSE ADMINISTRATIVE EXPENSE; Domestic Violence Network $60.75, Mitchell Area Safehouse $60.75 DOMESTIC ABUSE PAY TO OTHERS; Central Electric Coop $62.64, Xcel Energy $11.11 ELECTRICITY; Microfilm Imaging Systems $710.00 EQUIPMENT; Don Eppe $100.00, HFCA $17,242.09, Sturdevant’s $50.63, Wingen’s Garage $1,683.45 FUEL; Thomson Reuters $819.78 LAW BOOKS; Dean Schaefer Court Reporting $60.00 MENTAL ILLNESS HEARING EXPENSE; Nick Kramer $750.00 MOWING; Davison Co Jail $95.00, Lake Co Sheriff’s Office $300.00 PRISONER CARE; Office Ally $35.00 PROCESSING FEE; Miner County Pioneer $167.48 PUBLISHING; Aramark $308.07, Microfilm Imaging $290.00 RENT; Al’s Service $66.43, Butler Machinery $1,134.50, Howard Auto Clinic $87.50, HFCA $51.31, James Valley Landscape $262.55, Lake County International $865.42, Marshall & Swift $1,879.95, Office Peeps $151.27, S&S Contracting $8,078.32, Sturdevant’s $36.45, Two Way Solutions $4,331.02, Ultra $9,935.00 REPAIRS; Spencer Quarries $1,935.37, True North Steel $7,736.08 ROAD MATERIALS; Greg Protsch $900.00 STATE’S ATTY OFFICE EXPENSE ALLOWANCE; Beadle Co Auditor $1,144.00 STATE’S ATTY VICTIMS ADVOCATE; Lexis Nexis $149.00 SUBSCRIPTIONS; Boyer Trucks $618.75, Butler Machinery $1,643.02, C&R Supply $103.59, Diamond Mowers $816.74, Diesel Machinery $339.20, Dust-Tex Service $130.88, Homestead Building Supply $26.28, HFCA $14,579.18, McLeod’s Printing $169.90, Office Peeps $1,266.70, Quill Corporation $85.95, Rusty’s $168.33, Cora Schwader $103.80, Scull Studios $30.00, Sturdevant’s $614.80, Thomson Reuters $952.90, Tom’s Hardware $151.47, Ultra $24.00 SUPPLIES; Colleen Arens $30.00, Mike Clary $30.00, Rob Eggert $30.00, Verizon $75.89, Ethan Weisz $30.00 TELEPHONE; Cardmember Services $268.00, Voni Durant $33.60, Garrett Gassman $17.64, The Lodge at Deadwood $1,272.00, Brittany Yanish $385.82 TRAVEL; $680.00 JUDICIAL JURIES; $139.44 JUDICIAL TRAVEL. It was moved by Reisch, and seconded by Gassman to adopt the following resolution. RESOLUTION 19-16 WHEREAS, insufficient appropriation was made in the 2019 budget for the following department to discharge just obligation of said appropriation; and WHEREAS, SDCL 7-21-32.2 provides that transfers may be made by resolution of the board from the contingency appropriation established pursuant to SDCL 7-21-6.1 to other appropriations; THEREFORE, BE IT RESOLVED that the appropriation be transferred from contingency to Domestic Abuse Fund $135.00. Voting aye: Protsch, Reisch, Gassman, Durant and Wentland. Voting nay: none. Resolution approved this 16th day of July 2019. Roger Wentland, Chairman Miner County Board of Commissioners Attest: Susan Connor, Miner County Auditor It was moved by Protsch, seconded by Durant and carried to declare surplus and authorize disposal of three Samsung air conditioner units. Sheriff Robert Eggert made a request for a pay increase for Deputy Sheriff Mike Clary. The request was denied by the board. It was moved by Gassman, seconded by Durant and carried to allow Miner County departments who qualify to receive cell phone and data service from FirstNet. Only first responders, law enforcement and emergency management qualify for this service. The board recessed as a board of commissioners. The board reconvened as a board of adjustments. Chairman of the board, Alex Protsch, called the meeting to order. A hearing was held as advertised to consider granting a variance from the zoning ordinance to Landon & Kaitlyn Lee to construct a building closer to adjoining property lot lines than zoning allows, in the parcel described as Lots 3-4 & S2NW4 of Section 2, T107N, R56W, Adams Township, Miner County, South Dakota. Those present for the meeting included zoning board members, Landon Lee and Director of Equalization Deputy Darcy Albert. Lee explained his request for placing the proposed building closer than the required 30’. To meet that requirement, Lee would need to remove trees or place it on the other side of the trees which would cause snow issues in the winter. No person appeared in opposition to granting the variance. It was moved by Wentland and seconded by Gassman that the following findings be approved. STATE OF SOUTH DAKOTA) BEFORE THE MINER COUNTY : SS BOARD OF ADJUSTMENT COUNTY OF MINER ) IN THE MATTER OF THE APPLICATION OF ) ) FINDINGS LANDON AND KAITLYN LEE FOR A VARIANCE ) That the applicants, Landon & Kaitlyn Lee, have made an application for a variance to construct a building closer to adjoining property lot lines than zoning allows, in the parcel described as Lots 3-4 & S2NW4 of Section 2, T107N, R56W, Adams Township, Miner County, South Dakota and that they are the owners of record thereof. That the proposed use of said realty is specifically prohibited by the zoning ordinance without applicant first obtaining a variance, for which they have applied and paid the applicable fee. That upon said application, notice of hearing was given as required by the Miner County Zoning Ordinance by mailing to the adjoining landowners and by publication. That hearing upon said application was held on July 16, 2019, in the Commissioners’ Room of the Miner County Courthouse. That the applicant, Landon Lee appeared in person. That no person appeared in objection to granting the variance. That a presentation in support of said variance and testimony on behalf of said variance was received at the hearing and that no testimony opposing the granting of the variance was received at the hearing. NOW, THEREFORE, that application and testimony at the hearing all having been considered, it is the FINDING of the Miner County Board of Adjustment that the application of Landon & Kaitlyn Lee for a variance be approved to allow the variance for the following reasons with the condition: Lee must obtain written approval from Chrysti Protsch who is the adjoining landowner and file such letter with the Miner County Zoning Administrator. 1) That the Miner County Board of Adjustment is empowered under Section 506 to grant the variance and that the requirements of the zoning ordinance regarding a variance have been met by the applicant. 2) That the Miner County Board of Adjustment is able to make the applicable findings required by Section 506 of the ordinance, which are considered prerequisite to the granting of a variance. That the Board of Adjustment vote upon approval of such application was five in favor thereof and none opposed thereto. It is, therefore, ORDERED that said application be approved. Dated this 16th day of July, 2019. Alex Protsch, Chairman Miner County Board of Adjustment Attest: Susan Connor, Secretary The board adjourned as a Board of Adjustments and reconvened as a Board of Commissioners. Darcy Albert presented the following plat for consideration. It was moved by Gassman and seconded by Protsch to approved the following resolution. BE IT RESOLVED BY THE BOARD OF COUNTY COMMISSIONERS OF MINER COUNTY, SOUTH DAKOTA, that the plat representing Tract 2 of Torkelson’s Addition in the southeast quarter of the southeast quarter (SE ¼ SE ¼) of Section 5, Township 107 North, Range 56 West of the 5th P.M., Miner County, South Dakota be and the same is hereby approved. Voting aye: Gassman, Protsch, Reisch, Durant and Wentland. Voting nay: none. Resolution approved this 16th day of July, 2019. Highway Superintendent Ron Krempges met with the board to review patch asphalt progress, Mack truck repair issues, Clearwater/Shannon Colony road condition, and other highway issues. Krempges reported he is working on a schedule to complete placing mag water on the cemetery road (434th Ave.) which is a joint project with Miner County, Howard Township and Howard City. It was moved by Durant, seconded by Reisch and carried to enter into an extended warranty with Butler Cat on the 2013 motorgrader-24 month 2500 hours $16,900. The meeting was moved to the 3rd floor courtroom to discuss flooding issues at Lake Thompson. The following joined the meeting: Miner County State’s Attorney Greg Protsch, Miner County Emergency Manager Kent Terwilliger, Henden Township Supervisor John Schwader, Kingsbury Emergency Manager Cindy Bau, Kingsbury County Commissioner Shelly Nelson, Miner County Highway Superintendent Ron Krempges, Miner County Equalization, Planning & Zoning Deputy Darcy Albert, and Lake Thompson residents-Daniel Meints, Clint Martins, Gary Wiggins, & Lynn Meints. Chairman Roger Wentland asked the Lake Thompson residents to address the board. The residents stated that a study on the flooding had been completed and submitted by James E. Knight with assistance from Jay Gilbertson & Kevin Christenson of the East Dakota Water Development District. The study suggests there are areas that are blocked with vegetation and silt at the outlet located on private land in Belleview Twp. (A copy of the study was made available to those in attendance). They requested the outlet be cleaned to allow for additional water flow. State’s Attorney Protsch addressed this request by informing those in attendance that Miner County does not have authority to clean out the outlet as that outlet is on private property. Protsch also provided a copy of the email received the morning of this meeting from Mark D. Rath, Natural Resources Engineer of the Water Rights Program - DENR. The email quoted Findings of Fact, Conclusion of Law and Final Order (NGVD29 datum) #4: The email also stated “Following a review of Dr. Knight’s proposal and the Final Order of the Water Management Board by Water Rights staff and the Chief Engineer, it was determined any excavation of sediment and vegetation at the outlet area allowing the outlet area to pass more water would have an effect on the configuration of the outlet and state, level, and flow of Lake Thompson and waters of the state, and therefore the issue needs to be heard by the Water Management Board per their Final Order as adopted in 2013.” Miner County does not have the authority and cannot act on this request. The matter must be taken to the Water Management Board. The meeting relocated to the commission room on second floor. The board considered the quote from Dawson Construction to remove structures on county owned land located at 107 West Wilson, Howard, SD. It was moved by Durant, seconded by Protsch and carried to approve the quote ($9300) from Dawson Construction for removal & disposal of trees, house, shed, concrete & basement footings and fill material for the basement. It was moved by Protsch, seconded by Durant and carried to authorize the auditor to complete the application for 211 Helpline services for Miner County residents. Alaina Wellnitz presented the Victims Advocate Annual Report. Wellnitz is the coordinator of the Victim Witness program which is shared between 11 counties. She requested an $124 increase to the 2020 budget. The board approved the budget request. 911 Director Cora Schwader made the request to figure qualifications for SD Retirement benefit on an average basis. According to SDCL, “Permanent full-time employee”, any employee who has been placed in a permanent classification who is customarily employed by a participating unit for twenty hours or more a week and at least six months a year. The participating unit shall decide if an employee is a permanent full-time employee and that decision is conclusive. It was moved by Gassman, seconded by Durant and carried that as of August 1, 2019 Miner County shall determine a “Permanent full-time employee” based on an average of 20 hours per week for a 6 month period. Schwader also informed the commission that a dispatcher will be out for an extended period of time. She has contacted a previous employee who has agreed to fill in during that leave of absence. It was moved by Reisch, seconded by Gassman and carried to reinstate Sara Howe as a 911 dispatcher at level 4 (the level at which she left) $17.83/hour. The board briefly discussed the 2020 proposed budget. Further review will continue until adoption in September 2019. The meeting adjourned until August 6, 2019. Dated this 16th day of July, 2019. © 2020 Miner County, South Dakota. All rights reserved.
cc/2020-05/en_middle_0016.json.gz/line4783
__label__wiki
0.655913
0.655913
Правила за заштитните знаци This page is a translated version of the page Trademark policy and the translation is 1% complete. Acèh • ‎Afrikaans • ‎Bahasa Indonesia • ‎British English • ‎Deutsch • ‎English • ‎Esperanto • ‎Nederlands • ‎Soomaaliga • ‎Türkçe • ‎Zazaki • ‎brezhoneg • ‎català • ‎dansk • ‎español • ‎euskara • ‎français • ‎galego • ‎hrvatski • ‎italiano • ‎magyar • ‎occitan • ‎polski • ‎português • ‎português do Brasil • ‎română • ‎shqip • ‎suomi • ‎svenska • ‎čeština • ‎Ελληνικά • ‎български • ‎македонски • ‎русский • ‎српски / srpski • ‎українська • ‎עברית • ‎ئۇيغۇرچە • ‎اردو • ‎العربية • ‎مصرى • ‎پښتو • ‎हिन्दी • ‎বাংলা • ‎ਪੰਜਾਬੀ • ‎മലയാളം • ‎中文 • ‎中文(台灣)‎ • ‎日本語 • ‎한국어 The final Trademark policy is available on wikimediafoundation.org. The text on this page is only a draft and not an official version of the policy. The Wikimedia marks represent free educational content developed through an open and collaborative process. Trademark protection reinforces the connection between the Wikimedia marks and the projects they represent. The protection serves to ensure that the marks are only used for activities that promote our mission. When readers see the puzzle globe mark in the top left corner of a website that looks like Wikipedia, they should be confident that they are looking at neutral, notable, and high-quality content that is the result of the rigorous and transparent editing process on Wikipedia. Likewise, people should be able to rely on their impression of Wikimedia involvement when they see the Foundation mark or one of the Wikimedia logos on websites or products. The goodwill supporting the Wikimedia marks has been generated by a prolific and passionate volunteer community. The Wikimedia community has developed the leading online source of free educational content. To preserve the goodwill they have created, we have prepared this policy according to the community's direction. The resulting policy ensures that all uses of the marks are consistent with our mission and promote the Wikimedia movement. Our mission of sharing knowledge relies on and encourages free speech. To make it really easy to share knowledge, this trademark policy embraces all free-speech protections built into trademark law to the broadest extent possible. The trademark policy also seeks to minimize the hurdles of trademark licensing. We are particularly liberal in approving uses by the Wikimedia community that are closely aligned with our mission. To further make it easier for community members to use the marks, this policy introduces some creative trademark solutions. It allows community members to use the Wikimedia marks without a trademark license for Wikimedia community-focused events and outreach work. The policy further introduces a "Quick License" for other common uses that community members can quickly fill out and email to us. It's really wikiwiki! Read more about the purpose of our trademark policy here. 1 What does this policy apply to? 1.1 The "Wikimedia marks" This policy applies to all trademarks of the Wikimedia Foundation. The trademarks are both registered and unregistered trademarks, including non-stylized wordmarks and the trade dress of each Wikimedia site. See also a non-exhaustive list of our trademarks. In this policy, we refer to them as the "Wikimedia marks" or just "marks." 1.2 "Use" of the Wikimedia marks This Policy applies whenever you want to use the Wikimedia marks. Section 2 of this policy applies to all uses of the marks. Other sections apply only to uses that do not require separate permission, uses that require a trademark license, or uses under agreements held by chapters, thematic organizations, and user groups that are recognized by the Wikimedia Foundation. If some term in your trademark license is inconsistent with this policy, you should follow the license terms. 1.3 "We" or the "Wikimedia Foundation" This Policy regulates the use of marks held by the Wikimedia Foundation. Sometimes, this policy simply refers to the Wikimedia Foundation as "we." 1.4 "You" This Policy applies to "you" if you want to use the Wikimedia marks and explains how you may use them. You may be a Wikimedia community member, chapter, thematic organization, or user group. You may also be an unrelated individual or organization. 1.4.1 Community members The Wikimedia community includes everyone who contributes to a Wikimedia site in furtherance of our mission. It also includes members and staff of chapters, thematic organizations, user groups, and the Wikimedia Foundation. The members of the Wikimedia community share a common mission of creating and distributing free educational content. They are the core of the Wikimedia movement. Accordingly, community members may freely use the Wikimedia Community logo. They are also free to use all Wikimedia marks on the Wikimedia sites and for Wikimedia community-focused events, as well as outreach work without obtaining a trademark license. Community members can also easily fill out a Quick License for certain other community uses, such as Wikimedia photo events. We generally give priority to community requests for uses that require an ordinary trademark license. 1.4.2 Chapters, user groups, and thematic organizations Chapters, user groups, and thematic organizations recognized by Wikimedia Foundation are called "movement organizations". They are independent from the Wikimedia Foundation and support and promote the Wikimedia sites. These groups enter into agreements with the Wikimedia Foundation, which allow them to use certain Wikimedia marks. Any use should primarily further Wikimedia's mission. To use the marks beyond the specified scope of its agreement, an organization can ask for a separate trademark license or simply comply with this policy when the use does not require a license. An organization can, of course, always select its own names, logos, and domain names. It does not have to use our marks. 1.4.3 Other organizations or individuals Wikimedia sites are so well-known that authors and script writers frequently want to portray them in books and movies. Similarly, other companies may want to reuse content from Wikimedia sites in web or mobile applications. In doing so, these individuals and companies may want to display our marks in movies, books, apps, or other media. As long as users are not confused about the source of those works, this type of use can promote the Wikimedia sites and mission by expanding the reach of free knowledge and potentially recruiting new Wikimedia community members. But it is important that the Wikimedia marks are not misleadingly used to market others' products because that will confuse Wikimedia users. We therefore have to be careful when licensing the marks for these purposes. For example, when licensing the marks to an organization that has its own logo, we need to make sure that it does not display any Wikimedia mark more prominently than its own logo or name. It's helpful to always have a proper separation between the organization's name and logo and any Wikimedia mark. Users should clearly see that the organization's products or services are provided by that other organization rather than the Wikimedia Foundation. Such use is never allowed without a trademark license. 1.5 "Mission" The Wikimedia marks should be used only for activities that promote our mission, which is to "empower and engage people around the world to collect and develop educational content under a free license or in the public domain, and to disseminate it effectively and globally." 2 How to use the Wikimedia marks Please follow the Visual Identity Guidelines whenever you use the marks whether with or without a trademark license. Whenever you use the Wikimedia marks, please note the following: 2.1 Proper form You may use the wordmarks as a proper name (e.g., "Wikidata is great") or as an adjective (e.g., "the Wikimedia sites are awesome"). This includes any of the official translations and transliterations of the Wikimedia marks. On the Wikimedia sites, you may use the marks in any form. You may create remixes of the wordmarks and logos, abbreviate them, and add to them. Outside the Wikimedia sites, you may only use Wikimedia wordmarks in their full form and properly capitalized (e.g., "Wikibooks"). The logos should not be modified without separate permission from the Wikimedia Foundation. We need to make sure that the logos remain distinctive from other marks. 2.2 Notice or trademark symbol When reasonable, please include this notice when you use a mark outside the Wikimedia sites: "[Wikimedia Wordmark / name of logo as listed here] is a trademark of the Wikimedia Foundation and is used with the permission of the Wikimedia Foundation. We are not endorsed by or affiliated with the Wikimedia Foundation." The notice should appear near the first use of a Wikimedia mark. One notice is enough if you display multiple marks, provided the notice refers to all of them. You do not need to display this notice if you are using the Community logo under Section 3.4. If the mark will primarily appear on a mobile screen or another medium with limited visual space, you may instead use a trademark symbol (™) with the mark to show that it is a Wikimedia trademark. For size and location of the trademark symbol, please see the Visual Identity Guidelines. When you use a symbol due to limited space and there are additional pages to your material, please include the notice in the text of a prominent page (e.g., most mobile apps have an "about us" section and may display terms during installation). Regardless of whether you use a notice or a trademark symbol to identify your use of Wikimedia marks, please make sure that your use does not suggest endorsement by or affiliation with the Wikimedia Foundation. 3 When you may use the Wikimedia marks without asking us 3.1 Use of trademarks on the Wikimedia sites You may use and remix the Wikimedia marks on the Wikimedia sites as you please. 3.2 Community-focused events You may use the trademarks for events that promote our mission and are intended to be predominantly attended by Wikimedia community members. These are events like hackathons, editor meetups, photographer excursions, and WikiCons. For example, you can put the Wikipedia puzzle globe logo on banners and posters at an edit-a-thon you have organized. GLAM initiatives and photo contests require a Quick License under Section 4.1. This provision does not allow you to use the marks for fundraising. 3.3 Outreach and recruiting new contributors You may use the marks consistent with our mission to educate people about the Wikimedia sites and to recruit new contributors, as long as you make it clear that you do not work for the Wikimedia Foundation. You can create educational material or banners to decorate a public fair stand or to publicize an edit-a-thon. 3.4 Community logo use The Wikimedia Community logo can be used freely. But you may not file trademark applications incorporating the logo. The Wikimedia community wants to ensure that the logo remains available for all to use. 3.5 Discussing something other than Wikimedia sites (fair use) Wordmarks can sometimes have a primary meaning, in addition to representing a brand (like the words "apple" or "facebook"). Our wordmarks were not real words before our projects were created. But we will interpret fair use broadly to include the use of our wordmarks when you clearly mean to talk about something other than the Wikimedia sites. 3.6 Refer to Wikimedia sites (nominative use) You can use the non-stylized wordmarks (e.g., "Wikipedia") to describe: A Wikimedia site or another aspect of the Wikimedia movement in a text (e.g., "I love reading about coal balls on Wikipedia"). A derivative work of Wikimedia content in a way that is not misleading (e.g., "the encyclopedic content on this site is derived from Wikipedia"). You may use all Wikimedia marks on your own website as a hyperlink to the Wikimedia sites. The use of logos in hyperlinks should follow the Visual Identity Guidelines (e.g., the marks may be resized, but not modified in any other way). Here are some other specific cases of nominative use: 3.6.1 News reporting You may use the Wikimedia marks to make truthful statements about the Wikimedia sites in news reports and commentary. 3.6.2 Personal blogs and social media You may use the Wikimedia marks to make or illustrate truthful statements about the Wikimedia sites in personal blogs and social media. But please do not do it to imply endorsement by or affiliation with the Wikimedia Foundation. To avoid confusion, do not use the Wikimedia logos in the background, as your profile image, or in the header of your blog, in the name of your blog, or in your social media username. This section is not meant to restrict your use of the Community logo under Section 3.4. 3.6.3 Artistic, scientific, literary, political, and other non-commercial uses You can use the Wikimedia marks to discuss the Wikimedia sites in artistic, scientific, literary, and political works. But please send us a request if you want to place a Wikimedia mark on the cover of your book, display a Wikimedia mark in a movie, or organize an event or presentation that could be interpreted to be endorsed by the Wikimedia Foundation. For more information, please see Section 4. You may use the marks in satire or jokes. To avoid confusing users that your work is affiliated with the Wikimedia sites, it may be helpful to mark your work as "satire" or "parody." 3.7 Make your own branded stuff You may create things with the marks for your own use. These can be t-shirts, caps, desktop wallpapers, lanyards and even cakes! But please do not sell them, and make sure that your design follows the Visual Identity Guidelines. If you want to sell your branded stuff, you may request a license under Section 4.6. 4 Special uses that require permission All uses that are not allowed under Section 3 or prohibited by Section 5 of this policy require a trademark license. This section discusses only the most common uses that require a license. When you use our marks under a trademark license, you need to comply with its terms as well as with this trademark policy. If some term in your license is inconsistent with this policy, you should follow that license term. Movement organizations will only need a separate license when the use is not already authorized by their organizational agreements with the Wikimedia Foundation or this policy. 4.1 Quick License for special community uses A Quick License is a simple trademark license for common community uses, like Wiki Loves Monuments and GLAM-Wiki initiatives. It is available on Meta-Wiki. You can start using the marks as stated in the Quick License as soon as you email a filled-in Quick License to trademarks@wikimedia.org. There is no need to wait for approval. 4.1.1 Photo contests Photo contests allow people to submit freely licensed original photographs to Wikimedia Commons to compete for the best image. You can obtain a Quick License for flyers, posters, slide presentations, websites, and social media for a photo contest. If you are a movement organization, you may already have an agreement that covers photo contests. 4.1.2 GLAM-Wiki initiatives You may use the marks in a collaboration with someone outside of the Wikimedia movement with a Quick License. This license applies to collaborations with parks, museums, libraries, and other cultural institutions to share their information with the world through the Wikimedia sites. If you are a movement organization, you may already have an agreement that covers GLAM-Wiki initiatives. Some GLAM initiatives include Wikipedians in Residence – Wikipedia contributors who work with a specific GLAM to develop the organization's relationship with Wikipedia. Please use a Quick License to represent yourself as a Wikipedian in Residence on online professional profiles, your personal blog, and social media, as long as your work is consistent with the mission. 4.2 Domain names You need permission to register or use a domain name that contains a Wikimedia mark in it. Do not register a domain that looks or sounds similar to a Wikimedia mark or includes a misspelled Wikimedia mark, because that can confuse Wikimedia users. 4.3 Events and conferences You need a trademark license if you plan to host a public event or a conference that uses a Wikimedia mark. You should include the following information when requesting a license to use our marks in an event. What is the proposed title of the event? Who is hosting, sponsoring, or coordinating the event? Include contact information (and Wikimedia username if relevant) for the person organizing the event. Is the event organized for community members? What is the topic of the event? The location, date, and duration of the event. Include handouts, examples, mockups, or other descriptions of the proposed use. When you obtain a trademark license, it will apply only to the specific event in your request. You will need to apply for a new license if you want to host another event. 4.4 Publications You need a trademark license if you want to use a Wikimedia mark in a publication, unless your use qualifies as fair or nominative use under U.S. trademark law or other applicable foreign laws. You should include the following information when requesting a license to use our marks in a publication. What is the proposed title of the publication? Contact information (and Wikimedia username if relevant) for the applicant. Who is the author, editor, and publisher of the publication? For fiction, what is the storyline? How do you want to use and discuss the mark? Include screenshots of the pages in your publication that includes or discusses the mark. (For a book, where in the book will the mark appear?) If your publication will display a screenshot of a Wikimedia site, please include that as well. Will the publication be in hard copy, an e-book, or some other type of medium? What is the print run and distribution area for the publication? How many editions will it have? When you obtain a trademark license, it will only apply to the specific publication in your request. You will need to apply for a new license if you want to make another publication. 4.5 Movies & TV shows You need a trademark license to use the Wikipedia logo in a movie, TV show episode, or online production. You should include the following information when requesting a license to use our marks in a movie or TV show episode. What is the proposed title of the movie or TV show episode? The names of the screenwriter, director, producer, distributor, actors, and any interviewees (for documentaries). How will the Wikimedia mark be displayed or discussed? Include a screenshot of any Wikimedia site that you want to show. Include a script and any footage that has already been created. Unless discussed in the script, specify the location of the film and whether it will advertise a product in conjunction with the use of Wikimedia marks. Where, when, and how will the movie be distributed? How will it be advertised? Do you intend to display the Wikimedia marks on the advertisement? When you obtain a trademark license, it will only apply to the specific film, TV show episode, or online production in your request. You will need to apply for a new license if you want to shoot another film or TV show episode. 4.6 Commercial merchandise You may make merchandise with the Wikimedia trademarks for commercial use, if: You obtain a trademark license from the Wikimedia Foundation; You follow our Visual Identity Guidelines; and You truthfully advertise to customers how much of the selling price, if any, will be donated to Wikimedia sites. 5 Prohibited uses 5.1. Misleading mirrors and mimicking sites Please do not create a website that mimics the "look and feel" of a Wikimedia site. This especially applies to imitated Wikipedia articles. If you have a good reason to create a mimicking site, please contact us at trademarks@wikimedia.org. You do not need to contact us if you just want to use the MediaWiki software to create a wiki or if your mimicking site is clearly a parody. If you create a mirror, make sure to comply with the relevant licenses for the content. Avoid copying links to Wikimedia policies and contact details. Please do not use the Wikimedia marks in a mirror of a Wikimedia site. 5.2 Linking to non-Wikimedia sites You may use Wikimedia marks to link to Wikimedia sites only. Please refer to Links to Wikimedia sites if you want to link to a Wikimedia site from your website. 5.3 Misrepresentation When you use a Wikimedia mark under this policy, please use it to represent only the project for which it stands. Please do not create the impression that your use is in any way endorsed, sponsored by, or is part of the Wikimedia Foundation. This section also applies when you are granted a license to use a mark that doesn't permit you to suggest such an endorsement. 6 Trademark Misuse 6.1 Reporting misuse Fighting trademark misuse is very important. We put a lot of effort into going after cases of trademark infringement because we want to protect the valuable trademark rights the community has created. If you see a mark being used in any way that could be infringing, please tell us! Just send an email to legal-tm-vio@wikimedia.org or report it here. We really appreciate your help! 6.2 Revoking permission for misuses We may revoke the right to use the Wikimedia marks under this policy at any time by providing notice in any manner if we determine that a trademark use is inconsistent with our mission or could harm community members, movement organizations, or the Wikimedia Foundation. 7 Revision and Translation of the trademark policy 7.1 This trademark policy can be revised as follows: We will propose major changes to the community in three languages selected by us. We will give notice of the proposed revision on the Wikimedia sites and in an email to WikimediaAnnounce-L or a similar mailing list. The community can then comment for at least 30 days. For minor changes or changes required by law, when possible we will provide three days' notice to WikimediaAnnounce-L or a similar mailing list. Minor changes include language fixes, administrative changes, or corrections of inaccurate statements. This section does not apply to the user-friendly summary, the FAQs, the purpose statement for the trademark policy, the trademark request form, and the violation reporting form. They are not part of this trademark policy and can always be revised without notice. 7.2 Translation of the trademark policy If there are any differences in meaning between the original English version of this trademark policy and a translation, you should follow the original English version. Please do not hesitate to contact us at trademarks@wikimedia.org if you are not sure whether your use is in compliance with this policy or local trademark laws. The purpose of our trademark policy This statement isn’t a part of the trademark policy. It’s not even a legal document. It simply explains the background for our new trademark policy. The Wikimedia marks represent the goodwill created by the many volunteers that make up the Wikimedia community. That is why internet users can trust that sites bearing Wikimedia marks contain free and neutral educational content developed by committed Wikimedians through good faith collaboration. Ensuring that the Wikimedia marks are only used consistently with our mission helps protect the community’s hard work and the reputation of the Wikimedia sites. 1. The trademark policy balances two community interests. The decentralized nature of the Wikimedia sites allows passionate contributors all over the globe to serve the mission of free knowledge. The first interest is therefore to ensure that contributors can easily use the Wikimedia marks in their work. The second interest is to protect the reputation of the Wikimedia marks. The marks signify educational content generated through an open and collaborative process. The reputation of the marks is particularly important given that the content that they represent is delivered digitally over the internet and could easily be misrepresented to the unwary user. In order to serve the Wikimedia community interests, we need to apply trademark law creatively. The principles of trademark law were not developed with our unique organizational model in mind. But our goal is to make trademark protection work smoothly for our community. The trademark policy therefore respects the demands of trademark law while facilitating the use of the marks by the Wikimedia community. 2. Why use trademarks? Trademarks allow a user to trust her or his intuition that a mark she or he recognizes will in fact lead her or him to the work that she or he is seeking. Trademark protection is not an intellectual property right that can be established or sold separately from the work that it represents. It is nowhere near as restrictive as copyright or patent protection. Those doctrines have demanded that we adopt open license approaches—such as Creative Commons and GNU GPL—to make the law better serve our mission. There is no equivalent open trademark license that we can adopt. Yet the unique contours of trademark law allow us to creatively make it work in our favor. It allows liberal re-use of Wikimedia content, while preserving the integrity of the Wikimedia sites. Because of our distinct trademarks, readers will instantly know which educational material has been created in the wiki way by our community. 2.1 How trademark rights protect against misuse. Trademark rights help safeguard the marks that represent the Wikimedia movement from misuse. People may use the marks misleadingly because of the popularity of the Wikimedia sites. Some try to make their own websites or services more appealing by using our marks. Others misappropriate the marks or the general appearance of the Wikimedia sites to attract attention. But that attention is misguided because the marks are used to pass off work that is not genuine Wikimedia content. If we were to permit this, users may mistakenly believe that this inferior content was produced by the Wikimedia community and their opinion of the Wikimedia sites would dwindle. For example, nobody likes to see sham Wikipedia articles created solely to promote companies in a way that is inconsistent with our mission. Similarly, cybersquatters often try to register common misspellings and variations of the Wikimedia marks in domain names. They do so to redirect users looking for the Wikimedia sites to advertising and other unrelated content. They can, for example, lead users to sites designed to spread malware by encouraging them to click on a pop-up ad stating, "Congratulations! You are the millionth visitor!" They can also expose users to phishing scams by asking them to enter their password on a page that looks like a Wikimedia site. These are all examples of misuses that we can fight using trademark rights. We need to retain the right to pursue these kind of misuses to protect the hard work of the Wikimedia community. 2.2 The importance of free speech in the trademark doctrine ensures that the Wikimedia trademarks do not interfere with free knowledge. Our mission of sharing knowledge relies on and encourages free speech. Trademark protection can exist in this ecosystem, as the doctrine leaves a lot of room for speech-related activities. For instance, the unique fair use doctrine under trademark law allows any use of a wordmark in a non-trademark sense (i.e. when the word could mean something other than the trademark). Trademark law also has a "nominative use" doctrine. This doctrine allows free uses of a mark to refer to the item branded with that name. Finally, trademark law also embraces use of marks in art and political speech. This spectrum of free uses of a trademark distinguishes this body of law from intellectual property rights like copyright and patent. By employing trademark protection over the Wikimedia marks, we do not impede these types of uses by anyone. Our liberal approval of trademark requests will further ensure that community members can easily use the Wikimedia marks to promote the mission, even for non-fair use purposes. 3. How we maintain our trademark rights. To preserve the Wikimedia trademarks for the movement, we need to monitor for misuses and carefully license the marks. Misleading uses can weaken the connection between a mark and the goodwill that it represents, potentially resulting in loss of trademark rights. It could cause us to lose our ability to protect against other misleading or abusive uses. This is why it is important to keep track of the uses of the Wikimedia marks and to take action against misleading uses. Similarly, trademark law requires trademark holders to monitor the quality of the work that is allowed to carry the trademarks under a license. Failure to control the quality through a license and monitoring can result in "naked licensing," causing a trademark holder to lose its rights. It is therefore important to require a level of quality that reflects a quality of the Wikimedia sites and reputation. 4. Facilitating trademark uses that promote the Wikimedia mission. While we have certain legal obligations, we don’t want trademark requirements to be an obstacle for the work of the Wikimedia community. The trademark policy seeks to facilitate the ease of licensing Wikimedia marks. Many uses are also specifically permitted by the trademark policy and don’t require separate permission. Other uses fall under the many fair use categories, which we also outline for users in the policy. We are also thinking creatively about how we can make it easier for community members to use the marks to further the Wikimedia mission. To that end, we have introduced a liberal solution in the trademark policy for particular uses of Wikimedia marks called the "Quick License." It is a Quick License because instead of requesting a license and waiting for it to be prepared, community members just need to fill it out and email it to trademarks@wikimedia.org. While the Quick License makes trademark use easier for common community uses, it includes some measures to maintain trademark protection of the Wikimedia marks. The license includes a quality control requirement and a reservation of a right to terminate the license if a mark is used in a way that is inconsistent with the Wikimedia mission. 5. What else is new? Other than introducing a number of liberal solutions to assist community members in their work, the new trademark policy has very few substantive changes. We have focused on clarifying our trademark policy and practice as much as possible to make the use of the marks easier. Community members provided a lot of comments about trademark provisions that were previously ambiguous. We have worked to clarify those and other provisions in the new trademark policy and FAQs. We want the policy to be easily navigated and understood. We have therefore introduced a user-friendly summary at the beginning of the trademark policy that links to relevant provisions of the policy. We have also significantly expanded the FAQs and interlinked them with relevant provisions in the policy. The language of the policy and the FAQs was further tested under various readability indices to make sure that we wrote them in a straightforward way. Finally, we have introduced forms for requesting trademark licenses and reporting misuses that we hope will make those two processes smoother. Back to trademark policy. These FAQs are not part of the trademark policy. They are not even a legal document. But we hope that you find them helpful.:) 0 Trademark policy Introduction 0.1 What is "trademark protection"? Trademark law protects the association between a mark and the work, such as goods or services, that it represents. It's intended to protect users from confusion as to the source of certain work. Also, users who see a trademark rely on that association and will have expectations about the reputation and level of quality and level of service comparable to what they have come to expect from the other work provided under the marks. Therefore, trademarks are very powerful and valuable tools that embody the Wikimedia Foundation and its community members' reputation and serve as a "shorthand" way for users to recognize a work, product, or service. 0.2 What are the "Wikimedia sites"? The Wikimedia Foundation runs several free software and free content sites, some of which are listed here: Our projects. 1.1 What is a "wordmark"? It's a trademark that is a text-only word (like "Wikipedia" or "Wikimedia") that is used in connection with the work that it represents to identify the source. In addition, a wordmark includes all official translated and transliterated marks (e.g. "Vikipedi"). 1.2 What is a "non-stylized wordmark"? Non-stylized wordmarks are simply words like "Wikimedia" and the project names, like "Wikipedia," "Wiktionary," and so on. In comparison, the stylized wordmarks are these names in their special formats, such as with certain fonts. For example, the special format for the "Wikipedia" wordmark looks like this: . Both stylized and non-stylized wordmarks are trademarks of the Wikimedia Foundation. 1.3 What is "trade dress"? For our purposes, trade dress is the design of a website or article that identifies the source of the website or online material. Think of it as the "look and feel" of a site. One example is the specific design and appearance of a Wikipedia article, or the Wikipedia main page. The trade dress of any Wikimedia site is also a trademark of the Wikimedia Foundation. Trademark laws also protect trade dress. Back to The "Wikimedia marks." 1.4 Who is a "community member"? Everyone who contributes to a Wikimedia site. It also includes staff and members of chapters, thematic organizations, user groups, and the Wikimedia Foundation. Back to Community members 1.5 Why can't a movement organization just freely use the trademarks? As the legal holder of the trademarks, we need to control their use to preserve the trademark protections for the community. You can read more about that here. 1.6 What is the relationship between this trademark policy and a chapter, user group, or thematic organization agreement? Chapters, user groups, and thematic organizations must comply both with this trademark policy and their respective agreement with the Wikimedia Foundation. If there are inconsistencies between this trademark policy and a chapter, user group, or a thematic organization agreement, the organization should follow their agreement. Back to Chapters, User Groups and Thematic Organizations 2.1 Can my logo, name, or company name be smaller than the Wikimedia mark if it is really obvious that my products and services are not offered by the Wikimedia Foundation? No. We need to make sure it is extremely clear that the Wikimedia Foundation is not providing your products or services. This is a simple, consistent way of doing that. 2.2 What if I clearly state that the products or services are provided by me? Sorry, your logo, name, or company name must still be bigger than any Wikimedia marks and reasonably separated from Wikimedia's marks. People do not always read the fine print (shocking, I know!). So, we need to make it as clear as possible that your products or services are not provided by the Wikimedia Foundation. 2.3 What do you mean by "outside the Wikimedia sites"? Uses of the trademarks that are not on the Wikimedia sites, such as Wikipedia, Wikimedia Commons, Wiktionary, Wikidata, Wikiquote, Wikibooks, Wikisource, Wikispecies, Wikinews, Wikiversity, Wikivoyage, or Wikimedia Meta-Wiki. For the purposes of this trademark policy, the use of trademarks on Wikimedia Cloud VPS will be considered a Wikimedia site. Accordingly, you use the marks outside the sites when you place them on flyers for an edit-a-thon. 2.4 Can I still create terms that combine Wikimedia trademarks with other words like "Wikipedian in Residence"? Yes. This provision is not meant to stop community members from creatively combining the marks with other words to create new terms for the Wikimedia movement as long as they do it on the Wikimedia sites. 2.5 Can I translate the text in the marks? You may translate the text in the marks on the Wikimedia sites. 2.6 Can I add graphic elements to, for example, celebrate a special event? You can create remixes for special on-site purposes, but please don't change the logos outside our sites. These and many, many other questions are answered in the Visual Identity Guidelines. 2.7 What types of remixes of Wikimedia logos may be used outside of Wikimedia sites? Certain remixes of Wikimedia logos may be used outside of Wikimedia sites as long as the remix does not look too similar to any of the Wikimedia marks. Please make sure that the remix will not be confused with the original Wikimedia logo. 2.8 May I use high-resolution versions of the logos? Yes! Here you go. 2.9 Where do I place a trademark notice? Just treat the notice as a footnote. A person reading your document, looking at your website, or watching your film should be able to easily find the notice. Good examples are: at the end of the (same) page of a document, in the imprint of a book, at the bottom of a webpage, and in the credits of a video. 2.10 What if I do not have enough space to include a notice? Don't worry! If the mark is going to be seen on a mobile or other medium with little space, you can simply use the trademark symbol (™) for any Wikimedia trademark you use. 2.11 How should I refer to the trademark in the notice? Wordmarks can be referenced verbatim (i.e. "Wikimedia Commons"). Logos should be described according to the Visual Identity Guidelines. Examples include the "Wikipedia Puzzle Globe" and the "'W' icon." 2.12 What if I use more than one trademark? Make sure to describe all the trademarks in the notice, like this: "The Wikidata wordmark and logo are the trademarks of the Wikimedia Foundation." 2.13 When do I have to use the trademark symbol? You only need to use the trademark symbol when you do not have enough space to write the entire notice, like when you are using a trademark on a mobile screen. 2.14 Can you give some examples of how to use the trademark symbol? "Wikimedia Commons™ is one of the wonderful Wikimedia projects our community has developed to make media files, such as images, sounds, and video clips, publicly available to everyone!" 2.15 What size does the symbol have to be? When you use a wordmark (like "Wikipedia"), you should use the same font size for the trademark symbol as the wordmark itself. In this context, superscript formatting is encouraged for the symbol. When the mark is an image (like the puzzle globe), you should select a font size for the symbol that matches the size of the image and place the symbol so that it is clearly visible and close enough to the upper right corner of the image without touching it. 2.16 But I want my website to look really pretty! Can I make the symbol smaller or put it somewhere else? Unfortunately, no. Remember, you only need to put the symbol next to the first or most prominent use of the mark. Back to Notice or Trademark Symbol 2.17 What does "no endorsement by or affiliation with the Wikimedia Foundation" mean? You need to make sure that people do not mistakenly think that you may speak on behalf of the Wikimedia Foundation or one of its sites. For instance, you need to make sure that no one thinks you work for the Wikimedia Foundation. 3 Using the Wikimedia Marks without asking permission 3.1 Can you give me some examples of when I can use the marks on the Wikimedia sites? You may use the marks on user pages, help pages, and pages about Wikimedia or the Wikimedia projects. You can also use the marks in a mailing list, on IRC, or to name a tool on the Wikimedia sites. The sky is the limit, as long as the use is related to a site, promotes the mission, and complies with the Terms of Use. Back to Use of trademarks on the Wikimedia sites 3.2 What events are not "community-focused"? An event that includes mostly people who are not community members is not a community-focused event. (Please see the FAQ on events in general.) This does not mean that you cannot have guests at your meetup! 3.3 Can you give me some examples of community-focused events? Community-focused events are those events that are primarily open to community members and promote the mission. They tend to be related to improving the overall quality of the Wikimedia sites. Examples include conferences and monthly meetups hosted by community members, as well as other specific events like the "London Wikipedians regular's table," Wiki-Conference in Russia, and Wikipedia Workshop Köln (DE). Back to Community-focused events 3.4 If my event is community-focused, which marks can I use? First, all Wikimedia community-focused events can bear a trademarked name. You may also use the Wikimedia logos to decorate your venue, but only to the extent they are relevant. For example, you cannot use the Wikisource logo for a Wikimedia Commons-only event. However, keep in mind that the 'Wikimania' name and logo are reserved for the yearly Wikimania conference. 3.5 Can you give me some examples of outreach work? You can put up a stand at a street fair. Here are some examples of that. You may want to present the Wikimedia sites in your club or reach out to seniors. You can also give a talk in a school or create a university course. 3.6 What are educational materials? Educational materials help people to understand the Wikimedia sites. They can be leaflets, videos, cheat sheets, and other guides. 3.7 What about representing the community in an institution? You need to sign and email us a Quick License if your institution wants to call you "Wikipedian in Residence" as part of a GLAM project, or something similar. Back to Outreach and recruitment of new editors 3.8 There is a Wikimedia Community logo? Yes! It was officially adopted as the logo for Meta-Wiki in 2008. 3.9 What does fair use mean? In U.S. trademark law, the concept of fair use allows you to use any trademark as long as your usage fulfills certain conditions. This policy cannot restrict your fair use rights. We added Sections 3.5 and 3.6 to make your rights easier to understand. For jurisdictions that do not recognize fair and nominative use as set out under U.S. law, these sections provide permission to do this. 3.10 Can you give me more examples of fair use? This category of fair use is tricky in our case because our wordmarks were not real words before our projects were created, unlike "apple" or "facebook." But we would consider it fair use if you were to write a book in the Wiki software and refer to it as a "wiki book," even though Wikibooks is a distinctive trademark. If you are using the wordmarks to describe our projects, that is also a type of fair use (nominative use). You can read more about nominative use here. 3.11 Can you give me some examples of uses that are not fair use? Using a Wikimedia mark to advertise your book. Selling t-shirts with the Wikimedia Foundation logo. Creating your own encyclopedia and labeling it with a Wikipedia Puzzle Globe. Using the Wikimedia Foundation logo to fundraise for unrelated projects. Claiming that content is "derived from Wikipedia" when in fact it's not. Back to Discussing something other then Wikimedia sites (fair use). 3.12 Can you give me examples of nominative use? Describing a Wikimedia site: In a presentation that describes how Wikipedia works, using the wordmarks in slides in your bullet points would be a nominative use. The same also applies for a blog post that describes Wikidata. If you want to "illustrate" your slides or your blog post with any of the image marks, please refer to artistic, literary, and other non-commercial uses. However, you cannot use a trademark as a generic term. For example, you cannot set up a wiki on motorcycles and refer to it as "a wikipedia for motorcycles." Making true factual statements: "Wikipedia is the world's largest online encyclopedia. But Wikipedia is only one of the many sites created by the thousands of volunteers that make up the Wikimedia movement." "I have been a Wikipedia editor since 2009" (on your personal website). Describing derivative work: "Source: Wikipedia" "This artwork was created using images from Wikimedia Commons." "The encyclopedic content on this site is derived from Wikipedia." "From Wikipedia" or "to the Wikipedia article" (as used by a QR code project) More specific examples: Refer to the sections on news reporting; personal blogs and social media; artistic, literary, and other non-commercial uses; and links to Wikimedia sites. Back to Refer to Wikimedia sites (nominative use). 3.13 Can I use a logo or a screenshot in my news or magazine article or news on TV? Yes, as long as the image illustrates the discussion in the article. Do not use our trademark just to attract attention to your work. That will confuse your readers or viewers, and ours! Back to News reporting 3.14 Can I include a logo or a screenshot in a blog post or a status update? Yes, as long as the image illustrates the discussion in your post. Do not use trademarked images just to attract attention to your page. Viewers of your blog or your user page should not be confused and think that your page is endorsed by the Wikimedia Foundation or any of its sites. 3.15 Can I use a trademark in my username, avatar, or icon? Unfortunately, no. We appreciate that you feel a connection to the Wikimedia sites. The Wikimedia community is very welcoming! However, we don't want people to think you can speak on behalf of the Wikimedia Foundation. You can still use the Community logo in your username, avatar, or icon. Back to Personal blogs and social media 3.16 Can you give me some examples of artistic, literary, and other non-commercial uses? Using the trademarks to discuss a scientific thesis in an academic paper. Illustrating a point in the slides for an educational presentation with a screenshot of a Wikimedia site. Using the marks in an art project. Creating a parody for the purposes of conveying a political message. Writing a book in which a character reads a Wikipedia article. Back to Artistic, literary, and other non-commercial uses. 3.17 Can you give me examples of linking to Wikimedia sites? Yes, you can find sample link templates here. 3.18 Can I use the marks to link to Wikimedia sites using QR codes? No. This permission to use the logos to link without a license applies to online links. To use QR codes you need to use the non-stylized Wikipedia wordmark. You can read more about that in the FAQs for nominative use. Back to Links to Wikimedia sites. 3.19 What kind of stuff can I make? You can make shirts, hats, bags, mugs, pins, pens, stickers, posters, desktop wallpapers, and even cakes. Pretty much anything as long as you don't sell it. Here are some examples. 3.20 Can I sell merchandise as long as I don't make any profit? No, you cannot sell merchandise without a license. For more information on this see the section on commercial merchandise. 3.21 Can I make stuff for others? Yes, as long as you give it away for free. 3.22 What about commercial merchandise? First, you can buy merchandise from the Wikimedia shop. Proceeds from this merchandise are used towards the Wikimedia sites. If you want permission to sell your own merchandise, see the section on commercial merchandise. 3.23 Can I ask commercial vendors to create custom items for me that use Wikimedia marks? Of course! You may ask vendors like bakers and t-shirt sellers to create items with Wikimedia marks especially for you or your friends. This is okay because it is for your own personal use and no one is creating a business surrounding the sale of items with Wikimedia trademarks. And don't worry, vendors will not be required to strictly follow the Visual Identity Guidelines when it's not possible on items like cakes. For example, all these cakes are fine. 3.24 Is it okay to commission someone else to create lots of items with the Wikimedia marks for meet-ups and similar events? Yes! As long as the items are not sold to participants, it's okay to ask a vendor to create multiple items with the Wikimedia marks for community-focused parties and gatherings like edit-a-thons under Section 3.2 of the policy. 3.25 Can I use high-resolution logos on commercial merchandise? Yes! While our previous trademark policy did not permit the use of high-resolution logos, we have removed that restriction from the new policy. Back to Make your own branded stuff. 4.1 If I need permission, will I have to pay for a license? Usually, there is no license fee. However, we want to keep track of how our trademarks are used. Also, we want to make sure every use complies with our mission and standards. This is why we require a formal license in certain cases. Back to Special uses that require permission. 4.2 Do I need permission for every photo contest? You only need to get a license if you advertise the photo contest outside a Wikimedia site. This includes posters, social media, and blogs. You can freely use the marks for community-focused events. Community-focused events are those that are intended to be predominantly attended by Wikimedia community members. They do not include events open to the general public. Back to Photo contests. 4.3 Can I print out t-shirts with the Wikimedia logo to give out as prizes for the photo contest? Yes. You can always make t-shirts with the Wikimedia logos and give them away as long as you are not selling them. Back to Make your own branded stuff 4.4 How can I use the marks as a Wikipedian in Residence? The marks may be used in any way that identifies you as a Wikipedian in Residence. Please avoid confusion about official endorsement. You should clarify that you are not a representative of the Wikimedia Foundation. Back to GLAM-WIKI initiatives. 4.5 Can you give an example of cybersquatting? In the past, someone registered the domain wikkipedia.org to attract traffic to their own site. This is called cybersquatting or typosquatting that infringes our trademark. We strictly enforce our policy against confusing domain names. Please tell us if you see an infringing domain name. 4.6 Can I use a Wikimedia mark as part of my domain? Unfortunately, no. If you do, there is a risk that you will confuse readers that are looking for Wikimedia content or other material related to Wikimedia. Movement organizations may be permitted to use the Wikimedia mark as part of their domain, but only after receiving special permission. 4.7 Can I use a Wikimedia mark if I use a different top-level domain? You cannot register a Wikimedia mark as a domain, no matter the top-level domain, including country code top-level domains. For example, you may not register "wikipedia.jobs" even though it uses ".jobs", a different top-level domain, because "wikipedia" is a Wikimedia mark. 4.8 But I want to set up a special domain myself! If you have a legitimate reason to set up a domain, please email trademarks@wikimedia.org. Back to Domain names. 4.9 What does "public event" mean? A public event is an event that is not predominantly attended by community members. An event is also public when it is announced to the public with signs or advertisements or in an event schedule. Hence, this rule does not apply to community-focused meetups and conferences. 4.10 What event uses require permission? Using a trademark for an event includes naming the event or using a Wikimedia logo on advertisements, leaflets, signage or a website. 4.11 Are there any exceptions to when events require permission? If the name of the event uses a mark just to describe its content, that might fall under nominative use. An example for this would be announcing a course called 'Editing Wikipedia for Beginners' or 'Using Wikimedia Commons as an Amateur Photographer'. However, always include a notice that explains that your use is with permission from the Wikimedia Foundation and that you are not affiliated with the Foundation. Also, events hosted by a local Wikimedia chapter, thematic organization, or user group can use the marks subject to their respective agreement with the Wikimedia Foundation. Back to Events and conferences. 4.12 What is a "publication"? Publications include books, other print media, and web pages. They also mean audiovisual media like music, and other recordings, film and online video. See Outreach and recruiting new editors for materials that provide education about a Wikimedia site. See Section 4.5 for trademark uses in films. 4.13 Can I write a book about Wikipedia? Of course you can, and we would be happy to hear about it! But you shouldn't display the Wikimedia Marks on the cover of your book or on your product packaging without asking for permission. This is because it could look like endorsement from Wikimedia Foundation and mislead users. You are of course free to use the non-stylized Wikimedia wordmarks in a book title but remember to ask for permission. 4.14 Does this also apply to handbooks, like "A beginner's guide to Wikipedia", aimed at community members? Yes. But, please send us a request and we will give prompt permission when appropriate. We love Wikipedia guides! 4.15 Does it make a difference if the book is being published by an educational publisher? No, you will need permission as well, because even educational publishers are commercial entities. Back to Publications. 4.16 Do I need permission to show the Wikipedia marks in a film I am making for my school project? If you are showing your film to the public, or at your school or workplace, you need permission. But we will make sure to make the permission process as easy and fast as possible. Back to Movies and TV shows. 4.17 Will I have to donate a portion of the retail price for commercial merchandise? No. But you will have to tell your customers if you don't donate your profits. 4.18 What do I have to say if I am donating a portion of my proceeds to the Wikimedia Foundation? Just clearly state what portion of your proceeds will be given to the Wikimedia Foundation. You can, for example, say: "X% of your purchase will be donated to the Wikimedia Foundation." 4.19 Where should I state how much of my proceeds will be donated? We recommend placing the notice right next to the purchase price, where it will be clearly visible to all buyers. 4.20 Do I need to mention donations to the Wikimedia Foundation if I don't donate anything at all? Yes. You should state that 0% of your profits will go to the Wikimedia Foundation. Otherwise, users may mistakenly believe that you're doing fundraising for the Foundation. Back to Commercial merchandise. 5.1 Can I make a fake Wikipedia article if it is intended as a joke? There are exceptions where this is permissible, but they are very limited. You will likely not fall under such an exception if your mimicking site has any commercial background. Please refer to the section on Parodies. Most importantly, you must make sure that no one (really no one!) could confuse your site with any part of a Wikimedia site. 5.2 How do I distinguish between a prohibited mimicking site and a parody site? Here is an example of a mimicking site: Contrary to the Wikipedia guidelines, you create an article on Wikipedia about yourself or your organization. For unknown reasons, "your" article is deleted. This makes you mad. You register the domain "businesspedia.org" and design a website that looks just like the Wikipedia article that just got deleted, including a link to your own website. You are happy to attract more traffic to it by confusing internet users. Booo! An example of parody site: Imagine you have a great friend called Rory and his birthday is coming up. You register the domain "rorypedia.org" and design a website that looks just like a humorous Wikipedia biography on your friend Rory. Since you don't want anyone to confuse "Rorypedia" and Wikipedia, you put a bright colored bar on the top of your site saying, "This page is a present for Rory from his awesome friends and not affiliated with Wikipedia. Happy birthday, Rory!" And you take down the site once the birthday party is over. Yaaay! 5.3 How do I avoid mimicking Wikimedia sites when I use the Mediawiki software? All wikis using Mediawiki do in fact share certain graphic elements under the default theme, but the Wikimedia sites have certain visual features that distinguish them. Do not imitate these distinguishing features. For example, you should not use logos that are confusingly similar to the Wikimedia marks or name your site something that sounds like a Wikimedia site. But you can use the "Powered by MediaWiki" button as that button simply describes that the wiki is powered by MediaWiki. Be sure to directly download the Mediawiki software if you want to use it. Please do not try to blindly copy the HTML code of a Wikimedia site! If you do, you will accidentally import features from our sites, like our Terms of Use or our "contact us" details. Being contacted about problems on your unrelated website understandably makes our wonderful email response team volunteers very unhappy. Back to mimicking sites. 5.4 Can I use the marks to link to a mirror of a Wikimedia site? No. The Wikimedia marks can only be used for linking to a real Wikimedia site. By that, we mean those sites that are run by the Wikimedia community. Also, if you want to set up a mirror of a Wikimedia site, please refer to the section on mirrors. Back to Linking to non-Wikimedia sites. 5.5 Can you give me some examples of misrepresentation with respect to the marks? A misrepresentative use can be something that represents yourself. That includes using a Wikimedia logo in your logo, letterhead, or the name of your organization. Online examples are your social media avatar, favicon, and website domain. Back to Misrepresentation. 6 Reporting Trademark Misuse 6.1 How do you fight trademark infringement? Each year, we receive over 100 reports of trademark violations from community members. We also employ outside contractors and legal counsel to help protect our trademark portfolio globally. Within our resource constraints, our legal team pursues misuses of our marks to ensure that the Wikimedia logos remain distinctively associated with the Wikimedia community. After careful and sensitive evaluation, we send out cease-and-desist letters, which are usually effective. In the few instances that cannot be resolved by other means, we consider litigation to protect the marks. 6.2 Who is responsible for enforcing Wikimedia’s trademarks? Trademark enforcement is currently handled by the WMF legal team to ensure consistency and compliance with trademark law. But we rely on the Wikimedia community to help us identify potential trademark infringements. 6.3 What happens when you receive a report of a potential trademark infringement? When we receive a complaint that our trademarks are being misused, we first send a confirmation to the person submitting the complaint. Potential infringements are then logged into our system. The legal team then combs through each of those complaints to investigate the alleged infringement. We visit the site personally to make sure the complaint has merit. Then we apply US trademark law in assessing whether there is actual “misuse” and it is a valid infringement of the trademark. In general, the standard of “misuse” in US law is whether the use of the trademark is “confusingly similar” to WMF’s use of the trademark. In other words, will the potential infringers use of the trademark confuse users into thinking their site is sponsored by or hosted by WMF? We always contact the potential infringer first to see if they will voluntarily stop using our marks or work with us to make their use less confusing. If we are unable to work things out informally, and they refuse to comply with a cease and desist letter, we decide whether to move forward with litigation to stop the infringement. 6.4 Can I send a cease and desist letter on behalf of the Wikimedia Foundation when I find misuse? Please don't. We really appreciate your help with trademark enforcement, but please report any misuses to us so that we can determine what action is appropriate. Back to Reporting Trademark Misuse. 7 Revision of the trademark policy 7.1 Why can you just change the FAQ section? The FAQs are not part of the trademark policy. We created them to help you understand the policy. We want to add new questions from the community in the future and to clarify any answers users may find confusing. That is why we want to be able to update the FAQs easily. 7.2 What if I do not agree with the changes to the policy? We encourage you to share your comments and concerns with us during the community feedback period following any announced changes. We will take all comments under careful advisement and ensure that any changes to our policy are consistent with our mission. Back to Revision of the trademark policy. 8 Other questions 8.1 What is "naked licensing"? Failure to exercise quality control in trademark licensing is referred to as "naked licensing," and can sometimes result in loss of trademark rights. 8.2 What are the Visual Identity Guidelines? They are a set of guidelines you should follow when using any of the Wikimedia marks. These guidelines ensure that the marks always look their best and are not distorted in any way. 8.3 How do the Visual Identity Guidelines relate to the trademark policy? The Visual Identity Guidelines are a separate document from the trademark policy and can be revised without notice. These guidelines help to make sure the Wikimedia marks are always used consistently with the same level of quality. Consistent use is important in order for us to maintain protection over the Wikimedia marks. It helps avoid confusion among users that may view marks similar to the Wikimedia marks. If Wikimedia marks are displayed consistently, users can be sure when they are viewing actual Wikimedia content instead of an imposter site. 8.4 What if I have more questions? If you have any other questions that are not addressed here, please post them on the discussion page. We will try to expand and improve our FAQs over time. Retrieved from "https://meta.wikimedia.org/w/index.php?title=Trademark_policy/mk&oldid=19343564"
cc/2020-05/en_middle_0016.json.gz/line4792
__label__wiki
0.613557
0.613557
Dr. Charles Hayter Collection 2 Museum of Health Care at Kingston Collection 1 Archival Items 2 Diagnostic & Treatment Artifacts 1 Archival, Advertisements 1 Archival, Publications 1 Radiotherapy 1 A. C. E. 1 A. D. Joslin Mfg. Co. 1 A. E. Dean 1 A. E. Hanna Pharmacy 2 A. E. Long & Co. 1 A. F. H. Devers 1 A. F. Pattee 1 A. G. Groblewski & Co. 1 A. G. James Jaquet 1 A. H. Dixon & Son 1 A. H. Lewis Medicine Co. 5 A. H. Robins Company Inc. 2 A. J. Nystrom & Co. Publishers 6 A. J. White & Co. Ltd. 1 A. J. White Ltd. 2 A. Kuhlman & Co. 2 A. L. Chatterton & CO. 1 A. L. Hernstein & Son 2 A. M. Mann 1 A. Quagliarella 1 A. R. Timothy 3 A. S. Aloe Co. 3 A. S. Hinds Co. 1 A. Staples 1 A. Vogeler & Co. 1 A. W. Buchan & Co Potteries 1 A. W. Head 1 A. Wilfrid Coombes 1 A. Young & Son 2 A. and C. Black Ltd. 1 A.C.E. 2 A.C.M.I. 9 A.F.M. 1 A.H.T. Co. 3 A.I.M. 1 AA Inc. 1 ACMI 2 AHT Co. 1 ALS Society of Canada / Productive Marketing Inc. 1 AMG Med 1 AMG MedPro 1 AMSTA 1 Abbott Laboratories Ltd. 11 Abt. Warmbrunn, Quiltz & Co. 1 Accurate Surgical Instruments Corporation 1 Adam and Charles Black Adams 3 Adams Squibb 1 Pathology 1 Radiotherapy -- pamphlet 1 Reference Books, Medical 1 Image Available Online Sort by Object Name AECL brochure Practical Pathology [reference book]
cc/2020-05/en_middle_0016.json.gz/line4795
__label__cc
0.536953
0.463047
Happy Holidays and David’s Copyright Office Comments — The Trichordist December 29, 2019 Editor Charlie Comments off We wanted to wish all our readers happy holidays and thank you again for supporting the Trichordist! As some of you may know, the Copyright Office comment period for MLC regulations just closed. We will be posting David’s comments and selected other commenters here for some holiday reading starting tomorrow. We want to thank the […] via Happy Holidays and David’s Copyright Office Comments — The Trichordist Are US Trade Negotiating Objectives Regarding Digital Responsibility and Copyright Protection Evolving? (What the 800 Pound Gorilla Really Wants is Important for the Trade Partners of the US) — Hugh Stephens Blog When you negotiate with the 800 pound gorilla, the gorilla usually gets what it wants. Therefore exactly what it wants can be very important. In case you were wondering, from a trade policy perspective the 800 pound gorilla is the United States, the world’s largest economy and a largely open market, although increasingly less so […] via Are US Trade Negotiating Objectives Regarding Digital Responsibility and Copyright Protection Evolving? (What the 800 Pound Gorilla Really Wants is Important for the Trade Partners of the US) — Hugh Stephens Blog Repost: The American Law Institute’s Restatement Scandal: The Futility of False “Unity” December 4, 2019 Editor Charlie Comments off [Editor Charlie sez: This is a post from 2/6/18 with an update from this week as noted. MTP readers also might want to re-read this post about Spotify lawyer’s gratuitous attack on David Lowery.] UPDATE: Senator Thom Tillis and Representatives Ben Cline, Martha Roby, Ted Deutch and Harley Rouda have written a letter to the American Law Institute asking what they think they’re doing with the fake “Restatement of Copyright” being written by Spotify’s lawyers and recipients of Big Tech largesse. Who ever thought that the American Law Institute–of all places–would become the center of a corruption scandal over–of all things–its “Restatement of the Law” series. Now it’s the “Restatement of Copyright”, which is rapidly becoming a desk reference for the anti-artist crowd, led in this case by Professor Pamela Samuelson and Professor Christopher Sprigman. Sprigman enjoyed a walk-on for the Spotify legal team in the Nashville Cases. (Having achieved victory with a new safe harbor with the Music Modernization Act, Spotify may find that the Nashville cases are the last copyright infringement lawsuits they will ever defend. So Sprigman’s role is significant in the anti-artist community.) Chances are good that MTP readers outside of the legal profession have no bloody idea what a “Restatement” is and will sleep well in that knowledge deficit. But for lawyers (particularly litigators), the Restatement series has had some passing value. However, there appears to be a trend at the ALI to trade on the “Restatement” series brand value to provide a vehicle through which those who control the pen in drafting both new versions of old Restatements and new Restatements on new topics can try to change the law to what the drafter thinks it ought to be–rather than a tool for practitioners to quickly learn what the “black letter law” is. This is a way to make an end run around the democratic process. Why? To deny voters and their elected representatives their proper Constitutional role. What’s different is the potential for the moral hazard of astroturfing making it more important than ever to know who is behind the pen and hiding behind the Restatement brand. The potential for astroturfing is why the controversy should be of importance to artists–those who wish to advance the interests of the multinational tech companies can run their anti-copyright hustle through the back door by standing up a sympathetic Restatement in addition to spending hundreds of millions on lobbying at the front door. If the companies doing the astroturfing or lobbying were Exxon or Aetna instead of Google and Facebook, no one would have to be told twice although that’s changing. And yet the scandal is still a teachable moment for being far more selective and open-eyed about what we spend our time on and lend our names to. What is a “Restatement”? As Professor Risch notes in a 2015 blog post on the Restatement of Copyright controversy, there is a difference between the restatement approach and a treatise (such as Nimmer on Copyright) and should not be confounded: Restatements generally boil the law down to a single rule (or few) on a given topic. There may be comments for specific applications of the rule based on cases, but the ultimate goal is to provide a cohesive structure of the law. A well-written treatise, on the other hand, may recognize that there is no single rule. Quite often, referral to the treatise is really to the footnotes, looking for a case citation in a particular circuit. Treatises might present different rules in different circuits. The current scandal is over copyright, but it appears that the Restatement of Copyright is simply the current manifestation–similar controversies face ALI on its “Restatement of Liability Insurance Law” project as well as its “Restatement of the Law, Consumer Contracts.” There may be others. What is the “Restatement”? Justice Scalia provides us with an explanation (Kansas v. Nebraska, 574 U.S. ____ (2015) (Scalia, J. concurring in part, dissenting in part): I write separately to note that modern Restatements—such as the Restatement [at issue in the case at bar]—are of questionable value, and must be used with caution. The object of the original Restatements was “to present an orderly statement of the general common law.” Restatement of Conflict of Laws, Introduction, p. viii (1934). Over time, the Restatements’ authors have abandoned the mission of describing the law, and have chosen instead to set forth their aspirations for what the law ought to be….And it cannot safely be assumed, without further inquiry, that a Restatement provision describes rather than revises current law. Enter Professors Samuelson and Sprigman. Revising the law is just their game. And so here we are. (MTP readers will remember Professor Sprigman represents Spotify and came up with another example of “revisionist” argumentation to claim on behalf of Spotify that mechanical streaming royalties don’t exist. This sent some running scared to take the bait in the recent Music Modernization Act. And of course who can forget when David Lowery took Samuelson to school with a Politico op-ed that was entered into the record of Samuelson’s appearance before the House Judiciary Committee by Chairman Goodlatte no less.) It All Starts with a Cigar: Samuelson Makes the Pitch Professor Samuelson (she of the Samuelson-Glushko law centers, Silicon Valley’s answer to the Confucius Institutes) seems to have been the prime mover in the effort for a “Restatement of Copyright” as near as I can determine from a 2013 letter she wrote to the then-director of ALI: You may remember that during the American Law Institute (ALI) Young Scholars Conference on Patent and Copyright Law held at Georgetown University Law Center in February 2013, I suggested that ALI should undertake a copyright reform project. I am writing now to follow up on that suggestion with a more concrete proposal for a project that articulates principles that courts, lawyers, and scholars can use without the need for legislation and that would provide an analysis and framework that would aid additional reform efforts. Such a project would enable the ALI to bring reason and order to this important area of the law and help clarify and simplify it in accordance with the lnstitute’s mission. Of course, American copyright law is a creature of statute as they say. Professor Samuelson knows this. So when she proposes a “copyright reform project” that avoids the “need for legislation”, she is heading straight into Justice Scalia’s sweet spot regarding the restatements. Or jar of vinegar, depending on your view. It appears that the Restatement of Copyright was planned on being a cut above a 3L’s course outline and a notch below lecture notes from the start. So–and we will come back to this–the entire Restatement of Copyright enterprise was doomed from inception. Thousands of work hours were spent on this misadventure that was a results oriented process designed–as Professor Samuelson clearly states–to create an antidemocratic work around to the statutory copyright law. Talk about your smoke filled rooms, Valley-style. It’s Not Just Us: Problems with Astroturfing on Other Restatements It is cold comfort that this astroturfing may well be a pattern at ALI. Consider complaints about the Restatement of Liability Insurance Law that could easily be made of the Restatement of Copyright: The Restatement of the Law, Liability Insurance is the ALI’s first-ever project on the topic of insurance law and the ALI’s first-ever industry-specific Restatement. The ALI leadership made a sound decision to postpone a final vote of approval of this Restatement at the 2017 Annual Meeting to allow time for additional work on the project. The project Reporters’ subsequent announcement of a “listening tour” to address outstanding concerns with the Restatement also signaled the prospect of meaningful improvements. Despite these assurances, minimal changes have been made to this Restatement….The failure of the Reporters to meaningfully address key sections of the Restatement that generated concern at the 2017 Annual Meeting makes the ALI leadership’s decision to postpone the project ring hollow and suggests a “broken promise” to address legitimate outstanding concerns. Numerous aspects of this Restatement have generated concern for both insurers and non-insurers. The two examples discussed in the prior general counsel letter continue to illustrate key concerns. The Restatement continues to endorse a “new version” of the basic rule that contract terms are interpreted according to their “plain meaning” which would allow extrinsic evidence to be considered even when a contract is clear. This provision would create uncertainty, invite unnecessary collateral litigation, and set an unsound precedent with respect to the interpretation of insurance policy terms, and possibly terms in other types of contracts. Sound familiar? The pattern raises a much, much larger question about what is going on at ALI and how ALI is funded. But in the Copyright restatement, it was clear from the beginning that Professors Samuelson and Sprigman were involved. Who did Samuelson recommend to “help” the ALI with the Restatement of Copyright in her 2013 letter to ALI? The Reporter or Reporters, the Advisers, and the Institute should be able to engage and draw on significant law school resources. These include, to give just a few examples, the Berkeley Center for Law & Technology at Berkeley Law (BCLT, http://www.law.berkeley.edu/bclt.htm), of which I am a Director and which has hosted important copyright events such as a conference commemorating the 300th anniversary of the Statute of Anne, a conference on orphan works and mass digitization, and a conference on copyright.formalities; the Center for Internet and Society at Stanford Law School (http://cyberlaw.stanford.edu/), which concentrates on public policy issues such as copyright and fair use; and the Berkman Center for Internet & Society at Harvard (http://cyber.law.harvard.edu), which focuses on cyberspace issues through projects and initiatives such as the Digital Public Library of America. Does it really need to be said yet again that CIS and Berkman both get funding from Google? And that Professor Samuelson’s interests are as close to Google’s interests as one is to two or that Professor Sprigman conducts Google-sponsored research? For example, statutory damages for copyright infringement has long been an attack point of Big Tech and we get a preview of where they want it to go in Pamela Samuelson’s “Copyright Principles Project”–essentially abolished–like the controversial Music Modernization Act, another example of fake “unity.” The Teachable Moment: Take A Pass in Future The result of participating in a project where Sprigman controlled the pen was knowable simply based on who was involved. So why would anyone bother with these people and their Restatement of Copyright? I bet the insurance lawyers are asking themselves the same thing about the Restatement of Liability of Insurance Law. Did anyone really need to know of Samuelson’s 2013 letter or Sprigman’s 2014 proposal to have guessed that these people were not interested in the ALI’s founding principles, were agenda-driven and were unlikely to consider the interests of professional creators that drive our industry? This is why the idea that there can be unity between the anti-copyright forces and the creative community is a farce. I don’t know how many times these efforts have to blow up for people to understand that it is not worth engaging if you see certain names involved because the effort is not genuine. Setting aside the potential corruption (which is a question across the board for the ALI in both the copyright and other restatement debacles), this is a teachable moment. If anyone in the creative community is approached to participate in these things, do not believe that participation is worth it “to have a seat at the table” or any of the other metaphors for having your name used, abused and ignored in the final work product of whatever it is. That this process repeats itself is almost as irritating as our lobbyists saying they are “friends” with the other side, that they are “fond” of an opponent. If our people were in the room when those “fond friends” were discussing them, trust me–these “fond friends” do not return the affection. They are not your friend and they are not fond of you. And as Rogers & Hart wrote, unrequited love’s a bore. Let me be blunt: They are screwing you, get it? And to be blunter still–there’s something to that. These people are not stupid, they can see a sucker stepping up to the thimblerig. So if you’re going to keep showing up for their tricks, do not cry about it afterwards. There’s one answer when that call comes in–pass. Embrace the Apocalypse. There is no “unity.” Or you can buy Bitcoin futures from the Winklevoss Twins. Tags: American Law Institute, Restatement of Copyright Save the Date: Alissa McCain to Receive Cindi Lazzari Artist Advocate Award from TESLAW November 10, 2019 Editor Charlie Comments off Alissa McCain will receive the 2019 Cindi Lazzari Artist Advocate Award from the Texas Entertainment and Sports Law Section (TESLAW) of the State Bar of Texas on November 20 at the InterContinental Stephen F. Austin Hotel. Alissa has twenty years of dedicated and groundbreaking artist advocacy work that has had a substantial impact on the lives of thousands of artists across Texas. A highly experienced and well-respected community leader, Alissa has maintained a singular focus: the success and advancement of artists. Her work at Texas Accountants and Lawyers for the Arts over the last seven years has provided both pro bono legal counseling to artists statewide in Texas and events and programs in all major cities in Texas. In addition, Alissa was not only a founding board member of Capitol View Arts and working board member every year since its inception, she worked tirelessly as a member of the Austin Arts Commission to assist in re-working the funding metrics used to provide City of Austin grant money to help the smaller arts organizations receive their fair share of those funds. Other notable accomplishments include her service as a Commissioner on the Austin Arts Commission (appointed by Council Member Ora Houston), a consultant and contributing writer to the Austin Music Census, COO of the Austin Creative Alliance, and Director of Programs and Operations for the Austin Music Foundation. Alissa’s career embodies the traditions of the Lazzari Award — supporting and educating artists by creating the kind of resources that allow creators to thrive. TESLAW will present the award to Alissa on Wednesday, November 20, 2019 at 6:15 P.M. at the Stephen F. Austin Hotel in conjunction with the welcome event for the 29th Annual Entertainment Law Institute hosted in Austin by the State Bar of Texas. Alissa will receive a plaque created by renowned Austin Artist Rejina Thomas. About the Lazzari Award: The Lazzari Artist Advocacy Award is named for the late Cindi Lazzari, a leading Texas attorney who went far beyond the call of duty in her efforts to protect the rights of artists in the music industry. It is awarded by TESLAW. In these challenging times for Texas musicians, the Section wants to recognize the exciting heroes and heroines of all the music communities across Texas who carry on the tradition of Cindi’s good works. Previous recipients of the Lazzari Award include Juan Tejeda (musician, arts administrator and activist), Robin Shivers (artist manager and founder of the Health Alliance for Austin Musicians), Texas Accountants and Lawyers for the Arts, SIMS Foundation, Nikki Rowling (co-founder of Austin Music Foundation and author of the Austin Music Census), Casey Monahan (the first head of the Governor’s Music Office) and Margaret Moser (the journalist and long-time music editor for the Austin Chronicle). About the Artist: Rejina Thomas (African American Contemporary Artist) Circa 1979- present. Creative, Rejina Thomas has mastered her trades of Custom Glass Engraving and fabrication with mixed media including metal, stone, and plastics over the last three decades. Her acclaimed artwork is held in public places and private collections around the world. She did all the double acid etch Victorian stencil pattern Glass Art in the Texas State Capitol. Miss Thomas is also well respected as an abstract painter and muralist. Reji Thomas lives and works in Austin, Texas and continues every day to look at life through Abstract Colored glasses in order to see the best in Humanity. https://www.rejithomasart.com/ Tags: Alissa McCain, Cindi Lazzari, TESLAW, Texas Entertainment and Sports Law Section Loophole Competition: Is Google’s News’ Richard Gingras the Counterpart of YouTube’s Lyor Cohen? via ArtistRightsWatch October 14, 2019 Editor Charlie Comments off We’re all well aware of how Google uses self-manufactured loopholes in the DMCA safe harbor to enrich itself at the expense of artists, and run their loophole traps while appearing to “help” artists deal with the Google manufactured whackamole on YouTube with “tools” like Content ID. (See Ellen Seidler’s teaching on this subject, Kerry Muzzey’s post about Content ID from an artist perspective, and Zoe Keating’s statements on the YouTube Content ID shakedown.) What Google has also done is find someone out there who is willing to promote the corporate line on DMCA abuse, the Chief Loophole. This person very likely gets paid a fortune in both cash and stock options to be the public face of Google’s destructive policies. Or at least a fortune compared to the person’s former colleagues in the copyright category that Google is commoditizing and extracting value from with their loophole seeking behavior. Google then spends money on a charm offensive directed at these former colleagues—but which falls short of providing the same wealth that they bestowed on the Chief Loophole. They may have many reasons for keeping this class distinction in play, but the message is clear—if you truly go over to the dark side, beaucoup bucks await you. Or it will seem like beaucoup bucks to you because Google’s loophole seeking beat you down so far it looks like up to you. Yes, I’m describing Lyor Cohen at YouTube and Richard Gingras at Google’s Internet of Other People’s News. Rather than embrace a rights-affirming and privacy-protecting philosophy, these two divisional Chief Loopholers shore up two of the principal sources of Google’s data wealth—news and music. Lyor Cohen embarrassed himself to little effect as the face of YouTube’s assault on the European Copyright Directive. Mr. Gingras is doing the same in what promises to be the opening act of a long offensive against the European Copyright Directive. The Copyright Directive has been passed by a vote of the European Parliament and transposed into French law by a vote of the Parliament of France—which the multinational Big Tech bloc like Google lost abysmally by employing a bot strategy that seemed to be modeled on the tactics of the Internet Research Agency as discovered by several European newspapers including the London Times. The crux of the issue for Mr. Gingras is that the Copyright Directive requires Google to pay a neighbouring rights royalty to newspapers whose work they use. You may have heard the Google Alinsky-style semantical talking point of the “link tax”. Google is now putting Mr. Gingras forward to be the Lyor-style face of its campaign against journalists and news organizations in France by throwing a new loophole in the face of the French government while at the same time stepping up its charm offensive by offering what certainly look like bribes to news organizations in Europe that play ball. The loophole is Google’s use of its brutal market power to force newspapers to give them for free that which would otherwise attract essentially a statutory royalty. Mr. Gingras is the face of this, a role for which we hope he’s being at least as well compensated as Lyor Cohen for doing what is effectively the same job—being the face of the charlatan. The good news is that Google tipped their hand early in the transposition process so even France can go back and fix this competition law violation. Thanks to the Google Transparency Project (full report here) we know that Mr. Gingras also brings a pot of gold to his version of the rainbow, either directly or indirectly, through spending on the ideation and flaring from the shill incubator: The Google Transparency Project undertook the most comprehensive effort yet to collect all of Google’s payments to media organizations around the world in one place. The analysis included 16 different Google programs and related organizations and spanned more than a decade. It revealed that Google and related entities have committed between $567 million and $569 million to support at least 1,157 media projects around the globe. The analysis also identified another 170 projects supported by Google for which no funding information was publicly available, suggesting that the total amount the company has spent on media grants is likely far higher. Google often boasts about its support for journalism, disclosing plans to spend over half a billion dollars on media initiatives since 2013. But Google isn’t always transparent about its spending, making it difficult to assess what the company is giving—and what it may be getting in return. We haven’t seen Mr. Cohen waiving around this kind of cash aside from a few thousand euro we know about that was paid to some YouTube “creators” to produce anti-copyright directive materials. Lyor really needs to do something about that disparity. We’re way beyond YouTube “creator” studios now—user-generated never got hundreds of millions. I wonder what Mr. Gingras makes by comparison to Mr. Cohen? Tags: European Copyright Directive, Lyor Cohen, Richard Gingras @kantrowitz: As Google Backlashes Have Risen And Fallen, So Have Its Grants To News Organizations via @artistrights [Editor Charlie sez: Google attacks journalists with one hand, doles out the charm offensive cash with the other.] Over more than a decade, Google and foundations run by its leaders have given hundreds of millions of dollars to journalists and news organizations around the world, sponsoring drones in Nigeria and Kenya, and local news in the US. But according to a new report, these grants tend to be made in places where the company faces pressure from politicians, the public, and the press, raising questions about whether the tech giant is committed to social good or buying itself goodwill. The report, written by researchers at the Campaign for Accountability’s Google Transparency Project, shows a spike in funding in Europe when Google was under pressure in the mid- to late-2010s, and a subsequent uptick in the US amid a backlash that’s led to a Department of Justice investigation and calls for its breakup. Read the post on Buzzfeed Tags: Adam Kantrowitz, Google Meltdown, Google Transparency Project The Coming Crisis: #SayNoToZoe on CASE Act Threats September 17, 2019 Editor Charlie Comments off The new copyright small claims court legislation (The CASE Act) passed the House Judiciary Committee, but not without thuggery from Rep. Zoe Lofgren and the Internet Association. Chris Castle narrates the issues and proposes a solution for Big Tech’s “Senate strategy” that inevitably includes Senator Ron Wyden, the grifter from Oregon and proud father of Section 230 of the Communications Decency Act. Lofgren’s threat comes about 8:27:00 on the YouTube video here. Internet Association Statement on CASE Act Ron Wyden’s Teachable Moment: Should one Senator be allowed to stop 415 Members of Congress on the Pre-72 Fix Did a Wyden Campaign Donor Fund Hedge Fund Operated Out of Senator’s Basement? Are Data Centers The New Cornhusker Kickback and the Facebook Fakeout? The Mother’s Milk of Algorithms: Google Expands Its Data Center Lobbying Footprint in Minnesota–Home to Senator Amy Klobuchar ACLU takes a gratuitous swipe at the Copyright Office using a Google “study” to allege bias. ACLU Statement on CASE Act See: ACLU Gets $700,000 from Google Buzz Award musictechpolicy.com/2011/10/31/the-…r-the-company”/ ACLU Helps EFF With DMCA Delaying Tactics musictechpolicy.com/2010/07/07/aclu…laying-tactics/ ACLU Cribs from Google Lobbyists on Pro-Piracy Letter to Congress musictechpolicy.com/2016/05/04/why-…ns-from-google/ Tags: CASE Act, Rep. from Google, Senator Data Center
cc/2020-05/en_middle_0016.json.gz/line4803
__label__wiki
0.844632
0.844632
March 19, 2014 By Nathan Frontiero 2 Comments Style is so often substituted for substance in film that seeing something as synergistic as The Lego Movie is truly marvelous, and even more of a joy to look back on. Writer-directors Phil Lord and Chris Miller have built a multifaceted, visually stunning film. The Lego Movie is at once a brilliantly subversive satire, a heartfelt ode to creativity, and a fabulously freewheeling adventure. The film opens with everyman Emmet Brickowski, the poster child for contented mediocrity; his face is the original Lego minifigure smiley. Emmet (Chris Pratt) lives in a brick-laden world of order, ludicrously overpriced designer coffee, and corporate domination in the form of President Business, who is voiced by none other than Will Ferrell. As strongly visual as it is, the film also excels on an aural level, specifically through a stacked vocal cast that also includes Will Arnett, Charlie Day, Liam Neeson, and Morgan Freeman. Matching these famous voices to their plastic minifigure faces is as fun as the admittedly non-sequitur appearances that many of the supporting characters make. The filmmakers get away with the runaway storyline for the most part, though. Lego’s expansive library of licensed themes allows for some great storytelling liberties. Seeing Lego versions of Green Lantern and Superman (you should recognize the voices behind those two), Gandalf, Dumbledore – and even C-3PO voiced by Anthony Daniels himself – is just an utter joy. But as aforementioned, the film’s true selling point is its pure visual splendor. The world that millions of people have imagined brick by plastic brick is fully realized. Dare to watch The Lego Movie and not find yourself captured, entirely transfixed in this constructed universe. Animal Logic, the company responsible for the animation in this film, spares not even the slightest expense. Every single detail is rendered in CGI equivalents of those famous studs and pieces, and even the limited movement of minifigure bodies is translated over with integrity. The film is somewhat prone to sudden action and madcap chaos, but when things explode, they burst into flickering Lego flames, and when lightning strikes or electricity crackles, Lego energy bolts appear as well. The film masterfully accomplishes this unique style, passing off CGI as stop-motion animation and making the scene-by-scene action all the more believable. Another of the film’s great charms is its fearlessness in using stock characters while spryly lampooning them. Pratt is great at conveying Emmet’s foolish mannerisms, and the film spends a terrific amount of screen time underlining precisely how far the character falls from the “Chosen One” archetype. Through President Business, the film also shines light on the extremes of consumer culture. Ferrell’s character strives to control every aspect of this Lego universe by forcing everyone to follow his instructions. The mix of focus on unforgiving order enforcement in a saccharine society gives the film an intriguingly dystopian feel. The blend of that darkness with the bright colors of childhood playthings is only augmented by the film’s smartly self-aware satire. Especially great moments work with simple humor. For example, when the mysterious Wyldstyle (Banks) tries to tell Emmet his prophetic purpose, her words disappear into a haze of romantic nonsense as the light blurs around her. The image is familiar (Wyldstyle’s dialogue literally breaks down into a sultry delivery of “blah, blah, blah”) and much like the rest of the movie, it works because it’s something that’s been done, but never quite like this. The Lego Movie is a film that does astounding work with its specific presentation of the medium. It uses the meticulous animation not only as a means to engross the audience but also as a powerful comedic catalyst. Yes, the pacing and plot are a bit loose and sometimes too non-stop, and yes, the third act is heavy-handed, but the film succeeds, quirks and all. The Lego Movie is different, it’s original, and it’s awesome. Movie Verdict: Win RT Score: 90% ~ Nathan This article was published in its original form in The Massachusetts Daily Collegian on February 12, 2014. About Nathan Frontiero Nathan is a contributing editor at Movie Fail. He graduated from the University of Massachusetts, and served as the Arts & Living Editor and Assistant Arts Editor for Film and Television at The Massachusetts Daily Collegian. His work has appeared in Take, Slant, and other places.
cc/2020-05/en_middle_0016.json.gz/line4809
__label__cc
0.651331
0.348669
Hot answers tagged alfred-hitchcock day week month year all How did Hitchcock enforce the “no late admission” policy for Psycho? Enforcement is perhaps not the word. Although the movie studios had considerable sway and influence over theatre owners at the time they could not insist that the owners maintain the policy of "no late admission". It's possible that they could have included a clause into the contracts to this effect but it seems that the studio went for persuasion instead. ... cinema-history alfred-hitchcock psycho Why the long takes in Rope? In 1962 François Truffaut interviewed Alfred Hitchcock rather extensively. About 12 hours of audio has been broadcast on french radio. You can listen to the 25 parts here. In part 15 Hitchcock talks about "Rope" (I transcribed it myself, so please excuse any errors): I don't know why I really indulged in the stunt, I can only call it a stunt, in ... analysis film-techniques alfred-hitchcock rope Oliver_C Was Alfred Hitchcock a feminist? You ask a complicated question! There are arguments for Hitchcock as feminist, but the bulk of the literature I have seen is more inclined to label him as a misogynist (not to mention fetishist, sadist and voyeur). The icy blondes that were his trademark may have been strong characters on film, but in life were very much under his control. He not only ... analysis directors alfred-hitchcock To add to Christian Rau's answer, here is an outtake from Wikipedia: When filming Rope (1948), Alfred Hitchcock intended for the film to have the effect of one long continuous take, but the cameras available could hold no more than 1000 feet of 35 mm film. As a result, each take used up to a whole roll of film and lasts up to 10 minutes. Many takes end ... I think that the long takes, or just a single take as it should look for the audience, fit perfectly to the fact that the whole movie is set at a single small place. Those two aspects contribute to the impression that we are actually watching a play instead of a movie (as also stated in this answer to a different question). To me this had two at first ... Was Rear Window making a statement about 1950s gender roles? Foremost Hitchcock critic Robin Wood has written two books on Hitchcock’s films which are available through your local library’s InterLibrary Loan (ILL) service if you live in the US (and a number of other countries as well): Hitchcock's Films (1977) and Hitchcock's Films Revisited (1989). He also wrote several essays in the book A Hitchcock Reader (... analysis directors alfred-hitchcock rear-window Did any of Alfred Hitchcock's American films receive poor reviews upon release? Psycho opened to very mixed reviews. A summary of a few are found on it's wikipedia page. The bad reviews called it a blot on Hitchcock's career, a gimmick movie, and that it looked like a TV show padded out to two hours. One of my film professors hated it, saying that "you shouldn't need to explain the ending of your movie in your movie." alfred-hitchcock Legion600 The New York Times on The Trouble with Harry: "It is not a particularly witty or clever script that John Michael Hayes has put together from a novel by Jack Trevor Story, nor does Mr. Hitchcock's direction make it spin. The pace is leisurely, almost sluggish, and the humor frequently is strained." Michael Stern Hitchcock likely received bad reviews as commonly as any filmmaker did in his day or ours. Criticism is by definition made in the eye of the beholder: a subjective review. The thrust of your question appears to be more about "how did viewers react to socially shocking elements" in Hitch's films. That question, I would suggest, is self-answering. Hitchcock ... Galapagos Jim What is the significance of the abstract painting? The detective is trying to make sense of the picture, as detectives are tasked with trying to make sense of things in any given case. The picture could also be seen as a representation of Lina's frazzled state of mind. alfred-hitchcock suspicion I had the impression for years that his last movie Family Plot was widely panned, but cannot substantiate it right now. All the reviews I currently see use mild terms like "witty relaxed lark" (Canby), "not exactly top-tier" (Anderson), mixed in with others that list it as a "complicated delight" (Ebert). So, is this fawning, lackadaisical praise for a ... wbogacz Was Hitchcock fascinated by the nascent field of brain science while filming “The Lady Vanishes”? I watched The Lady Vanishes this afternoon, followed by several hours of perusing databases and books about Hitchcock, and it is difficult to answer your question with any sense of definition because 1) Hitchcock never gave an interview about the film, and 2) he shot it as written, so the result is a mix of his influence with the writers' influence. HOWEVER,... analysis alfred-hitchcock the-lady-vanishes How was the tracking shot in Frenzy done? As per the Trivia page for "Frenzy" on IMDB: Midway through the film, there is a famous continuous shot in which the camera backs away from the door of Rusk's upper-floor apartment and descends the staircase, seemingly without a cut, to the ground level, out the building's front door, and then to the opposite side of the street. The interiors were shot ... film-techniques alfred-hitchcock cinematography frenzy Ryan Mokelke Help identify funny Alfred Hitchcock homage [closed] I believe this is a short from 1973 called Norman Nurdelpick's Suspension: A Tribute to Alfred Hitchcock. I can't seem to find a clip of it anywhere. However, the Academy of Motion Picture Arts and Science (e.g. the Oscars, The Academy Awards, etc) started a Student Academy Awards in 1973. A full list of winners can be found here and Norman Nurdelpick's ... identify-this-movie alfred-hitchcock djmadscribbler Hitchcock, Stewart and Grant This is only a partial answer, but I hope it is of help. The source seems to be François Truffaut, who conducted interviews with Alfred Hitchcock in 1962 and later published a book (even later turned into a film), called Hitchcock/Truffaut. I didn't find the direct quote, e. g. the original audio files from 1962 are online, but I couldn't locate the exact ... casting alfred-hitchcock north-by-northwest vertigo Anne Daunted GoFundMonica My first reaction was it was done with Steadicam, except Frenzy came out in 1972 and Steadicam was first used in 1976. I found a good description of how the shot was done here: "Deconstructing the Tracking Shot". A camera jib was used for the interior shot, and a dolly ws used for the exterior. There is actually an edit in the shot, hidden by the man ... While Hartz may have been a construct based on Lashley, according to TCM, with small changes to the beginning and ending, Hitchcock directed the film as it had been written by Sidney Gilliat and Frank Launder. Any construct would have been theirs: Hitchcock was trying to find a film to end his contract with [Edward] Black so he could sign a deal with ... Only top voted, non community-wiki answers of a minimum length are eligible alfred-hitchcock × 10 film-techniques × 2 directors × 2 identify-this-movie × 1 casting × 1 cinema-history × 1 cinematography × 1 rear-window × 1 north-by-northwest × 1 psycho × 1 rope × 1 the-lady-vanishes × 1 vertigo × 1 suspicion × 1 frenzy × 1
cc/2020-05/en_middle_0016.json.gz/line4810
__label__wiki
0.903183
0.903183
Tag Archives: pigbag Working Week: Does Jazz Go Into Pop? Simon Booth, Juliet Roberts and Larry Stabbins of Working Week I’ve just had the pleasure of writing the liner notes to a really good new live album by Working Week, possibly the premier jazz/pop band of the 1980s. It got me thinking about why jazz has totally disappeared from the charts and why the first half of the ’80s seemed the perfect time for jazz and pop to co-exist, especially in the UK. Here an excerpt from the liner notes: ‘Does jazz go into pop? Judging by the current music scene, the answer would appear to be an unequivocal ‘no’, but, for a golden period in the early-to-mid ’80s, it seemed as if the two styles could happily co-exist. Artists like David Sylvian, John Martyn, Hue and Cry, Elvis Costello, Kate Bush, The Rolling Stones, Sting, Danny Wilson, Swing Out Sister, Joe Jackson and Everything But The Girl smuggled some cool chords into the charts introduced the pop audience to players of the calibre of Kenny Wheeler, Harry Beckett, Lester Bowie, Michael Brecker, Ronnie Scott, Eberhard Weber, Sonny Rollins, Guy Barker, Kenny Kirkland and Branford Marsalis. Sade, Carmel, The Style Council and Matt Bianco’s fusion of jazz and pop wasn’t everyone’s cup of tea but all of them had big hits. The Stranglers’ ‘Golden Brown’ was a jazz waltz (with a few bars of 4/4 thrown in) which got to number one! The advertising and TV industries played ball and a full-scale jazz ‘revival’ was underway, documented in classic 1986 documentary ’10 Days That Shook Soho’. Courtney Pine and Miles Davis shared space on the UK album chart, Wynton Marsalis made the cover of Time and you could even catch Loose Tubes, Tommy Chase and Andy Sheppard on primetime terrestrial TV. DJs Paul Murphy, Baz Fe Jazz, Patrick Forge and Gilles Peterson packed out Camden’s Dingwalls and the Electric Ballroom and young hepcats were dancing to Cannonball Adderley, Roy Ayers, Donald Byrd, Art Blakey and Lee Morgan. Dancers at Dingwalls, London, 1988 Though older British jazzers such as Stan Tracey, Keith Tippett and Mike Westbrook (and some younger ones too) naturally viewed this latest revival with some suspicion, at least it was a relief from the extremely precarious ’70s when rock, funk and fusion almost subsumed jazz. The old guard hung on, gigging in the back rooms of pubs, picking up occasional free improve shows in Europe or moonlighting in West End pit orchestras. But then punk came along, and it affected more than just disenfranchised young rock fans – its DIY ethos breathed new life into jazz too. Bands like Rip Rig + Panic and Pigbag made huge strides in engaging a youthful, receptive audience. Pigbag even made it onto ‘Top Of The Pops’…twice! But it was Working Week, co-founded in 1983 by saxophonist Larry Stabbins and guitarist Simon Booth, who really typified the successful fusion of jazz and pop in mid-‘80s. Formed in 1983 from the ashes of jazz/post-punk outfit Weekend (whose ‘The View From Her Room‘ was a confirmed early-’80s club classic), initially Working Week was almost the de facto house band for the emerging scene, with the infectiously exuberant IDJ dancers often joining them onstage. Brit National Treasures™ Robert Wyatt and Tracey Thorn duetted on classic single ‘Venceremos – We Will Win’ which briefly made an appearance on the UK singles chart in late 1984. The accompanying album Working Nights, featuring other Brit jazz legends Guy Barker, Harry Beckett and Annie Whitehead and produced by Sade’s regular helmer Robin Millar, reached a sprightly number 23 in the UK album chart soon after…’ Read more in the newly-released Working Week live album recorded in May 1985. Much more on the ’80s London jazz/dance scene to come. Posted in Articles, Jazz, Pop, Post-Punk, Working Week / Tagged andysheppard, bazfejazz, britjazz, courtneypine, gillespeterson, patrickforge, paulmurphy, pigbag, riprigandpanic, robertwyatt, tommychase, traceythorn, workingweek / 3 Comments
cc/2020-05/en_middle_0016.json.gz/line4812
__label__wiki
0.82791
0.82791
Smartphones have conquered PCs By David Goldman, staff writerFebruary 9, 2011: 3:55 PM ET NEW YORK (CNNMoney) -- A long-anticipated milestone was hit late last year: Smartphone shipments overtook PCs. Manufacturers shipped 100.9 million smartphones to stores around the globe in the final three months of 2010, compared to 92.1 million personal computers, according to a study released this week by IDC. Over the past two years, smartphone shipments have tripled, while PC shipments grew a comparatively measly 45%. Of course, comparing smartphones to PCs isn't exactly fair. Americans, which make up the largest chunk of the smartphone market, tend to buy new devices every two years after their wireless contracts expire. PCs not only last longer, they are also more expensive. There's also the issue of saturation: Though there's room for growth in much of the world, 80% of Americans own a PC, compared to just 17% who own smartphones, according to Forrester Research. But the trend is also indicative of a sea change in the kinds of devices people are using for their everyday computing needs. Smartphones now come with multi-core microchips and are getting closer to matching the processor speeds of some PCs. But they also do a whole lot more: Smartphones have cameras, 3G connectivity, the ability to download apps and Web content from anywhere, and access to location-based services through GPS. The devices have just one user, so they are intimately personalized. And since they follow their users around all day, they can handle tasks like monitoring your health or starting the engine of your car. 0:00 /1:51Your phone is becoming your wallet Smartphones have become cheaper, more functional and offer more bang for the buck than PCs. That's helped the developing world become the fastest-growing smartphone market. Amazingly, there are 48 million people in the world who have mobile phones, even though they do not have electricity at home, according to Cisco (CSCO, Fortune 500). The trend is taking hold at home too: Smartphone penetration in the United States is expected to match that of PCs by 2015, Frost & Sullivan forecasts. By 2013, more people in the world will access the Internet on a mobile device than on a PC, research firm Gartner expects. Some doubt that PCs will ever completely disappear (who wants to do productive tasks like word processing on a mobile phone?). Others argue that PCs aren't going away, they're just taking on a new form: Some consider the 18 million tablet sales in 2010 to be PC sales, since the devices are more PC-like than smartphones. Of course, others maintain that tablets are just smartphones with a bigger screen. Regardless, envisioning a world without traditional PCs seems less far-fetched every time a new innovation in the smartphone space unveils a previously unheard-of use for the mobile devices. For instance, Motorola's (MMI) new Atrix 4G smartphone, which will be sold on AT&T's (T, Fortune 500) network in early March, has the ability to become a quasi-PC. The smartphone can be purchased alongside a separate screen and keyboard, which are powered by the phone. When the phone is inserted into the dock, the screen and keyboard come to life, and possess the computing capabilities of a low-end netbook. Imagine what smartphones will be able to do just a few years. Perhaps we'll all be plugging them into docks at work, using them for business applications and productivity, taking them with us on the road, and plugging them back into our home docks. Your smartphone will run your life The end of the desktop PC (seriously) You're using more smartphone data than you think First Published: February 9, 2011: 1:23 PM ET Just the hot list include Frontline troops push for solar energy The U.S. Marines are testing renewable energy technologies like solar to reduce costs and casualties associated with fossil fuels. Play 25 Best Places to find rich singles Looking for Mr. or Ms. Moneybags? Hunt down the perfect mate in these wealthy cities, which are brimming with unattached professionals. More Fun festivals: Twins to mustard to pirates! You'll see double in Twinsburg, Ohio, and Ketchup lovers should beware in Middleton, WI. Here's some of the best and strangest town festivals. Play Job Search See 232,273 new jobs added today Key to NBA's success? Embracing tech NBA Commissioner David Stern says the basketball league is looking to expand its use of technology to improve gameplay and increase its audience. Play Selling Roy Rogers' former ranch With 67 acres of land and room for 150 horses, the former ranch of the 'King of the Cowboys' sold at auction for $640,000. Play Track testing tires to find the best Find out how TireRack tests and reviews tires and why choosing the right ones for your car is so important. Play Business of Green CNNMoney NOW Energy Fix My Biz Playbook Rules of Retirement Small & Global Small Biz Makeover Techmate US Indexes Dow 29,348.10 50.46 0.17% Nasdaq 9,388.94 31.81 0.34% S&P 500 3,329.62 12.81 0.39% Treasuries 1.84 0.03 1.49% Data as of 6:34pm ET Advanced Micro Devic... 50.93 1.16 2.33% Bank of America Corp... 34.71 -0.01 -0.03% General Electric Co 11.81 -0.03 -0.25% Ford Motor Co 9.16 -0.01 -0.11% Apple Inc 318.73 3.49 1.11% Data as of Jan 17 Toys 'R' Us brand may be brought back to life Bankrupt toy retailer tells bankruptcy court it is looking at possibly reviving the Toys 'R' Us and Babies 'R' Us brands. More JCPenney names Jill Soltau as its new CEO S&P downgrades debt-riddled GE and GE Capital Land O'Lakes CEO Beth Ford, from the cornfield to the C-suite Land O'Lakes CEO Beth Ford charts her career path, from her first job to becoming the first openly gay CEO at a Fortune 500 company in an interview with CNN's Boss Files. More Goldman Sachs slants research to help Democrats, top White House adviser says China says it will never use its currency as a weapon in the trade war Honda teams up with GM on self-driving cars Honda and General Motors are creating a new generation of fully autonomous vehicles. More The internet industry is suing California over its net neutrality law Bumble to expand to India with the help of actress Priyanka Chopra In 1998, Ntsiki Biyela won a scholarship to study wine making. Now she's about to launch her own brand. More How can I protect my investments from inflation? Whether you hedge inflation or look for a return that outpaces inflation, here's how to prepare. More How to catch up on retirement savings in your 50s How do you know you're really ready to retire early?
cc/2020-05/en_middle_0016.json.gz/line4817
__label__wiki
0.785797
0.785797
About Montreal Film Journal Movie Infos Title: Terminator 3: Rise of the Machines Director: Jonathan Mostow Genre: Sci-fi Action "This is the day of reckoning. Out of the ashes of our world will rise a new generation of Terminators designed to annihilate the human race, and our last hope in the war against machines will be one of them." Ohmigod. Who would have known a few months ago that this would turn out to be anything more than a purely money-driven lackluster sequel? Maybe I'm a hopeless Schwarzenegger fanboy, maybe I'm too paranoid about the repercussions W. Bush' warmongering will have and this end-of-the-world stuff hits too close to my mindset... I don't know, but coming out of "Rise of the Machines" I must say that it blew my mind! "Judgment day, the end of the world, it's today, three hours from now. It's the machines, THEY'RE TAKING OVER." There's this retro B-movie feel, fatalist science-fiction undertones right out of Cold War era anticipation flicks and I looove it. I'm not quite ready to proclaim this to be the best TERMINATOR flick but I do reckon it to be a more than worthy third chapter in the series. Is it perfect? Nah, but I could also bitch about the dated FX of the first film or the preachiness of T2. One thing's for sure, this is much more exciting and thought-provoking than the overblown pretentious messes that were The Matrix Reloaded and Hulk. I'm a lifelong Schwarzenegger fan, and there's no denying that the Terminator is his defining character. To see him appear in a ball of lightning, naked, once again looking to get himself some leather clothes and sunglasses... I was grinning like an idiot, and this kept happening all through the film. That's another thing, even though the stakes are impossibly high, there's still place for humor here. No one takes himself too seriously, certainly not Arnold, who's more than willing to poke fun at himself and at his character. Edward Furlong isn't back to reprise his role as John Connor, GOOD! Whiney little bitch nearly ruined T2, and he's not half the actor that Nick Stahl is. Connor is now older, somewhat wiser, certainly more solemn and driven. He's accepted his destiny, even though the planned time for Judgment Day came and passed already. Connor is still on the run, living "off the grid", waiting for the nightmarish future where he's supposed to rise as a great leader, even though he's not sure whether it will come to be. He's a tragic figure, and Stahl embodies this more effectively than Furlong could ever have. It's a bit odd that Linda Hamilton is missing, as Sarah Connor was the protagonist of the first two pictures, but we can still feel her through this film. After all, she's the one who trained John and tried to make him ready for what he must now face. Furthermore, the addition of the always wonderful Claire Danes to the cast kinda makes up for Hamilton's absence. She plays Kate Brewster, an ordinary veterinarian who knew John as a kid and now finds herself in this apocalyptic mess with him. It's a strong character that's key to the events to come, and the interaction between her and Connor makes the movie all the more involving. Another missing player is Terminator creator James Cameron, who wrote and directed the previous episodes, but I feel Jonathan Mostow is every bit as brilliant an action filmmaker as Cameron ever was. "T3" is a riveting ride always rushing forward, like Mostow's greatish "Breakdown" but with ten times the budget. Instead of rednecks, the antagonists here are high-tech robots such as the one played by Kristanna Loken, one gorgeously badass villain! The T-X is one deadly piece of work, who can not only morph into anything and repair herself at will but also control other machines. This leads to breathtakingly large-scaled scenes of mass destruction, like the epic early chase that levels whole city blocks, and to ruthless metal-to-metal fights with Schwarzenegger's "obsolete design". "Terminator 3" is not all that "deep" or "artistic", but it doesn't really try to be. All that Mostow is out to make is the coolest damn summer blockbuster you could wish for, and damn it if he didn't deliver! "Rise of the Machines" is non-stop action with amazing special effects but, most importantly, a real sense of urgency and non-stop thrills. It feels old school, all violent and badass and uncompromising, like movies used to be before studios started second-guessing every move ("Mkay, let's tone this down to PG-13 so we can make more money"). That Danes and Stahl manage to infuse heart and soul into their characters, that there is interesting talk about fate and destiny and that the ending unexpectedly brings a huge emotional payoff that ties the whole trilogy together, that's just icing on the cake. And they even borrow a one-liner from Commando! "You said you'd let me go!" "I lied." Copyright © 1998-2008 Montreal Film Journal
cc/2020-05/en_middle_0016.json.gz/line4820
__label__wiki
0.717783
0.717783
Dan Delmar: In new-media age, referendums are more divisive than ever Quebec and Turkey may be largely incomparable, but this week brought a reminder of the dangers of dual-option, for-or-against referendums. Dan Delmar, Special to Montreal Gazette Supporters of the 'no' vote, (Hayir in Turkish) one holding a banner of modern Turkey's founder Mustafa Kemal Ataturk, chant slogans during a protest against the referendum outcome, in Istanbul, Tuesday, April 18, 2017. Hundreds of people are queuing in front of Turkey's election board in capital Ankara to submit petitions requesting that the electoral authority reverse a controversial decision during Sunday's referendum to accept ballots without official stamps, as required by Turkish law. Petros Karadjias / AP I trace my earliest political memory to October 1995. I was trying to fit in at a high school in a neighbouring Laurentian town that was significantly more nationalistic and pro-Parti Québécois than anything I had been accustomed to. It was the kind of town that put up flags at every intersection in June and left them up until November. Normally, a nationalist milieu wouldn’t have been an issue for a quiet, curious kid who spoke decent French. But the premier had just blamed a sovereignty referendum loss on “money and ethnic votes,” I was a Sephardic Jew in PQ Country, and Mom drove me to school in a Saab. My hometown was comparatively more diverse and laissez-faire politically, but the region voted narrowly for Quebec to negotiate a “new economic and political partnership” with Canada; not because people felt resentful of or inconsolably alienated from Canadian society, but because they were reasonable people, hard-working and overtaxed, trapped by self-serving politicians into making one of two choices with few hints where either would lead. The societies may be largely incomparable, but I am reminded of this tension and the dangers of dual-option, for-or-against referendums as Turks have just, at least according to their scandal plagued government, voted in favour of a sharp turn toward authoritarianism and away from democracy for the first time in nearly a century. Reductive populism mixed with ethnocentric nationalism and propaganda was also the toxic brew that contributed to Leave forces in the United Kingdom being granted permission to “Brexit” from the European Union (polls show the result would have probably been different today). Donald Trump edging out Hillary Clinton to win the U.S. presidency backed by Russian dezinformatsiya could also be seen as a similarly destructive consequence of populism. With only two effective options to lead the executive branch, divisiveness is unavoidable and progress is slow. Looking at some of the more consequential referendums worldwide in recent times, it’s clear that undemocratic forces are taking advantage of both our innate tribalism, as well as ground-breaking technology (social media, artificial intelligence) designed to maximize the impact of propaganda like never before. In a disinformation age, referendums offer propagandists excellent odds. Quebecers, I would later learn, are thankfully more pacifistic than nationalistic, and thus social tension between the Oui and Non forces has been kept to a minimum; but it nonetheless persists. While my family was always categorically federalist, grateful for Canadian liberals easing restrictions on Jewish immigration, I couldn’t resist asking my parents a taboo question on that eventful, if not mildly traumatic evening: What if you don’t like either side? The exclusionary message of Oui forces helped mould me into a lifelong federalist by default. That loaded choice and the uncomfortable aftermath of a narrow Non win, even as a preteen not yet eligible to vote, turned me and many otherwise independent-minded people into belligerent tribalists on the issue of sovereignty. With this in mind, the festering, nonsensical sovereignist premise — that Quebec cannot achieve its full potential within Canada — continues to be the albatross around the neck of a society that is failing an educated, creative and diverse citizenry. If a leader in the new-media era wants to impose rapid, radical change on a society without the unpleasantness of a coup or war, a fake news-backed referendum campaign now seems to be the most efficient option available. Referendums are by nature divisive, more than ever, and should be called infrequently, if ever. What seems on the surface to be the purest form of direct democracy is in practice today far less democratic or representative of effective, informed public opinion than a typical parliamentary election. I fear for Turks and all peoples battling division, but am consoled by the words of Yogi Berra, who defied binaries: “When you come to a fork in the road, take it.” Dan Delmar is managing partner, public relations with Provocateur Communications. Twitter.com/DanDelmar ‘Turkey has spoken its mind’: Erdogan declares victory in referendum to give him vast new powers Opinion: What Canada should ask itself before joining a North Korean... Opinion: Canada's legalization of marijuana will be a national disaster Josh Freed: Harry and Meghan, here's why you should live in Montreal Macpherson: In Quebec, the language issues keep getting smaller The Right Chemistry: Champion of oregano oil also a conspiracy theorist
cc/2020-05/en_middle_0016.json.gz/line4821
__label__cc
0.588797
0.411203
Tagged: Wilton Lopez Sky Sox fall short to the Redhawks. Oklahoma City Redhawks Vs. Colorado Springs Sky Sox The Redhawks are the triple A Affiliate of the Houston Astros. This was my first game to the Springs this year. This day started really early for me I left my house at 7:15 in the morning to go snowboarding at Keystone. After 19 lift rides and 30,000+ vertical feet and 5 hours of snowboarding I took the 135 Mile drive from Keystone, Colorado to Colorado Springs. I took about 2 hours and 15 minutes. It being Jackie Robinson Day I got on chair 42. It took about 4 runs to sink up and be able to get on this chair 3. After arriving and getting my ticket I did some early Easter Egg hunting out behind Security Service Field! found 10 Baseballs Most Minor League Practice balls and a few Pacific Coast League baseballs. After waiting for Jared to arrive we headed in to the stadium. Christian Friedrich was warming up in the bullpen. I was able to get Wilton Lopez on my Rockies team project since he was sent down a few days ago. It was then time for the game to start. Christian Friedrich throwing the first pitch to the Redhawks Austin Wates. He struck out swinging. Friedrich would give up 2 hits before getting the second out of the inning also a strike out to John Singleton. After a Error by Ryan Wheeler at third and 2 more singles the Redhawks scored 3 runs and Friedrich got out of the inning after facing 8 batters. 3-0 Redhawks The starting pitcher for the Redhawks was Michael Foltynewicz. He also started the game with a strike out his was looking to Jason Pridie. Tim Wheeler would hit a double but would not score, the Sky Sox did get a second base runner on base it was Matt McBride who walked. The Redhawks got the best of Friedrich in the second Ronald Torreyes started the inning with a single followed by a Wates single. Friedrich walked the bases loaded, walking Gregorio Petit. The fourth batter of the inning was George Springer who hit a grand slam to give the Redhawks a 7-0 lead. Springer was called up to the Astros the next day and made his MLB Debut he went 1 for 5 with a walk in the game against the Kansas City Royals. In this game he went 3 for 4 with a walk. After the Springer homer Friedrich settled down and got the next 3 batters out to end the inning. he then pitched well the next 2 innings sitting down 9 Redbirds batters in a row. He would give up a lead off double to singleton in the 5th who would score and the Redhawks had a 8-0 lead. Mike McKenry got things started for the Sky Sox in the 5th with a double. He would score on a Tim Wheeler single. 8-1 Redhawks Wilton Lopez came into pitch for the Sky Sox in the 6th inning. Christian Friedrich left the game after 5 innings giving up 8 hits, 8 runs, walking 1 and striking out 4. After settle in and falling behind the 5 runs he did then have 2 good innings. It still looks like he needs some work but looks like he will be back to the way he pitched 2 years ago soon. Matt McBride led off the 6th for the Sky sox and here he is diving back to first. He would get out at second on a ball hit by Ben Paulsen. The Sky Sox did go on and score 2 runs in the inning. 1 on a Kyle Parker triple that scored Paulsen. Parker then scored on a McKenry single 8-3 Redhawks. The Redhawks scored another run to give them a 9-3 lead in the 7th. The Sky Sox then had a very good inning in the 7th. The first 2 on a Tim Wheeler 2 run home run, ben Paulsen then hit a homer of his own with McBride on base. Kyle Parker hit one for him self to go back to back with Paulsen. 9-8 Redhawks. Rudy Owens came into pitch for the Redhawks in the 6th and was responsible for 5 of the Sky Sox runs the 2 in the 6th and 3 in the 7th. Chia-Jen Lo pitched the rest of the 7th inning for the Redhawks and was responsible for the 2 other runs in the 7th. The Redhawks scored 2 more in the 9th and the Sky Sox scored 1 more in the bottom of the 9th. They also had some base runners in the 8th but were unable to score them. That was it for this one the Sky Sox lost 11-9. This was a pretty good game and the Sky Sox did have a few opportunities to get the lead in this game and like the Rockies had trouble getting the timely runs. Tim Wheeler did come up a triple short of the cycle going 3 for 5 with 3 RBI’s. Mike McKenry also hit well also going 3 for 5 and he had 1 RBI. After the game I took the hour and a half drive back home, in total I drove about 300 miles and spent 5 and a half hours just driving this day. But it was a great day doing 2 of my favorite things to do in Colorado Snowboarding and Baseball. So that is it for this one I will be back at Coors on Friday when the Rockies return from there road trip to San Fran and San Diego. See You Their! Written by mlblogsroxaddict Leave a comment Posted in Uncategorized Tagged with Ben Paulsen, Christian Friedrich, Colorado Springs Sky Sox, George Springer, Houston Astros, Jason Pridie, Kyle Parker, Matt Mcbride, Mike McKenry, MILB, Oklahoma City Red Hawks, Paul Janish, Rafael Ynoa, Ryan Wheeler, Security Service Field, Tim Wheeler, Triple A, Wilton Lopez D.J. and the Rox turned it UP,UP, UP!!! White Sox Vs. Rockies Game 3 of series My 6th Game at Coors. Today being a day game there was no batting practice, but it does mean an opportunity to get some autographs when the pitchers do there work out. I was able to get Brett Anderson and Adam Ottavino on my team project and an additional 8×10 of Anderson I took at spring training. Before the game I also had Charlie Blackmon sign a 8×10 of his head first dive into first on Sunday. Juan Nicasio was the starting pitcher for the Rockies today this is his second start of the season coming of his home opener win on Friday. He started this game well with a ground ball out to second by Adam Eaton. Marcus Semien flew out to left for the second out and Jose Abreu hit a double but was left on base when Dayan Viciedo struck out to end the inning. It was the Rockies turn to bat and 1st. base coach and former Rockies player Eric Young gave high fives to the fans in the first row as he has been doing before the bottom of the first all week. 21 Years ago today he hit a lead off homerun in the Rockies home game in Mile High Stadium in front of a record crowd for a baseball game 80227 fans. The Rockies won that game against the Expos 11-4. Bryn Smith was the winning pitcher and it was the 1st. win in franchise history. Erik Johnson was the starting pitcher for the White Sox. Charlie Blackmon started the game off like only he can with a triple to center field. This was his first triple of the year to go along with his 16 hits 3 double and home run he has hit in the last week, can’t forget his 8 RBI’s and .471 batting average. Blackmon would score on a Carlos Gonzalez single to give the Rockies a 1-0 lead. Nicasio would have a rough inning in the second after getting Conor Gillespie to ground out. he then walked Jose Garcia and Alexi Ramirez hit a double. Charlie Culberson dive after Alexi Ramirez’s double. Trying to tag him out at second. A Tyler Flowers single scored Garcia to tie the game at 1. The White Sox would take the lead 2-1 a few batter’s later when Ramirez scored on a Adam Eaton single. In the second D.J. LeMahieu hit a single with 1 out and scored on a Charlie Blackmon single to tie the game at 2. Blackmon and Eric Young at first after the game tying single. Wilin Rosario take a big swing in the third for a fly out to right. Carlos Gonzalez dives back to first after the Rosario out. Cargo scored on a Nolan Arenado single to get the lead back 3-2. The White Sox would once again take the lead in the 5th inning when Gillaspie hit a single scoring Eaton and Semien. The Rockies went down in order in the fifth. Matt Belisle pitched the 6th for the Rockies and worked very quick and efficiently. During one at bat he was throwing a pitch about every 10 seconds. He got a quick 3 outs all ground ball outs on 12 pitches. Justin Morneau started the 6th with triple. He scored on a D.J. LeMahieu double to right field. On the play Avisail Garcia was hurt diving for the ball it looked like he caught it. But he must of lost control of the ball after hitting the ground it looked like he may have dislocated his shoulder and he was taken out of the game. Adam Ottavino pitched the 7th for the Rockies and also had a very good inning siting down the White Sox in order on only 6 pitches including 3 to strike out Marcus Semien on 3 pitches. The Rockies broke the tie in a big way here is Nolan Arenado scoring the second Rockies run in the 8th inning. Stubbs (Came into game to pinch run for Morneau) and Arenado both scored on this D.J. LeMahieu double. Morneau lead the inning off with a single. Josh Rutledge made his MLB debut for the year in the inning hitting a single to score D.J. He was called up today and Wilton Lopez was sent to Colorado Springs. Michael Cuddyer slides into home after a Carlos Gonzalez double which he and Blackmon singled. Rutledge scored on a Cuddyer single. The Rockies took a 10-4 lead. LaTroy Hawkins came in and pitched to 2 batters in the 9th. Boone Logan made his Coors Debut pitching to the White Sox Paul Konerko. Konerko grounded out to second to end the game. The Rockies won this game 10-4 D.J. LeMahieu was the player of the game going 3 for 4 with 3 RBI’s Charlie Blackmon went 3 for 5 with 1 RBI. Rex Brothers who pitched the last 2 outs in the 8th inning got the win. That is it for the first home series of the year the Rockies went 4-2 on this home stand and have a 5-5 record heading to San Francisco and San Diego on this road trip and will be back next Friday against the Philadelphia Phillies. That is it for this one it has been great to be back at Coors. Thanks, Jared for the title Idea! Written by mlblogsroxaddict Leave a comment Posted in Uncategorized Tagged with Adam Ottavino, Avisail Garcia, Boone Logan, Brandon Barnes, Carlos Gonzalez, Charlie Blackmon, Charlie Culberson, Chicago White Sox, Colorado Rockies, Coors Field, D.J. LeMahieu, Drew Stubbs, Erik Johnson, Josh Rutledge, Juan Nicasio, Justin Morneau, LaTroy Hawkins, Matt Belisle, Michael Cuddyer, Nolan Arenado, Paul Konerko, Rex Brothers, Tyler Flowers, Wilin Rosario, Wilton Lopez Opening Day 2014, Charlie gets his kick’s going 6 for 6! Arizona Diamondbacks Vs. Colorado Rockies Coors Field, Game 1 of 2014 This was my 5th Coors Field Opening Day. I like almost all of them and many other days during the season I arrived at 20th and Blake real early. This year I did not go to breakfast like many other years I just walked around Lodo, as always I did meet up with friends as the day progressed. I first met up with Carlos and Mrs. Los, then John, Rockpile Ranter and Hunter, Douglas, Gary X, EB, Smitty and Cass. Here is X and Mrs. Los doing a running man while Carlos looks all tough and hey John nice sox! So I noticed some new additions to the stadium and that was Banners with milestones on them around the stadium these show Don Baylor and Jim Tracy’s Manager of the years. The photo 2 photo’s above is of National League batting titles these 2 banners are of Larry Walkers in 1998 and Carlos Gonzalez’s in 2010. After having fun out and about Lodo it was time to head into Coors Field. They had some new additions inside as well. They had some more things hangin over the concourse with other first and milestones from the last 21 years of Rockies history. the above and next 2 photos show a few of these set ups. After I went to batting Practice for a round or 2 of the Diamondbacks, it was time for the beginning of the Opening Day festivities on the field. (Did not get any baseballs during BP) The player introductions. above is one of the newest Rockies Justin Morneau high-fiving down the line of starters in this photo with former Twin’s teammate Michael Cuddyer. The players right before the National Anthem. They had the giant flag out on the field here is a photo of before it being spread out. Then it was time to hand out the hardware, Carlos Gonzales and Nolan Arenado’s gold gloves. Just realized they did not do anything for Cuddy’s batting title. Maybe sometime during the weekend. Dinger added a few moves to his regiment he also busted out a cart wheel later on! Members of the Denver Philharmonic played the National Anthem and the new Rockies themes song. The Rockies take the field for the first time at Coors in 2014. Lead by starting pitcher Juan Nicasio. Juan Nicasio throwing the first pitch to the D’backs Gerardo Parra. Parra grounded out followed by a Aaron Hill strike out, the third batter of the inning Paul Goldschmidt walked and Martin Prado flew out to Michael Cuddyer in right field to end the inning Nicasio threw 16 pitches in the inning. Randall Delgado was the starter for the D’backs. Charley (Chuck Nazty) Blackmon started his assault on the D’backs quickly with a double on the third pitch of the game from Delgado. He scored on a Cuddyer single to give the Rockies a 1-0 lead in the 1st. Cuddy would be throw out at second a ground ball hit by Carlos Gonzalez who was doubled up on at first base. Cargo seemed to get out of the batters box a little slow (think he may of been safe if it wasn’t for that) Just saying. Troy Tulowitzki ended the inning by grounded out. Charlie Blackmon scouring the Rockie first Coors Field run of 2014. After Nicasio got the job done in the second sitting the D’backs down in order throwing 15 pitches to the D’backs, Justin Morneua came up for his first at bat. Here he is taking a pitch for a ball during his at bat that he would eventually walk. The Rockies did not score in the second inning. In the third inning look who scored once again, Charlis Blackmon touches home while Cuddy turns at third after a Cargo triple. Cuddy crosses the plate as Cargo slides into third. Juan Nicasio pitch another terrific inning in the 3rd. striking out 2 D’backs and getting out of the inning on 11 pitches. He worked this game real efficiently and kept his pitch count low which seemed to be a problem for him last year. This is why I was mentioning his pitch count after innings. He really seems to be really confident on the mound. The first D’backs run was on a Prado single in the 4th he got out of this inning throwing only 13 pitches for a total of 54 pitches in the game. Last year he probably would have been at about 75 plus pitches and close to being removed from the game. If Blackmon wasn’t doing enough damage to the D’backs he hit a 2 run home run in the 4th to give the Rockies a 6-0 lead. That is 3 for 3 with a Double, Single and a home run. The D’backs would get a run in the 5th inning on a Mark Trumbo lead off home run. (6-1) Rox Delgado was removed after walking Tulo and giving up a single to Morneau in the 5th. inning. He gave up 10 hits 6 runs, walked 2 and struck out 3. Blackmon hit his second double of the game to lead off the 6th inning. He did get caught stealing third base in the inning. Cargo would then only be able to score 2 runs when he hit his home run of the rail in the third deck almost hitting the new Coors Rooftop. (8-1) Rox Brandon Barnes would make his first appearance at Coors after coming over from the Astros in the Dexter Fowler trade. he made a pretty good first impression with his 2 out triple in the 7th inning. Pinch hitting for Nicasio. Nicasio came out of the game with one of his best starts I have seen from him in a few years. giving up 1 run and only 4 hits, striking out 6 in his 7 innings pitched. The Rockies would go on scored 2 more runs in the inning to give them a 10-1 lead. Barnes scored on a Charlie Blackmon single for his 2nd RBI of the game. He also scored and it ws his 4th time around the bases on the day. Brandon Barnes making the turn at second heading to third for his 7th inning triple. Chad Bettis pitched the 8th inning for the Rockies and let up a run the Rockies had a 10-2 lead after the inning. He throw 24 pitches to the 6 D’backs batters he faced. Charlie Blackmon did not let us down with his 8th inning at bat. He hit his third double of the game scoring 2 more runs for his 4th and 5th RBI of the day. So he hit 3 doubles, 2 single and a home run for a total of 6 hits, 5 RBI’s and he scored 4 times. He was involved in 9 of the Rockies 12 runs in the game. This was also only the second time a Rockie has gone 6 for 6 and the 66th time in MLB history. The first Rockie to do it was Andres Gallarager. Wilton Lopez pitched the 9th for the Rockies Mark Trumbo lead off the inning with a single, A.J. Pollack would also single but both would remain and base as Parra ground back to Lopez and he would toss to Morneau at first for the final out of the game. The Rockies for the 13th time in their history would win there home opener 12-2. The Rockies got to shake hands for only the second time of the season. Since they lost 3 out of the 4 against Miami earlier in the week. Things do seem to be looking up for this team especially with Charlie Blackmon leading off and playing center field. Juan Nicasio helped with his incredible pitching performance, which I am sure the run support helped. That is it for this one 80 more to go here at Coors and 156 left in the season. the Rockies have 2 more against the D’backs at Coors and 3 against the Chicago White Sox on this home stand. Also hopefully I will be able see the new Roof Top sometime this weekend. Did not make it up there this game. Remember you can follow me on twitter @roxaddict. That is when the cell phone is working at Coors. Even with improvements of the cell antennas in the stadium it was still not performing well during the game with the crowd hopefully it will work better when the crowd is a little thinner. Written by mlblogsroxaddict Leave a comment Posted in Uncategorized Tagged with 6 for 6, Brandon Barnes, Carlos Gonzalez, Chad Bettis, Charlie Blackmon, Colorado Rockies, Coors Field, D.J. LeMahieu, Drew Stubbs, Juan Nicasio, Justin Morneau, Michael Cuddyer, Nolan Arenado, Opening Day 2014, Troy Tulowitzki, Wilin Rosario, Wilton Lopez 15 in the sun, a day game marathon! Cardinals vs. Rockies My 66th game at Coors this season 76th with road trip 79th with the Springs. This was a day game so no BP. Did get to the stadium early for some graphs got a few Cardinals on a photo I have of Busch stadium. I ended up with 8 autographs on the photo. I did make some progress before the game I got Colin McHugh on my team 16×20 leaving only Roy Oswalt that I need on it. I now have 51 players and coaches autographs on it. There was no batting practice today. So this game was a marathon and I have a lot of photos from this game. Todd Helton was the first out on the field, as the Rockies took the field. Roy Oswalt was the starting pitcher for Rockies after walking Matt Carpenter. Jon Jay flew out to center field and Matt Holliday did also. With Carlos Beltran batting Oswalt threw over to Todd Helton at first who fake the throw back to Oswalt and tagged Carpenter it was a great play and funny to watch especial that it was done to another first baseman! A closer view of Oswalt pitching in the first. Matt Holiday making contact during his first inning at bat. Michael Wacha was the starting pitcher for the Cardinals. After Charlie Blackmon hit a single, Wacha struck out the next three batters to end the 1st. inning. Charlie Blackmon getting ready to dive back to first. Corey Dickerson take a pitch high for a ball. He was one of the batters that struck out in the first. Amazingly enough that the home plate umpire got it right. Yorvit Torrealba was behind the plate for this game. Here is Yadier Molina questioning a strike call during his 2nd inning at bat. Tony Cruz would end the inning with a pop out to Todd Helton. Todd Helton would lead off the 2nd inning with a double his 589th of his career and 18th of the season. Yorvit Torrealba questions a strike call by the home plate umpire. See a trend here this guy did not have a consistent strike zone and a pitch that was a strike one time was a ball another. This did happen a lot throughout the game. Todd Helton scored on a Torrealba single. to put the Rockies on the board 1-0. Helton high fives Jonny Herrera after he scored. Charlie Culberson would also score to give the Rockies a 2-0 lead. 3 runs to tie the game in the inning. Carlos Beltran hit a single that scored Jon Jay. (4-1) Rockies Molina hit a single to score Holliday (4-2) Rockies Tony Cruz hit a double to Score David Freese. (4-3) Rockies Matt Holiday would hit a single to tie the game in the 5th inning scoring Jon Jay from second, which he stole after getting on base with single. Matt Holliday fist bumps first base coach Chris Maloney. Taking a lead at first. Charlie Blackmon hits a double in the 8th inning. Corey Dickerson hits a triple scoring Blackmon and tying the game at 5. After the Cardinals scored a 6th run in the ninth….. …Todd Helton hit a solo home run to tie the game at 6. Yorvit Torrealba give him a big hug after crossing the plate. Jonny Herrera hit a double with 2 outs in the 9th. Ryan Wheeler grounded out to the pitcher Edward Mujica to end the inning and we headed for some free Baseball. Bothe teams went down in order in the 10th. Matt Belisle pitched the 10th for the Rockies and Edward Mujica continued to pitch for the Cardinals in the inning. Todd was going for the fences in the in the 11th with a few hard swings that almost took his helmet off. This was the second swing that this happened to his helmet. Charlie Culberson hit a single in the inning. After a very questionable out in the 12th Walt Weiss came out to argue a call. Jonny Herrera hit the ball and then kicked it the ump said it was in play and Jonny argues that it was in foul territory. D.J LeMahieu hit a lead off single in the bottom of the 13th inning. Tulo was walked in the inning and they were both left on base. The first out of the inning was a bunt attempt by Corey Dickerson which he popped out to Daniel Descalso. The Cardinals once again did not score in the 15th D.J. LeMahieu would once again get on base by hitting a single and Corey Dickerson who should have swung in the 13th and popped out on a bunt. Got to swing this time and he made it count! D.J. LeMahieu makes the turn at third and heading to home. As he started his slide into home the ball went passed Yadier Molina. The tag with ball rolling away. He over slide home and Fernando Salas picks up the ball. He dove back….. …and was safe and the Rockies won 7-6. The Dugout emptied quickly!!! Corey Dickerson ended up on third base for a walk off triple. His first walk off of his MLB career I am sure that it will not be his last. I have seen him also walk of in Ashville in 2011. He seems to handle the presser situation well and has been hitting timely and well since his call up. The team celebrates in the infield and the swarm Corey. Jordan Pacheco got knocked over as Carey escapes from the crowd. He than high-five Tulo and the crowd caught up with him! It was great to see such an exciting game and they made it worth staying for the 15 inning!! It was nice to see some very good pitching from the bullpen in these late innings to keep them in the game and that they were able to put together a few good offensive innings to get back in this game. It was a great day at Coors had a lot of fun this game. With this win the Rockies and Cardinals split the 4 game series. The Rockies used 10 pitchers in this game Oswalt pitched 4 and 2/3rd. The Bullpen combined for 10 and 1/3rd innings. The Cardinals Wacha also only pitched to the 5th and they used 10 pitches. The Rockies used 14 different players at the plate and the Cardinals used 15. Another notable thing was Charlie Blackmon going 4 for 8 this game. LeMahieu, Culberson and Herrera all went 3 for 7. The Rockies had 21 hits on their 7 runs. So that is it for this one. I was also at Coors for the weekend series against the Diamonbacks and will be at the final 2 home games of the season against the Boston Red Sox. Written by mlblogsroxaddict 1 Comment Posted in Uncategorized Tagged with Adam Ottavino, Chad Bettis, Charlie Blackmon, Charlie Culberson, Colorado Rockies, Coors Field, Corey Dickerson, D.J. LeMahieu, Dexter Fowler, Drew Pomeranz, Extra Innings, Jonny Herrera, Jordan Pacheco, Josh outman, Josh Rutledge, Matt Belisle, Rex Brothers, Roy Oswalt, St. Louis Cardinals, Todd Helton, Troy Tulowitzki, Tyler Chatwood, Walk Off, Wilton Lopez, Yorvit Torrealba Chacin dominates the Giants! Giants vs. Rockies Game 3 of series. Today got to the game late and missed most of Batting Practice. Jhoulys Chacin was the starting pitcher for the Rockies. He totally dominated the Giants in this game he sat down 6 straight batters in the first 2 inning including 4 strike outs. Madison Bumgarner was the starting pitcher for the Giants. he started the game by striking out the Rockies lead-off man Charlie Blackmon. D.J. LeMahieu reached base on an error by Brandon Belt at first. The Rockies would get the board in the 2nd. Wilin Rosario lead off with a single and he scored on a Nolan Arenado double, it was Arenado’s 24 of the season. Wilin Rosario scoring the Rockies first run of the game. The Giants would get a runner on base in the 3rd. it was Brandon Crawford on an error by Troy Tulowitzki. They would get 2 more runners on in the 4th inning. Brandon Belt walked to lead off the innings. Buster Posey would reach on an error by Tulo, his second of the game. Belt would advance to third. Belt would score when Hunter Pence hit into a double play getting Posey out at second and himself at first. The game was tied at 1. Chacin pitching in the 4th inning to Hunter Pence with Posey on first and Belt on third before the double play. Tulo turning the double play at second. In the 6th inning people started noticing that something special was happening her at Coors despite the run and the 4 base runners Chacin had not allowed a hit in this game. Here he is pitching his 70th pitch of the game to Marco Scutaro. Scutaro was the second batter of the inning a Gregor Blanco lead-off with a fly out to center field. Buster Posey struck out to end the inning and The No-No was still intact. It was interesting to watch the crowd starting to get into the game as they were realizing what was happening. We actually started talking about the No Hitter in the second jokingly and now it was the end of the 6th inning. Posey walking off after the strike out. Jhoulys Chacin walking back into the dugout after the 6th inning. Madison Bumgarner walking off the field after being removed from the game by Bruce Bochy. He pitched 5.1 innings giving up 5 hits, 4 runs, walking 1 striking out 6. Yorvit Torrealba running to second as Nolan Arenado runs third. The double scored Tulo and Rosario to give the Rockies a 3-1 lead. Torrealba celebrates the double at second. Really Like these 2 shots. He just show so much enthusiasm when he makes the big plays. Jean Machi pitching for the Giants after Bumgarner was taken out of the game. Jhouys Chacin contributed with a RBI on a force out at second to get Culberson out at second and Chacin beat the double play at first Arenado scored and Yorvit moved to third. (5-1) Rox Chacin pitching in the 7th inning. With 2 outs Brandon Crawford got the first hit of the game a bloop to shallow center to break up the No, No. It was great to be able to see this game. Chacin pitch unbelievable and is really starting to show how good of a pitcher he is and what he could accomplish in the future. Chacin pitched a complete 7 innings, he only gave up the 1 run to Crawford and 1 run in the 4th because of the errors. He struck out 9 and walked only 1. Wilton Lopez came into pitch in the 8th, Who pitched to 3 batters getting 1 out and giving up 2 hits and 2 runs. Josh Outman came in to pitch to Brandon Belt who hit a ground rule double scoring Gregor Blanco. That was 1 of the runs that Lopez was responsible for. Matt Belisle Came in and faced 3 batter giving up a single to Hunter Pence scoring Belt for the 3rd Giants run of the inning. (5-4) Rox Rex brothers show above came in to the game in the 9th inning and struck out Joaquin Arias and Brett Pill. Arias came in for Crawford and Pill for Roger Kieschnick. Hector Sanchez grounded out to second to end the game and The Rockies would get the win and win the series against the struggling Giants 5-4. What an incredible game for Chacin and the Rockies it was nice to have some excitement on the pitchers side of the game usually it is cheering for a lot of offence. Rex Brothers and Yorvit with a big hug after the win and Rex’s 14th save of the season. That is it for this one. The Rockies take on the Reds this weekend and I miss an Important game. Check out the excitement in the next few post’s. See You at Coors! Written by mlblogsroxaddict Leave a comment Posted in Uncategorized Tagged with Charlie Blackmon, Charlie Culberson, Colorado Rockies, Coors Field, D.J. LeMahieu, Jhoulys Chacin, Jordan Pacheco, Josh outman, Matt Belisle, Michael Cuddyer, MLB, No Hitter, Nolan Arenado, San Fransisco Giants, Troy Tulowitzki, Wilin Rosario, Wilton Lopez, Yorvit Torrealba Watch out for that ……nevermind. Poor wall! San Fransisco Giants vs. Colorado Rockies Today was the first gae of what seemed to be the never-ending road trip. It was 3 series on the east coast which means I missed a lot or most of the games played with the earlier start time. It was 12 days that they were away but it seemed like an eternity, So I was more than glad to be back at Coors. As I headed into batting practice a ball immediately flew out to the pavilions landed a few rows behind me and took a big bounce to the concourse. I ran up the stairs and grabbed it as someone was running down the concourse to also get it. I grabbed it and the dude was like really you are going to take it? As many of you guys know I hate when people think that the ball is theirs because they were within 10 feet of getting the ball and did not. So I tossed him the ball, I am kinda over arguing with these people about a ball so I figured I would give it up. Just don’t expect this to become a habit! So that was my first one, within a few minutes another headed my way and landed a few rows from me and I was able to snag it for my second ball of the game. This day was turning out to be a great batting practice. I was in the stadium not even 10 minutes and had already snagged 2. The Rockies were than done and I thought I may get a ball or 2 from the Giants their first group was right heavy and it included Buster Posey and Hunter Pence. They did hit a few out and I did not snag any more this batting practice. In the process of running around trying to get a ball from the Giants I ended up losing the ball I kept. Later on someone told me how they found a ball in the first row and gave it to a kid. So well I got a few to add to my numbers but not to my collection! After Bp like any other day I headed over to the wall to see if I could get any autographs and i ended up getting a Todd Helton photo I recently printed up signed. Juan Nicasio was the starting pitcher for the Rockies, his first pitch to the Giants Gregor Blanco was a ball. Juan did strike him out for the first out of the inning. The next batter Marco Scutaro hit a double. Nicasio then struck out Brandon Belt for the second out and really seemed to have his stuff. He then did walk Buster Posey but came back to strike out Pablo Sandoval to end the inning. He worked out of the 2 runners on and struck out 3 great first inning performance by Juan. Barry Zito was the starting pitcher for the Giants. Dexter Fowler started with a lead off single and was then out at second after trying to steal. It was close but he was called out. He was removed from the game in the second because of something wrong with his knee which happened during the steal attempt. Michael Cuddyer than hit a hard-line drive to right field which Hunter Pence had a run on till the wall got in his way, no it was not a homer it stayed in and Hunter hit the wall pretty hard and did not make the catch. This is a photo from immediately after hitting the wall. The Giants trainer and manager came running out to see if he was OK, he was down a while. He did stay in the game. I think it was the magic trainers towel that cured him of what ever injury he had. We always joke about how the trainers run out with the towel but what is it really for if there is not a cut or something. With Cuddy on third Wilin Rosario came to bat and he grounded to Sandoval at third for the third out of the inning. Nicasio then had another good inning in the second. He struck out Brandon Crawford, followed by a pop out by Francisco Peguro and struck out Zito for the third out. 5 strike outs in the first 2 innings. Helton would get the Rockies on the board in the second with a 2 run home run for his 2497 hit of his career. Arenado lead the inning off with a single. Todd is now 3 hits away from #2500. Nicasio faced 4 Giants batters in the 3rd walking Scutaro and giving up a hit to Brandon Belt. Posey hit into a double play to end the inning. Charles Blackmon who replaced Dexter Fowler in the second inning started the third inning off with his 4th home run of the year. To give the Rockies a 3-0 lead. Another one of those great Coors sunsets. Nicasio had another 1,2,3 inning in the 4th and struck out 2 more Giants batters. In the 4th inning with Arenado on third, Helton on second (reached base on a walk) and Charlie Culbertson on first Jonny Hererra hit a line drive over Brandon Crawfords head that caught Helton off guard looked like it was going to left for a single. Crawford grabbed it and threw back to second where Scutaro was covering the bag. Helton made it back safe on the high throw. Juan Nicasio added to his cause in the inning with one out and base’s loaded he hit a single to score Arenado from third to give he and the Rockies a 4-0 lead. Arenado crossing home for the Rockies 4th run. Zito pitching with Todd on third and Nicasio on first. Culbertson was also on second, but not in photo. Helton went on and scored in the inning. To give a 5-0 lead. Wilin Rosario hit a double with 1 out in the 5th. He was picked of at second for the second out and Arenado flew out to left to end the inning. Wilton Lopez came in and pitched in the 7th inning for the Rockies. Nicasio pitched 6 complete striking out 9, walking 2, hitting 2 batters on 5 hits giving up no runs! Lopez struck out Scutaro to end the 7th facing only 3 batters and recording 2 strike outs in the inning. Jeff Francis cam into pitch for the Rockies in the 9th to make things interesting! Sandoval lead off the inning with a fly out to right. Looks like Cuddy misplayed it slightly but came up with the catch! After getting the 1st 2 batters out he had a tough time with out #27 of the game. Peguero got a single and advanced to second on an offense indifference (stole the base without anyone caring)! Joaquin Arias hit a pinch hit double to score the run. Peguero scoring the Giants first run in the 9th inning 6-1 Rox Then the 27th out came Finally came when Blanco flew out to Blackmon in center to end the game. The Rockies 6th run came in the 7th, just incase you were wondering how the score was 6-1!!! So that is it for this first game back at Coors for this home stand. Well See you at Coors. Written by mlblogsroxaddict Leave a comment Posted in Uncategorized Tagged with Charlie Blackmon, Charlie Culberson, Colorado Rockies, Coors Field, Corey Dickerson, Dexter Fowler, Hunter Pence, Jeff Francis, Jonny Herrera, Juan Nicasio, Michael Cuddyer, Nolan Arenado, Ryan Wheeler, San Fransisco Giants, Todd Helton, Wilin Rosario, Wilton Lopez Padres end the streak. Padres vs. Rockies Today I attended the game with someone who I very rarely mention and is actually a very important person to make this all happen. It was my boss because of her awesome ability to juggle schedules and make it possible for me to attend as many of the Rockies home games as possible. So far I have not missed a home game; I have been in town for all year. So if you remember back in May I attended a game with most of the people including my boss to the game this game I brought just my boss, as she says “It is to kiss butt because I let him go on a month vacation”! So it was because she gave me the time to be able to hop in my truck and drive around the country watching baseball games. So this was my thank you to her for being so awesome!!!!! Thanks you for making this happen more than you ever could imagine! You Rock! So enough Butt kissing there was some baseball to write about. Jeff Manship was the starting pitcher for the Rockies this was his second start for him this season. his first start was in NY against he Mets. This photo was a photo during the first inning which means I messed up first pitch which looked like this. So he started the game with a single to Will Venable. Venable diving back to first after his single lead-off single. The Rockies would get the next 2 batters out and then Yonder Alsonso hit a single and scored Venable. (1-0) Padres Eric Stultz was the starting pitcher for the Padres. Eric Stultz was with the Rockies back in 2011 spent most of the year in the Springs and played 6 games with the Rockies. He did not have the best of starts. Dexter fowler got things going with a leadoff single, D.J. LeMahieu followed with a single and Troy Tulowitzki walked. Wilin Rosario would get the first RBI for the Rockies, when he hit a single that scored Fowler and LeMahieu. The Rockies took a 2-1 lead. Nolan Arenado flew out to center field and Todd Helton hit a single, that single scored Tulo. A Charlie Culbertson single would score Rosario Charlie Blackmon popped out to short and Manship the grounded out. The Rockies finished the inning with a 4 runs. (4-1) Rox The Padres would once again take the lead in the second with 4 runs. Nick Hundley would hit a 2 run home run scoring himself and Jaff Decker who walked before Hundleys at bat. The next 2 were with some small ball Stultz got on base with a single and he scored on a Venable single scored Stultz and a Alexi Amarista single scored Venable for 4 runs in the inning. (5-4) Padres If that was not enough the Padres Jedd Gyorko hit a solo home run to give the Rockies a 6-4 lead. In the 3rd or 4th inning we headed to the upper deck to see one of her friends who were sitting up there and The boss wanted to test out here new super cool wide angle lens. 10 MM lens gets like the whole stadium in the photo from the upper deck. I got a few shots of the game from up there. Manship pitching in the 4th inning. Nolan Arenado started the 5th inning for the Rockies with a triple. He scored 2 batters later on a Charlie Culbertson sac-fly to left. (6-5) Padres Michael Cuddyer came in to pinch hit for Manship in the 5th inning. He hit back to the Padres pitcher Tim Stauffer for an out at first. Stauffer replaced Stultz in the 5th inning. Adam Ottavino came in to pitch in the 6th inning. The Padres did score a 7th run in the sixth. (7-5) Padres. Jeff Manship left the game giving up 6 runs on 8 hits including the 2 home runs, walk 2 struck out none. The Rockies went down in order in the 6th inning. Walt Weiss came out after Tulo struck out looking. Now that Tulo is getting a rep for arguing and did get thrown out on the road last week Weiss came out to protect him. Neither team did anything in the 7th and the Rockies with 2 outs looked like they may get something going. After the 2 Charlies grounded out Corey Dickerson would hit a triple off of the Padres Luke Gregerson. After the hit the Padres would bring in ex- Rockies Huston Street. The inning would end and Dickerson did not score. Dickerson on third with Street pitching after his 8th inning triple off Gregerson. Wilton Lopez sat the Padres down in order in the 9th and the Rockies also went down in order against the Padres and they would win the game 7-5. It put an end to their 4 game winning streak but they are 4-1 on this home stand. This was a pretty good game despite the loss. I would like to see the win since they have been playing well since that really bad road trip to the East coast and the not so good home stand against the Cubs, Marlins and Brewers. Well that is it for this one. Have another to go from this series. See You a Coors! Written by mlblogsroxaddict Leave a comment Posted in Uncategorized Tagged with Adam Ottavino, Charlie Blackmon, Charlie Culberson, Colorado Rockies, Coors Field, Corey Dickerson, D.J. LeMahieu, Dexter Fowler, Edgmer Escolona, Jeff Manship, Josh outman, Michael Cuddyer, Nolan Arenado, San Diego Padres, Todd Helton, Troy Tulowitzki, Wilin Rosario, Wilton Lopez
cc/2020-05/en_middle_0016.json.gz/line4824
__label__wiki
0.830754
0.830754
Streaming in Canada on Amazon Prime Video, Apple TV+, Crave, Disney+ and Netflix [December 2 to 8] Marriage Story, the critically-acclaimed drama that premiered at TIFF, is now available on Netflix Canada By Bradly Shankar@bradshankar Every week, MobileSyrup goes over some of the most notable movies and TV shows to recently hit Canadian streaming platforms. This column typically focuses on content from Amazon Prime Video Canada, Crave and Netflix Canada, with other streaming services mentioned when relevant. We have a big one for you this week, with new content hitting those three services as well as Apple TV+ and Disney+. Additionally, the column will highlight shows or movies that are made in Canada, involve notable Canadian cast or crew and/or are filmed in Canada. Amazon Prime Video Canada The Marvelous Mrs. Maisel (Season 3) [Amazon Original] Midge embarks on a standup comedy tour with Susie as Joel tries to pursue his own dreams. The Marvelous Mrs. Maisel was created by Amy Sherman-Palladino (Gilmore Girls) and stars Rachel Brosnahan (House of Cards), Alex Borstein (Family Guy) and Michael Zieglen (Rescue Me). Amazon Prime Video Canada release date: December 5th, 2019 Runtime: Eight episodes (49 minutes to 1 hour, 16 minutes each) Rotten Tomatoes score: 83 percent Stream The Marvelous Mrs. Maisel‘s third season here. Amazon Prime Video is included at no additional cost with an Amazon Prime subscription, which is priced at $79 CAD/year in Canada. The full list of movies and shows hitting Amazon Prime Video Canada this month can be found here. Hala (Apple TV+ Original] A seventeen-year-old Pakistani-American teenager struggles to balance living her own life while fulfilling familial, cultural and religious obligations. Hala was written and directed by Minhal Baig (1 Night) and stars Geraldine Viswanathan (Blockers), Jack Kilmer (Lords of Chaos), Gabriel Luna (Terminator: Dark Fate) and Purbi Joshi (Damadamm!). Apple TV+ release date: December 6th, 2019 Runtime: 1 hour, 33 minutes Stream Hala here. Truth Be Told [Apple TV+ Original] A true-crime podcaster reinvestigates an old murder case after it’s suggested that the man who was imprisoned may actually be innocent. Truth Be Told was created by Nichelle Tramble Spellman (The Good Wife) and Octavia Spencer (The Help) Aaron Paul (Breaking Bad), Lizzy Caplan (Masters of Sex), Elizabeth Perkins (Weeds) and Ron Cephas Jones (This Is Us). Apple TV+ release date: December 6th, 2019 (first three episodes) Runtime: 10 episodes (around one hour each) Stream Truth Be Told here. An Apple TV+ subscription costs $5.99/month in Canada. Killing Patient Zero This Canadian documentary tells the story of Gaëtan Dugas, the French-Canadian who was wrongfully identified as “Patient Zero” of the AIDS epidemic in North America. Killing Patient Zero was directed by Toronto-born Laurie Lynd (Degrassi). Crave release date: December 2nd, 2019 Rotten Tomatoes score: N/A Stream Killing Patient Zero here. David Foster: Off the Record The second Canadian documentary to hit Crave this week focuses on David Foster, the prolific musician and record producer from Victoria, B.C. The film takes a deep dive into the Grammy winner’s career and features interviews with many of his friends and collaborators, including Quincy Jones, Barbra Streisand, Lionel Richie, and, of course, fellow Canadians Céline Dion and Michael Bublé. David Foster: Off the Record was directed by Montreal-born Barry Avrich (Caesar and Cleopatra). Crave release date: December 6th, 2019 Stream David Foster: Off the Record here. Jann Arden: One Night Only Calgary-born singer-songwriter Jann Arden brings music and conversation to Toronto’s Great Hall. Genre: Comedy, music Stream Jann Arden: One Night Only here. The L Word, the acclaimed LGBTQ mid-2000s drama series, is back in this sequel series set ten years later in Los Angeles. Jennifer Beals, Kate Moennig and Leisha Hailey all reprise their original roles in the Ilene Chaiken-created series. Crave release date: December 8th at 10pm ET (first episode, new episodes every Sunday) Runtime: Eight episodes (around 44 minutes each) Stream The L Word: Generation Q here. A standard Crave subscription costs $9.99/month, with Starz costing another $5.99/month and HBO an additional $9.99/month. The full list of movies and shows hitting Crave this month can be found here. One Day at Disney [Disney+ Original] One Day at Disney follows one day in the lives of various Disney employees as they go about their jobs. The film was directed by Fritz Mitchell (30 for 30) and narrated by Sterling K. Brown (This Is Us). It’s also worth noting that new One Day at Disney shorts will be released on Disney+ every week. Disney+ release date: December 3rd, 2019 Stream One Day at Disney here. A Disney+ subscription costs $8.99/month or $89.99/year in Canada. The full list of movies and shows hitting Disney+ this month can be found here. The Confession Killer [Netflix Original] This docuseries examines the truth and consequences of Henry Lee Lucas’ confession of committing hundreds of unsolved murders. Netflix Canada release date: December 6th, 2019 Runtime: Five episodes (45 to 50 minutes each) Stream The Confession Killer here. Fuller House (Season 5) [Netflix Original] After having their first baby, Jimmy and Steph learn what it’s like to be parents. Note that this is only the first half of Fuller House‘s fifth and final season. The remaining nine episodes will release sometime in 2020. Fuller House stars Candace Cameron Bure, Jodie Sweetin, Andrea Barber, reprising their roles from Full House. Runtime: Nine episodes (24 to 35 minutes each) Stream the first half of Fuller House‘s fifth season here. Marriage Story [Netflix Original] An actress and her theatre director husband go through a coast-to-coast divorce and fight over custody of their son. Marriage Story was written and directed by Noah Baumbach (The Meyerowitz Stories) and stars Scarlett Johansson (Jojo Rabbit), Adam Driver (Star Wars: The Last Jedi), Laura Dern (Big Little Lies), Alan Alda (The Aviator) and Ray Liotta (Goodfellas). It’s worth noting that Marriage Story won the Grolsch People’s Choice Award runner-up prize at this year’s Toronto International Film Festival. Runtime: 2 hours, 16 minutes Stream Marriage Story here. Tiffany Haddish: Black Mitzvah [Netflix Original] Actress-comedian Tiffany Haddish celebrates her 40th birthday with a Netflix special filled with singing, dancing and raunchy jokes. Netflix Canada release date: December 3rd, 2019 Genre: Stand-up comedy Stream Tiffany Haddish: Black Mitzvah here. V Wars [Netflix Original] A scientist and his best friend struggle to stop a deadly virus that could lead to a war between humans and vampires. V Wars was created by Montreal-born William Laurin and Glenn Davis (Aftermath) and stars Ian Somerhalder (The Vampire Diaries), Vancouver-raised Adrian Holmes (19-2), Toronto-born Peter Outerbridge (Orphan Black) and Toronto-born Laura Vandervoort (Smallville). It’s also worth noting that the show was filmed in various parts of Ontario, including Toronto and Sudbury. Stream V Wars here. A ‘Basic’ Netflix subscription costs $9.99/month, a ‘Standard’ subscription (HD-supported) costs $13.99/month and a ‘Premium’ membership is priced at $16.99/month (4K-supported). The full list of movies and shows hitting Netflix Canada this month can be found here. This is probably the biggest week in terms of new content on Canadian streaming services that we’ve had since this column started! With that said, what are you planning on streaming this week? Let us know in the comments! Image credit: Netflix Bong Joon Ho and Adam McKay working on ‘Parasite’ series for HBO: report Apple TV+ gets first major win at the Critics Choice Awards, Netflix wins nine CRTC chair says international streaming giants will have to fund Canadian content Streaming in Canada on Amazon Prime Video, Crave, Disney+ and Netflix [January 6 — 12]
cc/2020-05/en_middle_0016.json.gz/line4826
__label__cc
0.633402
0.366598
Spotlight ~ Excerpt & Giveaway ~ Desert Bound by Elizabeth Hunter October 26, 2014 elisangelisLeave a comment Book: Desert Bound Series: Cambio Springs #2 Author: Elizabeth Hunter Can you turn the clock back on your first love? Would you even want to try? Alex McCann and Teodora “Ted” Vasquez left Cambio Springs together. Ted came back. Alex didn’t. Now, years later, the future alpha of the McCann wolves has returned with plans to bring new life to the dying desert community. Plans that could change everything for the isolated enclave of shapeshifters in the California desert. Some love the plan. Others hate it. As the town’s doctor and one of the strongest daughters in the cat clan, Ted has her own concerns about exposing her community to outsiders. The two former lovers are at each other’s throats. And everyone is watching to see what happens. But when murder once again strikes Cambio Springs, can they overcome their past to help the community they both call home? And can the love they shared once burn again when so many stand against it? Review ~ Because I Can by Tamara Morgan October 23, 2014 October 23, 2014 elisangelis2 Comments Book: Because I Can Series: Montgomery Manor #3 Author: Tamara Morgan Published: Carina Press, October 13, 2014 John “Monty” Montgomery is a workaholic. The oldest of the Montgomery children, he’s been working by his father’s side building the family hotel chain almost his entire life. His commitment to the business leaves no time for romance. But that’s about to change. Georgia Lennox has been fantasizing about Monty ever since she started her gig as handywoman at Montgomery Manor. She figures Monty is way out of her league, so she hasn’t dared to act on her feelings — until he offers to help fill a volunteer shortage on her latest project, building houses for families in need. Sparks fly as they spend time together, first on the job site, then off. But Georgia’s not your typical frilly and feminine society girl. Hoping to find a way to fit in with the Montgomerys, she agrees to be made over by Monty’s sister for an event. But if she lets her rough edges be smoothed away, will she be letting go of the very thing that attracted Monty in the first place? This story came at such a right time that it took me by surprise. And I do like surprises so it was pleasant. I was already looking forward to workaholic John ‘Monty’ Montgomery the Third and Montgomery Manor’s skilled handywoman Georgia Lennox, but this was so much better than I expected. First off, Monty was the epitome of a good hero, hell, a perfect hero. The kind of hero I’d want all my heroines to end up with, the kind of hero I’d love to read in many upcoming books, over and over again. Spotlight ~ Excerpt & Giveaway ~ The Motorcycle Clubs series Series: The Motorcycle Clubs Authors: Ella Goode, Ruby Dixon, Kati Wilde Genre: Erotic Romance Release Date: September, 2014 His Wild Desire by Ella Goode I’m not supposed to want him, but I do. I’m not supposed to need him, but I can’t stop. I’m not supposed to love him, but my heart won’t listen. Most of all? I’m definitely, under no circumstances, supposed to sleep with him. Grant “Wrecker” Harrison spent three years of his life locked away. He’s out and he’s tired of hiding. He wants everyone, even his father Judge, President of the Death Lords MC, to know she’s his. Chelsea Weaver loves Grant even though she knows its wrong. She knew it was wrong when she gave him her virginity and she knows it’s still wrong three years later…because Grant’s her stepbrother and Judge is the only father she’s ever known. Buy this book: Amazon Off Limits by Ruby Dixon He shouldn’t touch me, but he does. Late one night, in the middle of danger, he makes me feel things I shouldn’t. And I know I shouldn’t want more…but I do. Because hooking up with me? It could cost him his life. Lucky…isn’t. In fact, she’s considered ‘off limits’ to the Bedlam Butchers because she’s caused them nothing but bad luck in the past. As a bonus? She’s also the president’s kid sister. Single and lonely? That’s Lucky’s way of life. Now, the Eighty-Eight Henchmen are harassing her and they’re out for blood. Solo…is. In a club where pairing up with a brother to watch your back is mandatory, Solo still hasn’t gotten over his partner’s death two years ago. The club’s pressuring him to name a second Treasurer, but he has to trust that person in bed and out. And it’s damn hard for Solo to trust. But when he rescues Lucky from the Eighty-Eight, maybe it’s time for Solo to find a partner, and time for Lucky’s luck to turn around… Wanting It All by Kati Wilde He’s the one man I can never have, but the only one I crave… Saxon Gray has reason to hate me. He spent five years in prison after saving me from a brutal violation at the hands of a rival motorcycle club – and he paid for that rescue with his freedom. I’ve never been able to settle the debt I owe him…until now. The menace of that old rivalry is flaring up again, and as president of the Hellfire Riders, Saxon is the one man who can keep me safe. But I want more than his protection. I want his heart. Pubdate Review Blitz ~ & Excerpt ~ Ruining Mr. Perfect by Marie Harte October 7, 2014 elisangelisLeave a comment Book: Ruining Mr. Perfect Series: The McCauley Brothers #3 Author: Marie Harte Format: e-ARC Publisher: Sourcebooks Casablanca It’s Not Easy Being Right… Vanessa Campbell is a CPA by day and a perfectionist by night. She’s fit, successful…and decidedly lonely. She can’t stop thinking about the youngest McCauley brother, Cameron. He’s just like her: smart, attractive, and usually right—except when dealing with her. …But Someone’s Got To Do It. Cameron McCauley likes Vanessa a little too well. She’s a blond goddess with a razor-sharp tongue. She hates to be wrong, just like him. But she can hold a grudge and is stubborn to a fault—also like him. A past misunderstanding has them rubbing each other the wrong way. Cam is dying to shake Vanessa up—get her to let loose. But if he succeeds, can his heart handle it? Oh god. It’s scary how enamored I am with these brothers, really. I even come to wish there were a few more of them to go for future books, just so I wouldn’t have to leave them and their family dynamics so soon. And yes, even though the next book is months away, I said ‘soon’. If I have to be completely honest, I didn’t know how Cam and Vanessa was going to work. I had a feeling and enough confidence in Marie Harte’s writing that she’d make them work, but I just couldn’t see the how. I like my romances best on the ‘opposites attract’ side. The more they bicker, the better and sexier. And though Cam and Vanessa did their fair share of bickering, thanks to Vanessa’s constant need to be right and her extremely blatant ways and Cam’s equal insistence on being the right one and his desire to be respected and needed, they were still too alike. Was I wrong? Hey, I’m not too proud to say I was. And in my defense, I knew Marie Harte was going to make it work. Didn’t I just say it? And she actually opened my eyes up to new possibilities in romance, a world where too alike couples can make things work and be damn sexy doing it too. Spotlight ~ Excerpt & Giveaway ~ Hot Rebel by Lynn Raye Harris Book: Hot Rebel Author: Lynn Raye Harris A rebel on the run… Victoria Royal is a traitor. Or so the U.S. government believes. Victoria was once a promising sniper in the Army, but now she’s gone rogue—worse, she’s just landed in the middle of a Hostile Operations Team mission in the desert and blasted it all to hell. Nick “Brandy” Brandon doesn’t expect to run into Victoria when he’s bugging out from a mission gone wrong. It’s been more than three years since she disappeared from the sniper course they were in together, and he’s finally stopped thinking about her killer curves and smart mouth. But now she’s back—and she’s far more dangerous than Nick ever believed possible… Is she really a traitor? Or is there something more at stake? He has to decide fast—because time’s running out and too many lives hang in the balance…
cc/2020-05/en_middle_0016.json.gz/line4837
__label__cc
0.649911
0.350089
What’s in a box? Top cannabis subscription boxes you just can’t say no to Whether your budget is $30 or $300, with these unique boxes there is something for everyone. And yes, they all ship to Canada Gill Polard Cannabis Communities Do you subscribe to a service that regularly sends you curated items? You are not alone. From your everyday necessities to entertainment options, the e-commerce based subscription market has seen explosive growth in recent years with McKinsey and Company reporting 100 percent growth every year for the past five years. According to the data, 15 percent of online shoppers have, at some point, signed up to receive products from their favourite retailers on a recurring basis. Interestingly, women account for 60 percent of active subscriptions, but men tend to subscribe to three or more services at a time. Curated boxes that introduce consumers to new products and brands are massively popular. The idea behind them is that the recipient gets a happy surprise in the mail every month or every couple of months, depending on the service. It’s a great way to find products you may not have known about and to treat yourself to things you may not have bought otherwise. For brands, the opportunity for exposure to a new audience is hard to resist. In no particular order, this story will introduce you to several North American subscription boxes that will send fun and interesting curated items related to cannabis and yes, they all ship to Canada. CANNDORA CLUB Canndora Club is a Canadian box aimed at discerning women who enjoy discovering new products with each box. With approximately $125 worth of curated products shipped three times a year, this box boasts of fun items like the Post Sesh Scent roll on from MilkWeed (I got this in the spring box and LOVE it!) Sign up here. Each box is $69.95 ALLUME’S CHILL BOX This box ships monthly and features five to eight high-quality lifestyle essentials from established and emerging brands valued at up to $100. In last month’s box, I got a 24k gold dipped joint holder from The High Society Collection and, frankly, I’ve never felt this fancier in my social circle before. Sign up here. $65/month International Goodies LIFTED LADIES CLUB This one has been around a bit longer and promises a monthly selection of everything from jewelry to stash bags, bath bombs, and coloring books for roughly $34. Sign up here for Canadian orders. HEMPER Hemper curators handpick 10 or more items every month to pack in your “Hemper Glassentials” box. As an example, the July box contained: All new HEMPER Tornado Rig All new Assorted HEMPER Glass Pads HEMPER It’s LIT! Clipper Lighter HEMPER Glass Filter tip Kryptonite Glass Cleaner HemperTECH Cleaning Bristles RAW King Size Papers Over $100 in value for $29.99; alternatively you can choose the “Hemper Pack” filled with $35 worth of stuff for only $14.99 or the “Bare Essentials” box which will keep you stocked in lighters and papers for $.99 plus shipping (prices in USD). KUSH CARGO Monthly boxes range in price from $11 to $110 for the First Class Cargo box, which includes: 3-10 Nug Related Products Guaranteed Piece Of Glass Every Month $130+ Retail Value Limited Edition Items From Top Brands Subscriptions are renewed automatically every month and there are à la carte purchases available on the website (prices in USD). SENSI BOX This company is all about choice and customization. Choose your shipping frequency with Sensi Box. You can opt for monthly, three, six, or 12-month plan. The SensiLight carries five items every month, including essentials and a smaller glass piece. Every box is hand-curated specifically For HER and For HIM. The SensiBox Original carries over seven items every month, including essentials, a larger piece of glass, gear, munchies, hemp made products and more. Every box is hand-curated specifically For HER and For HIM. Price range from $20 to $325 USD DAILY HIGH CLUB For $30, you can get $80 worth of accessories from Daily High Club including at least one piece of glass in the big box each month. The company collaborates with celebrities like Tommy Chong, B-Real of Cypress Hill, and Custom Grow to help curate their boxes so you never know what you’re going to get. Never run out of papers again with the All Natural $1/month box and splurge on the $30 El Primo—there’s also a $12/month option. Prices in USD. A different kind of subscription company Until this point, all the boxes listed above offer ancillary items such as glass pieces, books, lighters, trays, and apparel. Recently Kolab Project, an Ontario-based Licensed Producer of medical cannabis received their sales license from Health Canada. Billing themselves as “a different kind of subscription company”, this LP plans to pull from partnerships with parent company Auxly’s portfolio to introduce patients to even more new and interesting products. Representatives from Kolab Project could not be reached for more information. Gill Polard is the co-host of the High Friends podcast and the creator of The Her(B) Life website, which celebrates the feminine cannabis experience through industry interviews, essays, and stories. Libya's conflict looks increasingly like Syria- U.S. State department official
cc/2020-05/en_middle_0016.json.gz/line4845
__label__wiki
0.816739
0.816739
Presented by Visit Cayman Islands United Airlines trims growth plan for 2019 FILE - In this July 18, 2018, file photo, United Airlines commercial jets sit at a gate at Terminal C of Newark Liberty International Airport in Newark, N.J. The grounding of its Boeing 737 Max jets is causing United Airlines to trim growth plans for this year, and the carrier expects to discuss potential compensation with Boeing.Julio Cortez / AP DALLAS — The grounding of its Boeing 737 Max jets is causing United Airlines to trim growth plans for this year, and the carrier expects to discuss potential compensation with Boeing. United claims to be managing the grounding relatively well by pressing spare jets into duty and delaying discretionary maintenance work on other planes. That approach, however, comes with extra costs — sometimes the airline uses bigger and less fuel-efficient two-aisle jets to replace the missing single-aisle Max on domestic routes. United has 14 Max planes in its fleet, and airline executives said Wednesday they don’t expect those jets back before July. They said some of the 16 additional Max jets they expected to get this year might be delayed. “Obviously there are some costs that we have been incurring and continue to incur,” Chief Financial Officer Gerry Laderman said on a call with analysts and reporters. “We’ll have a conversation with Boeing and I expect, like we always do, to resolve whatever that conversation is in a way that works for both of us.” United declined to give a figure for its extra costs. The Boeing jetliner has been grounded around the world since mid-March after two crashes killed 346 people. Investigators are focusing on anti-stall software that pushed the planes’ noses down based on erroneous sensor readings. Boeing is working on a software update and training program for pilots that will highlight differences between the Max and previous versions of the 737, the bestselling airliner in history. The company reported Wednesday that its first quarter profit doubled to $292 million on more passenger traffic and strong cost controls. Shares climbed $4.07, or 4.8 per cent, to close at $89.24. United said it expects to cancel 130 flights in April because of the parked Boeing planes. That is far less than Southwest Airlines, which has 34 Max planes, and American Airlines, which has 24. Those two airlines say they are scrapping about 90 flights a day. Still, the missing Max planes account for 1.4% of United’s passenger-carrying capacity. Uncertain how long the planes will be lost, United cut its planned 2019 growth from about 5% to 4.5% heading into the crucial summer travel season. Executives said they are covering most Max flights by using spare jets and deferring maintenance jobs such as WiFi installations and paint jobs on other planes — not safety-related items, they said. United has no plans to require pilots to train in Max flight simulators. No U.S. airline yet owns one of the scarce machines. Chief Operations Officer Gregory Hart said United has long trained its Boeing pilots how to respond to the type of nose-down pitch that led to the October crash in Indonesia and the March crash in Ethiopia. “That is why we have consistently reiterated our confidence in the ability of United pilots to safely operate United Max aircraft,” he said. A group of technical experts appointed by the Federal Aviation Administration has said pilots should get more training about the anti-stall system on the Max, but that training does not need to be done in flight simulators — it could be done on computers or in classrooms. David Koenig can be reached at http://twitter.com/airlinewriter Latest Travel Sponsored by "Office du tourisme de Québec" Sponsored Travel back in time this summer at historical Quebec City Get swept away by the music at the Festival d’été de Québec Northern Ireland has always been beautiful, but only over the last decade has it emerged as a tourist destination Life on the wild side: A trip to Uganda will allow you to lock eyes with chimpanzees and gorillas Go to Tadoussac for the whale watching, but stay for the outstanding cuisine, craft beers and scenery How I made almost $700 on a flight delay from Venice to Toronto Part travelogue, part cookbook, Caroline Eden chronicles a 2,200-km journey in Black Sea Throughout its history, cottage culture has been about who we want to be seen as rather than who we truly are The Cayman Islands are wonderful for many reasons, but the diving is what really sets them apart Lake Constance boasts a wealth of palaces, castles and monasteries left behind by two royal dynasties Smashed windows, graffiti, woodland stream: Abandoned Newfoundland amusement park still attracts visitors Six dead, three investigations — is it safe to travel to the Dominican Republic now? Galaxy’s Edge at Disneyland offers the type of vicarious experience Star Wars fans have always craved Racing around Tokyo's high-paced streets and Kyoto's beautiful historic sites
cc/2020-05/en_middle_0016.json.gz/line4846
__label__wiki
0.58887
0.58887
Atari Joins Growing List of Old Brands Trying To Revitalize Through Cryptocurrency For generation X-ers, old enough to remember a time when photographs were analogue and games consoles were 16-bit, brands such as Kodak and Atari evoke fuzzy nostalgia. Nothing perfect lasts forever though, and those companies which once dominated their respective spheres have not aged well. Many assumed these 80s stalwarts had already given up the ghost amidst growing financial problems. As it turns out, not only are the Kodaks and Ataris of the world still limping on, but they’re seeking an injection of new blood and fresh capital in the form of an ICO (Initial Coin Offering). Also read: Kodak Getting Into Bitcoin Mining The Childhood Companies Coming for Your Crypto Kodak’s descent from photographic giant to failed firm desperately trying to find its niche is a sad one for anyone old enough to associate the name with better times. In the pre-digital age, companies such as Kodak and Atari were mainstays of popular culture. Times change and the companies that fail to innovate get left behind. Kodak’s sudden transformation into crypto miner and ICO entrant has already been picked apart. Atari’s has attracted less scrutiny, but bears many of the same hallmarks. In 2013, Atari filed for bankruptcy which, coincidentally, was the same year that Kodak followed suit. Five years on and Atari is throwing its hat into the blockchain ring. The pattern is a predictable one now: company trading on former glories announces ICO. Stock leaps by over 50%. Reality settles in. Stock tumbles. The company once synonymous with such classic games as Space Invaders, Pac-Man, and Asteroids is now seeking to establish a reputation as a cryptocurrency pioneer, powered by its Atari Token. You Nostalgia, You Lose Brands are obliged to move with the times. The alternative is extinction. Thus it would be unrealistic to expect Atari to base its core business model around churning out retro consoles, just as it would be unrealistic to expect Kodak to turn a profit from selling photographic film. The entry of these brands into the crypto space is not in itself a cause for concern or recipe for mockery. Rather, it’s the way in which these firms have gripped onto this outstretched branch in a bid to break their fall that invites scepticism. Investment research firm Kerrisdale Capital savaged Kodak’s proposed ICO, branding it “worthless” and the last grasp of a “dying relic of American manufacturing”. Little is known about Atari’s proposed cryptocurrency, other than that the company’s CEO Frederic Chesnais was quoted as saying: “Blockchain technology is poised to take a very important place in our environment and to transform, if not revolutionize, the current economic ecosystem, especially in the areas of the video game industry and online transactions”. Until more information emerges, Atari deserves the benefit of the doubt. It is hard to shake the feeling though that these companies are less interested in blockchain’s disruptive potential than its ability to prop up their balance sheets. Beware of faded brands coming for your crypto and tainting your childhood memories into the bargain. Do you think Atari’s entry into the cryptocurrency market is genuine or is it just a cash grab? Let us know in the comments section below. Images courtesy of Shutterstock, and Atari. atari, Crowdsale, Funding, games console, ICO, initial crowd offering, kodak, N-Featured, nostalgia, reinvention, retro, Share price, Stock, video game, videogame Crypto Fundraising Is Changing Again in 2020 CROWDFUNDING | Kai Sedgwick Funding is a prerequisite for any new crypto project, but with IEOs likely to play a reduced role in 2020,… read more. After Blockstack’s Regulated Offering, Where Now For US Token Sales? When Blockstack announced the first Reg A+ token sale, many believed it would open the floodgates for a spate of… read more.
cc/2020-05/en_middle_0016.json.gz/line4849
__label__wiki
0.567221
0.567221
S’up yo! and other ways to turn off recruiters in finance by Sarah Thompson 31 October 2019 Landing a new job is a process that starts long before you meet a hiring manager. Before you get in front of those guys, you’ll likely need to talk to an external recruiter. And before you meet them face to face, you’re going to need to engage in a level of exchange on the phone and via email. Don't ruin your chances of being hired before you’ve even met them. Some tips here for a smooth transition to the interview hotseat: 1. Make no mistakes Avoid errors in your grammar and spelling, whether it’s a full cover letter or a quick email reply. Mistakes will be perceived as sloppiness and are an instant black mark. Proofread everything multiple times before you hit send, and if possible get a friend or someone you trust, to look over it with a fresh pair of eyes. “I've known people have callbacks rescinded because their thank-you emails have been so full of typos,” said Janet Raiffa, the career coach behind Resumemama and a former head of campus recruiting at Goldman Sachs. “The legendary case is the spell-check error, where a student meant to write they were excited about the possibility of working for Goldman Sachs but instead managed to send ‘Goldman sucks.’” They didn’t get the job, says Raiffa. 2. No bro talk Goldman Sachs' CEO may be a DJ but this doesn't mean banks are like da-club. Some recruiters are more casual than others and for many building a rapport with their candidates will involve assuming a super-friendly manner and cracking a few jokes. While it’s OK to adjust to the signals you’re getting and loosen up a bit, remember what you are here for: to get a job. Good language is paramount, regardless of how well you seem to be getting on with the person who controls the hiring decision. “As the recruitment process plays out, candidates tend to let their guard down”, says Christian Novissimo, the managing partner of the accounting and finance practice at Lucas Group. “As they start to build a rapport you hear all formality going out the window,” he says. “Over the phone, be sure to use a proper greeting that’s not too informal, and pay close attention to the introduction and sign-off of your emails.” Novissimo suggests simple, familiar greetings such as Dear X and/or Good Morning Y are acceptable. Hey, What’s up? and Yo are not going to help your cause at this stage in the process because it shows a misreading of the situation. “I’ve heard people call recruiters people dude or bro, which is inappropriate. You have plenty of time to be homies after you’ve got the job. Until then use proper language and grammar ” 3. Don’t get lost in translation For international students whose spoken English is better than their written English, it’s a good idea to ask a native speaker to check your email before sending it along to the prospective employer. “I have also seen students have callbacks rescinded or not gotten offers because interview follow-up has made employers nervous about their lack of fluency,” Raiffa says. 4. No stalking Sending too many emails and even stalking employers are problems that are more common than you might think. “Do not send an email to 50 bankers at the same firm asking for a job or an interview,” Raiffa says. “Colleagues talk and will soon realise that they’ve been spammed. Also the email may end up being forwarded by a partner to a recruiter, who will think it is an important referral, and then get upset when he or she discovers it was a mass-email that has also gone out to 49 other people. “Give yourself a small, well-considered list of people and then work to get authentic referrals from them,” she adds. “And if you don’t hear back right away, don’t hassle your contacts too much or too often. Nobody likes a stalker." 5. Be present Don’t reach out to a hiring manager or recruiter only to go AWOL after they respond, whatever the reason. “If you get an email with a request to do something, like trace a document, and it may take you time to do it, acknowledge receipt of the email, and let them know that you’re working on it,” says Novissimo. “If they’ve reached out but they don’t hear back from you, they will likely think you are ignoring them and move on to their next candidate.” 6. Don’t be a hot mess Your communication style can mean sink or swim for your candidacy, says Amy L. Adler, a career coach at Five Strengths. Projecting an image of chaos, no matter how charming, is a no-no. “Don’t answer your phone to your recruiter if you are doing something else like eating or running to catch a cab,” Adler says. “Anyone who wants to talk to you will leave a voice mail. It’s better for you to collect yourself and find a quiet place to return a call, than to take a call in the middle of a busy restaurant.” 7.Use technology wisely and avoid gobbledegook It can be tempting to respond to a recruiter or hiring manager using a mobile phone or tablet rather than a laptop or PC. Proceed with caution. “You should always take the time to sit down in front of a computer and craft a well-thought-out email during the application process,” Novissimo says. “It’s not necessarily that you can’t send emails from a mobile device, but don’t think that just because you are on the move you can send an email with bad grammar, improper punctuation and typos.” You should also think about changing that signature so that it doesn’t say ‘Sent from my iPhone’, he adds. Whenever you take a call, find a place where it’s quiet and speak clearly. This is essentially an interview so give it the reverence it requires. “You always want to speak slowly and clearly, especially if you’re speaking to someone who isn’t in your field,” Novissimo said. “For example, if you’re talking to an HR person, don’t use finance terms that may be meaningless to them. Speaking clearly and not too quickly is a critical part of an initial phone interview." 8. Don’t lie by omission As soon as you engage with a recruiter, be honest and open about your situation, including the status of your relationship with your current or most-recent employer, as well as salary information. Concealing red flags or the fact that you've already applied to the firm are big no-nos and will ultimately undermine your relationship with the recruiter. Be the person you would want to hire. 9. The truth and only the truth If you’ve listed something on your resume that makes you sound good, be prepared to talk through the specifics to your recruiter. Good recruiters will always do background checks and dig deep to get the information they need. If you claim an important role in a transaction but can’t talk the talk then you will eventually be found out, either in the phone screening or an interview. In short, honesty is always the best policy. 10. Get a grown-up email address “It should go without saying, but don’t use your current employer’s phone or email to call back or respond to a message,” says Adler. “It will look disrespectful and like you are slacking off.” At the same time, don’t use the wildman69@hotmail.com or hippiechick420@yahoo.com email address that you’ve had since high school, either. “Have an email address that is proper,” Novissimo says. “A lot of us in our personal lives are goofy clowns with weird email addresses, but when you’re applying to jobs or responding to a recruiter, use an email address that includes your first name and last name or your first initial and last name, making sure that it’s vanilla and generic.” They can get to know your crazy side later. 11. No holding the line It’s important to never cut people off when they’re speaking. It’s equally important to not put a recruiter or hiring manager on hold if you have a scheduled call. Novissimo says: “I don’t care if you’re crafting a million-dollar deal on the other line – if your call is scheduled, dedicate that time to the person you’re supposed to be talking to.” Dan Butcher also contributed to this article Follow @efc_Global Google salaries in New York City Why it's a dangerous time to turn down a banking job The banker's guide to drinking alcohol Spending your bonus this year? More fool you Standard Chartered made a big fintech hire for its hottest business Contracts Coordinator - French Speaker HR Support Representative
cc/2020-05/en_middle_0016.json.gz/line4851
__label__cc
0.557092
0.442908
Center for Community Transformation ‘Sparks’ projects including homeless vets, eco-friendly products Wayne Steffen November 21, 2019, 4:00 pm A planned house for homeless veterans and a shop that sells ecofriendly products were the big winners at the seventh Spark Tank Pitch Fest. An app to help people find work, a lifestyle brand that promotes positivity and a purveyor of gluten-free treats concerned with hunger in the community also benefitted from the event, hosted by Fresno Pacific University’s Center for Community Transformation. Patriot house and GD.STWRD were each awarded $5,000 at the November 14 event at Lanna Coffee, 617 Broadway, Fresno. WorkGnome received $1,000 and Give Culture and Tower Vegan Treats received $750 each. In addition, each team will receive scholarships to the FPU/CCT Social Enterprise Academy in January 2020. Open to the public, the Social Enterprise Academy offers a four-module curriculum taught by experienced faculty and practitioners that features mentorship and the chance to network with potential funders. More on the academy at cctfresno.org/self-sustaining-solutions/ “I felt the event was inspiring. The room was packed with people who believe enterprise can serve the common good,” said Randy White, D.Min., CCT executive director. “Multiple community leaders attended, as well as financial institutions that are committed to impact investing. Fresno Pacific‘s Center for Community Transformation is honored to be catalyzing this innovative movement.” The capacity crowd of more than 100 people made its presence felt with crowd favorite awards, which added $10 per vote to each contestant’s total. GD.STWRD earned an additional $530 and all ideas pitched received some support. Participants were: GiVE CULTURE Shauna and Noel Felix dream of using branding to influence decision making in people’s everyday lives through this socially conscious brand that promotes self-awareness and accountability through inspirational t-shirts and other apparel. shopgiveculture.com WorkGnome WorkGnome wants to bring real jobs to real Central Valley families, especially in situations where traditional job seeking is difficult, by providing a hub for communities to help people connect to work. Paul Reyes is CEO; Matt Coatney is CIO. workgnome.com GD.STWRD Stewardship was instilled in Alyssa Ndombeson, CEO, from a young age, and she has turned that passion into the dream of a retail space that sells ecofriendly and sustainable products in a low-package system to help decrease consumer waste. Patriot House Years of investment and experience give Kevin Kears, program manager, and Lee Williams, operations manager, a heart for a social enterprise focusing on safe living facilities for homeless veterans with a goal to transition them back into society. Tower Vegan Treats CEO Ruby Sultan desires to provide tasty, sweet baked goods for those with dietary restrictions while addressing student hunger. A portion of the revenue generated goes to support the Fresno State Student Cupboard. Judging the event were Anthony Armour, CEO of Neighborhood Industries; Amber Balakian, instructor at Fresno City College and owner of Balakian Farms; Bryan Feil, real estate development for Bitwise Industries and co-owner of The Revue; Andrew Shinn, instructor at Fresno Pacific University and owner of Shinn Photography; and Jake Soberal, co-CEO of Bitwise Industries. Samer Sarofin, assistant professor at California State University Fresno, was unable to attend. Since 2013, the Spark Tank Pitch Fest has empowered community members to solve community problems through social enterprises that have a financially profitable revenue stream, a measurable and managed social impact goal and a plan to operate in an environmentally responsible manner. The Valley’s only social enterprise event, Spark Tank boasts a start-up success rate double the national average. Social enterprises awarded capital via Spark Tank have generated $3.7M between 2016-2018. A range of products and services to the community as well as jobs to more than 260 people, many of whom face challenges to employment. The support and participation of community partners such as Beneficial State Bank, Bitwise Industries, Chase Bank, Wells Fargo, Lanna Coffee Co., and many individual donors that have helped CCT invest over $100,000 in start-up capital. Sponsors of 2019 Spark Tank include Beneficial State Back, Bitwise Industries, Cen-Cal Business Finance Group, Central Valley Community Foundation, Every Neighborhood Partnership, JD Food, Neighborhood Industries and Lanna Coffee. CCT connects the strengths of FPU with the resources of the region to transform cities. Part of the Fresno Pacific Biblical Seminary, CCT supports entrepreneurial creativity, spiritual freedom, economic vitality and justice, environmental integrity, cross-cultural/social collaboration and political health in the Central Valley. For more information on Spark Tank, contact Carlos Huerta, CCT associate director, at 559-453-2374, carlos.huerta@fresno.edu or check the CCT website cctfresno.org/social-enterprise/. PHOTOS (by Andrew Feil) The judges consider their findings at the 2019 Spark Tank. From left: Andrew Shinn, Amber Balakian, Jake Soberal, Anthony Armour, Randy White (standing), Bryan Feil and Carlos Huerta (standing). And the winners—big smiles and big checks! From left: Lee Williams and Kevin Kears, Patriot House; Ruby Sultan, Tower Vegan Treats; Matt Coatney, WorkGnome; Shauna Felix, GiVE CULTURE (seated); and Alyssa Ndombeson, GD.STWRD.
cc/2020-05/en_middle_0016.json.gz/line4852
__label__cc
0.617623
0.382377
New Micro Model Helps Assess Drugs: U of G Study Pharmaceutical companies may be able to lessen their use of animals for drug testing if researchers adopt a new “micro model” developed by University of Guelph researchers. This new microfluidic model would rely more on lab tests than on animal tests, provide results more easily and quickly, and require only small amounts of drugs, said the researchers. Engineering professor Suresh Neethirajan, undergraduate student Evan Wright and other researchers in U of G’s BioNano Laboratory developed this concept over the past two years. Currently, drug companies testing wound treatment medications have to wound animals, collect swabs and monitor healing, all of which takes time. Suresh Neethirajan “The model we developed could reduce expenses for drug companies while eliminating some of the ethical issues that stem from animal testing,” Neethirajan said. “There would still be a need for animal testing, but this would lessen the number of animal tests needed. Storing, housing and monitoring animals can be very expensive — plus, you only need very small amounts of the drugs to test the medications.” The Guelph team developed the benchtop model with proteins and amino acids to mimic animal testing models in guinea pigs, mice, rabbits or sheep. “For a test to be beneficial, it has to provide a true representation of a wound. Up to now, most lab testing only focuses on one pathogen, but the nature of a wound is so complex, testing needs to cover all these pathogens,” Neethirajan said. The researchers hope their wound model, consisting of microfluids and glass slides, can be mass produced for use by scientists worldwide. He said the lab model allows “wounds” to be quickly altered, and testing takes much less time than in animals. It mimics human skin tissue and allows researchers to watch interactions between bacteria and drugs being tested. The micro model also requires only a very small amount of the drug being analyzed in order to conduct the test. The scientists next plan to study how the “wound” interacts with electricity. The study is published in the journal Biotechnology and Bioengineering.
cc/2020-05/en_middle_0016.json.gz/line4855
__label__cc
0.54143
0.45857
> Jobs in nigeria > Clerical & Administrative Jobs in nigeria Clerical & Administrative Jobs Yola North Awka North Warri South Calabar Municipal Category: Clerical & Administrative Jobs Clerical & Administrative Jobs In nigeria Unit Head Capital Express Assurance Limited is a loading life insurance company in Nigeria, is recruiting at its branch in Ibadan, Oyo State. Capital Express Assurance is a recapitalized life assurance company with the Head Office located at 13 Bishop Kale Close, Victoria Island, Lagos. It has international branches in Ghana, Gambia, Libe Oyo West Ojongbodu 17-01-2020 Management Information Systems Officer Action Against Hunger | ACF-International is recruiting for Management Information Systems OfficerAction Against Hunger is the world’s hunger specialist and leader in a global movement that aims to end life-threatening hunger for good within our lifetimes. For 40 years, the humanitarian and development organization has been on the front lines Maiduguri 17-01-2020 Laboratory Specialist Management Sciences For Health - MSH is recruiting for Laboratory SpecialistThe Management Sciences for Health MSH , a global health nonprofit organization, uses proven approaches developed over 40 years to help leaders, health managers, and communities in developing nations build stronger health systems for greater health impact. We work to save l Abuja 17-01-2020 Grants and Compliance Manager Action Against Hunger | ACF-International is recruiting for Grants and Compliance ManagerAction Against Hunger is the world’s hunger specialist and leader in a global movement that aims to end life-threatening hunger for good within our lifetimes. For 40 years, the humanitarian and development organization has been on the front lines, treatin Damaturu 17-01-2020 Finance Volunteer PACT is recruiting for Finance VolunteerPact West Africa Nigeria is a Country Office of Pact, an international non-governmental and non-profit organization with its headquarters in Washington, DC. We envision a world where everyone owns their own future. To do this, we build systemic solutions in partnership with local organizations, bu Deputy Child Protection and Education in Emergencies Project Manager Terre des hommes Foundation (Tdh) is recruiting for Deputy Child Protection and Education in Emergencies Project ManagerTerre des hommes Tdh is leading Swiss organisation for children’s aid. Since 1960, Tdh has helped build a better future for deprived children and their communities, making an impact with innovative and sustainable solutions. Renux Media is recruiting for Communication OfficerRenux Media is the exclusive distributor of PeopleLink Unified Communication Solution in Nigeria. PeopleLink provides a complete communications system for business and enterprise users. Combine voice, video, unified messaging, presence, IM and more - along with remote and mobile access. PeopleLink Lagos Mainland 17-01-2020 Education as a Vaccine (EVA) is recruiting for Program OfficerEducation as a Vaccine EVA is a youth-led, youth-focused non-profit organization created to work in partnership with children, adolescents and young people in particular adolescent girls and young women to advance their rights to health and freedom from all forms of violence by strengthe Kaduna North 17-01-2020 Child Protection and Education in Emergencies Deputy Project Manager Terre des hommes Foundation (Tdh) is recruiting for Child Protection and Education in Emergencies Deputy Project ManagerTerre des hommes Tdh is leading Swiss organisation for children’s aid. Since 1960, Tdh has helped build a better future for deprived children and their communities, making an impact with innovative and sustainable solutions. Administrative Intern (Corper) Recruitment at FarmAgric Limited FarmAgric is a technology-driven agricultural company that empowers farmers through the provision of required capital and inputs using funds raised from the investing public.We are recruiting to fill the position of:Job Position: Administrative Intern (Corper)Job Location:AbujaResponsibilities/DutiesSupport the organization’s basic operation and Consultant - Development of a National and State Plan of Action on Ending Violence Against Children in Nigeria UNICEF is recruiting for Consultant - Development of a National and State Plan of Action on Ending Violence Against Children in NigeriaUnited Nations International Children's Emergency Fund UNICEF works in some of the world’s toughest places, to reach the world’s most disadvantaged children. To save their lives. To defend their rights. Health Specialist Health Systems Strengthening , P4 UNICEF is recruiting for Health Specialist (Health Systems Strengthening), P4United Nations International Children's Emergency Fund UNICEF works in some of the world’s toughest places, to reach the world’s most disadvantaged children. To save their lives. To defend their rights. To help them fulfill their potential. Across 190 countries Supply & Logistics Specialist, P-3 UNICEF is recruiting for Supply & Logistics Specialist, (P-3)United Nations International Children's Emergency Fund UNICEF works in some of the world’s toughest places, to reach the world’s most disadvantaged children. To save their lives. To defend their rights. To help them fulfill their potential. Across 190 countries and territories Audit & Compliance Assistant Action Health Incorporated (AHI) is recruiting for Audit & Compliance AssistantAction Health Incorporated AHI is a non-profit organization dedicated to creating opportunities for young people’s successful transition to a healthy and productive adulthood. We envision a world where every young person can reach their full potential. We work with Impact and Markets Specialist Nuru International is recruiting for Impact and Markets SpecialistNuru International is a social venture committed to ending extreme poverty in remote, rural areas by offering locally-led training in agriculture, household savings, healthcare, and education. Nuru focuses on cultivating service-minded leaders and equipping people with tools and kno Administrative Intern Corper FarmAgric is recruiting for Administrative Intern (Corper)FarmAgric is a technology-driven agricultural company that empowers farmers through the provision of required capital and inputs using funds raised from the investing public.Job Title:Administrative Intern (Corper) Responsibilities/Duties Support the organization’s basic operation and Secretary Job at A reputable school A reputable Private school located at a strategic high brow area of Enugu Metropolis, Enugu State, Nigeria is looking for a well-qualified and experienced candidates to fill the vacant position below:Job Position: SecretaryJob Location:EnuguQualifications and ExperienceUniversity degree or its equivalent in Secretarial Studies or Secretarial Admini Enugu East 17-01-2020 Oxfam is recruiting for ICT OfficerOxfam is an international confederation of 17 organizations affiliates committed to creating a just world without poverty. In Nigeria Oxfam works in the areas of Economic Justice/Sustainable Livelihoods, Humanitarian Programming to save lives, Advancing Gender Justice and Good Governance, adopting a right based ap Admin Officer Job at Union Diagnostic and Clinical Services Plc Union Diagnostic and Clinical Services Plc (UDCS Plc) is a leading indigenous and homegrown company in the medical diagnostics and healthcare sector. The company also engage in sales and distribution of medical equipment for reputed companies in Europe, Asia and USA, through our branches nationwide.We are recruiting to fill the position below:Job P State Field Finance Officer Malaria Consortium is recruiting for State Field Finance OfficerMalaria Consortium is one of the world’s leading non-profit organisations specialising in the comprehensive prevention, control and treatment of malaria and other communicable diseases among vulnerable and under privileged populations. We increasingly find our work on malaria can Birnin Kebbi 16-01-2020
cc/2020-05/en_middle_0016.json.gz/line4856
__label__cc
0.577399
0.422601
Morning Copy Razor Burn Clothes Encounter 2019 Online New England Film Festival | New Hampshire Film Festival | Rhode Island International Film Festival | Vermont International Film Festival | Thriller | Vermont | Watch Online Now 3 Sep , 2019 Posted by: bsilberfarb Eager to escape their busy lives, a couple sets off on a backpacking trip. They journey up a remote trail, set-up camp and head to, “the top of the mountain”. On the way back they both become aware of a menacing presence and discover that their camp has been overtaken by a malevolent stranger. Director: Ben Silberfarb Writer: Ben Silberfarb New England Connection: Shot on location in the Green Mountains of Vermont. The Director grew up, lives and works in Vermont. Winner of the Best NH Short Film at the New Hampshire Film Festival and Best Screenplay at the Vermont International Film Festival. Director(s) Bio:: Ben Silberfarb is a Vermont based filmmaker who owns a small production company that imagines and creates content for those who wish to hire him. In 2010, Ben produced the feature film "Brief Reunion" which won the top fiction prize at the University Film & Video Association conference as well as the Audience Choice Award for Best Narrative at the Gotham Film Festival in NYC. In 2012, his short, "Singularity" was short listed for the Golden Blaster Award at the National Irish Science Fiction Awards. In 2015, his short, “Quintown” won the Jury Award for Best Thriller at the Online New England Film Festival. In 2016, his short, “FIRE” won Best NH Narrative Short at the New Hampshire Film Festival. In 2018, “The Hike” premiered at the Rhode Island International Film Festival and won Best Screenplay at the Vermont International Film Festival and Best NH Narrative Short at the New Hampshire Film Festival. Number of shooting days: 10 Camera Used: Canon C300 Mark II Editing software: Premiere Pro, After Effects and DaVinci Resolve. Financed by: Friends & Family For more information: www.bsilberfarb.com 2019 Online Film Festival Interview: The Hike Review of Old Man Dogs LA Redux There’s Something about the Farrellys Divine Intervention?
cc/2020-05/en_middle_0016.json.gz/line4862
__label__cc
0.65594
0.34406
Kartik Aaryan & Sara Ali Khan In Love? This One Thing Is Enough To Prove This Edited By Sangati Jogwar Published By Sangati Jogwar On Aug 29, 2019 - 5:42 PM Photo: India Today Kartik Aaryan and Sara Ali Khan have been setting relationship goals since past few months, by walking hand-in-hand, receiving each other at the airport and ringing in birthdays together. But it seems much deeper than the obvious. As per the reports, the “Aaj Kal” co-actors are very much in love with each other which is why they are concerned about what the other is doing or feeling. Recently, Sara visited Kartik’s father when he was in the hospital. Similarly, while they were shooting for the latest Imtiaz Ali flick, the 29-year-old actor kept a keen vigil on what Sara ate and made sure that sweets were kept away from her. Kartik Wants Sara To Maintain Her Shapely Figure It is not a secret that the daughter of Amrita Singh and Saif Ali Khan had a tough time losing weight and curbing her natural instincts to binge on junk foods and sweets. Kartik is well aware of this weakness of his princess who simply cannot resist milk cake or besan ke laddoo which are her all-time favorite. But Sara now has support from her rumored boyfriend who wants her to retain her shapely figure. Kartik showed his caring side on the sets of “Aaj Kal”. According to a source that was a regular part of the shooting both Sara and Kartik would explore local eateries and joints while filming for the movie. Since Sara is an ultimate sweet lover, she would binge on her favorite sweet dishes. Knowing her weakness for sweets Kartik would try to keep her away from sweets most of the time. The actor very well knows how hard it was for Sara to lose that extra weight and completely transform her body. Kartik also is well aware of how important it is for an actress to remain slim and lean which is why he is keeping a keen eye on what Sara eats. The “Sweety Ke Titu Ki Shaadi” actor does not want “Kedarnath” actress’ efforts to go in vain. That is why he used to keep sweets hidden if someone brought them on the sets. Now it certainly proves deep involvement of Kartik in Sara which is why he is concerned so much about her.
cc/2020-05/en_middle_0016.json.gz/line4863
__label__cc
0.707734
0.292266
Social media stress can lead to internet addiction: Study London: Increasing use of social media can lead users to tackle stress from one platform by hopping on to another platform. The users ultimately become more and more addicted to such social media sites, says a new study co-conducted by Indian-origin professor. Facebook and Instagram are known to cause stress in users. Faced with these technostress, users however refuse to shut down their device and instead shuttle between Social networking sites (SNS). When faced with such stress, instead of switching off or using them less, people move from one aspect of the social media platforms to another, says Monideepa Tarafdar, Professor at the Lancaster University. “While it might seem counter-intuitive, social media users are continuing to use the same platforms that are causing them stress rather than switching off from them, creating a blurring between the stress caused and the compulsive use,” Tarafdar said. Published in the Information Systems Journal, the research conducted on the habitual profile of 444 Facebook users revealed they switched between chatting to friends, scanning news feeds and posting updates as each began to cause stress. This basically leads to an increased likelihood of social media addiction, as they use the various elements of the platform over a greater timespan. Researchers found that users were seeking distraction and diversion within the Facebook platform as a coping mechanism for stress caused by the same platform, rather than switching off and undertaking a different activity. Even when users are stressed from social networking sites use, they continue to use the same platforms to cope with that stress, diverting themselves through other activities on the platforms and ultimately building compulsive and excessive behaviour. As a result, they embed themselves in the social network environment rather than get away from it and thus an addiction is formed. The research team looked at various forms of technostress that invade personal life of users — in trying to adapt to their social networking site; to conform to that of their friends; experience excessive social demands and too much social information — thus facing constant changes and updates on the platforms. “We found that those users who had a greater social media habit needed less effort to find another aspect of the platforms, and were thus more likely to stay within the SNS rather than switch off when they needed to divert themselves,” said study researcher Sven Laumer.
cc/2020-05/en_middle_0016.json.gz/line4864
__label__wiki
0.569894
0.569894
How Mahwah’s Anti-Hasidic Park Law Was Created, Illegally Changed and Then Suspended Mahwah, New Jersey. - Some portions of the Hasidic-populated areas in Rockland County, New York border the municipalities of Mahwah, Upper Saddle River and Montvale in Bergen County, Northern New Jersey. The following is a report of how the Township of Mahwah created an ordinance in June 2017 to ban non-residents from visiting Township parks; how exemptions to the ordinance was given without a council vote to change the language of ordinance, and how the law was suspended because enforcement of the law would have targeted Hasidim. This report is based on emails and documents that OJPAC received in response to an Open Public Records Act (OPRA) request filed with the Township of Mahwah. Concerns About Parks Use On the afternoon of March 23, 2017, Richard Wolf the Chairman of the Environmental Commission of Mahwah, sent an email to Jonathan Wong, the VP of the Mahwah Town Council who also serves as Chairman of the Council’s Ordinance Committee. In the email Mr. Wolf relayed concerns from residents about the "inappropriate use of our local parks... Our experiences are similar to several surrounding towns in Northern, New Jersey." Mr. Wolf made three recommendations, the third being to "consider assigning priority to Mahwah residents for permits and parking privileges to encourage local usage of parks and open space." Mr. Wong responded the following day that he will include this issue in the agenda for the then-next Ordinance Committee meeting. In his reply addresses, Mr. Wong added Robert Hermansen the president of the Mahwah Town Council who is aone of three members on the Ordinance Committee. Almost a month later, on April 20, Mr. Hermansen forwarded the above email to a Matthew Neyland who from public records appears to be living a few houses up from the councilman. Neyland responded within 15 minutes that "this issue is growing and the first politician to get behind us is going to gain a lot of votes." Mr. Hermansen replied that "the ordinance committee is already trying to figure out what we can do... The mayor is having an issue with enforcement. He is also so attached to the County Executive. He does not want to do anything to piss him off. We are trying to figure out a way to get this done." Neyland responded: He better get his crap together or there will be a new mayor. I have like 30 people already. Hermansen: Oh dear God I hope so. Neyland: When is he up for re-election? Hermansen: He was just reelected that is why he does not care. Town Officials Push for the Ordinance Councilman David May emailed the town attorney Brian Chewcaskie on May 9th inquiring if he knew "where we are with the NJ Residents Only signs?" Within the same hour, the mayor wrote to Counsilman Wong that "we spoke about an ordinance which would allow Administration authorization to post "New Jersey Residents Only" sign[s] for all of our parks. Will you approve this ordinance so I can get these signs posted[?]" Later that day, Mr. Wong forwarded the Mayor’s email to Mr. Hermansen stating that this ordinance needs to be discussed. Two days later, Councilman May asked the town attorney if there needs to be a new ordinance or if the Township can rely on existing statute. An answer came fairly quick that an ordinance is needed to which Mr. May answered "I guess we will be the first town to do so." Quentin Wiest, the Business Administrator of Mahwah sent an email on the same day, May 11th, to Jerry Giaimis, the Business Administrator of Saddle River, saying "Mahwah is a Township that borders New York State. Have any border communities restricted your parks to NJ residents only?" Mr. Giaimis responded by citing case law which "would appear to prohibit such residency restrictions in NJ... I am not a lawyer, but I researched this issue and confirmed it with my attorney very recently." On May 15th 10:21 in the morning, Councilman May sent a more formal email to the council members (Wong, Hermansen, Wysocki) serving on the Ordinance Committee requesting that an ordinance be crafted that parks should be accessible to NJ residents. Mr. May also wrote "I hear that NY schools take bus trips to our parks and leave them with quite a mess. I ask that we put in place a use permit, also allowable via open space statute." Two hours later, Mr. Wong the Chair of the Ordinance Committee responded that the request is on the agenda for the next Ordinance Committee meeting. It appears that only now, and not in March, is when the park law was properly processed in committee. Indeed, on June 8th, the Township of Mahwah introduced and on June 29th it adapted Ordinance Number 1806 which states that Township parks and playgrounds are open to the public but may be used by New Jersey residents only. The Ordinance Gets Changed The Ordinance was to take effect July 27th, but the ordinance as proposed created problems. Namely, would guests of Mahwah resident be able to visit the parks? What about people who don't live but work in Mahwah? Concerned residents emailed lawmakers asking these questions. Mahwah Police Chief James N. Batelli emailed the mayor Bill Laforet; Department of Public Works head Glenn Dowdson, and other officials on July 7th echoing the above concerns and asking what’s the rule for guests of Mahwah residents and employees who work in town. Township attorney Brian Chewcaskie responded to the same group later that day that “a guest of a resident would be permitted. As to employees, the ordinance would prohibit the use of parks.” A few days later DPW head Dowdson emailed the township Mayor, Police Chief, Attorney and Business Administrator a proposed sign which read: Township of Mahwah Parks & Playgrounds are open to New Jersey Residents Only Ordinance No. 1806 Guest of a resident are permitted use Employees of local business are permitted use The attorney responded that he "would take out the word use after permitted" and on the same day July 12th, Chief Batelli emailed the mayor, the attorney and others to once again express concern about enforcing the ordinance. On July 17th, the DPW head once again emailed the language of the sign asking if it is OK to use. On July 19, Council President Robert Hermansen responded to an email question from a Sylvia Ripps regarding guests, saying "We will allow outside residents to be in the park with Mahwah residents; the signs say so." Most notable here is that the attorney clearly advised that employees would not be exempt yet the proposed signage for the ordinance gave them employees an exemption. Basically, Township officials were exempting a class of people from an Ordinance without voting on the exemption. The Chief’s Letter On July 19th, the chief emailed the mayor and the business administrator again expressing concern about the ordinance. The next day, Chief Batelli sent a formalized letter listing some of the concerns he has with the ordinance: 1) The Chief noted that the language on the sign making exceptions to guests and employees is "not part of the written Ordinance that is enacted by [a] governing body" therefor enforcement is impossible. Basically, Township officials changed an Ordinance without voting on it. 2) The Chief noted that Police Officers can take action only under probable cause or observing someone violating the law but there is no way - except for using race, religion or outward appearance - to know if someone is not a New Jersey resident. Using bias-based profiling, is against New Jersey law noted the chief. 3) The chief wrote that "in one [Facebook post] an elected Township official talks about the parks and playgrounds being closed to out of State residents and then five sentences later in the same thread posts about taking measures to stop the Eruv's from being installed in the Township. The Eruv's are linked to one specific religion and posting about the Eruv's and the new Ordinance regarding parks in the same post would lead a reasonable person to conclude or argue that there is a relationship between actions being taken by our governing body as it relates to Eruv's and the new restrictive Park Ordinance... If these posting give the impression or appearance [that] this ordinance is designed to a specific group because of race or religion, it becomes problematic in terms of enforcement and potential bias-based profiling complaints." On July 24, the mayor emailed the town attorney asking that he "work through the details of this ordinance" because "without the proper guidance we cannot enforce the ordinance." Apparently, the Ordinance would have gone into effect on July 27th despite these issues but for the Bergen County Prosecutor Gurbir S. Grewal responding to the Chief's letter and ordering the Mahwah Police Department not to enforce the law because, among the reasons listed, it would require bias-based profiling against Hasidim. On July 27th, the Mayor emailed the County Prosecutor accusing Mr. Hermansen of wanting to put up the sign as a “deterrent” against people visiting the parks despite knowing that the law is suspended. Over the next few days, Mr. Hermansen was still going back and forth with other officials how to change the signage language, again despite the law being inherently impossible to enforce and despite the language of the law not being aligned with the proposed languages of the sign. By July 30th, Chief Batelli leveled a bombshell accusation against Mr. Hermansen that OJPAC reveals in our follow up writing: Mahwah Government Documents Reveal a Legislative Focus on Jews. OJPAC Statement Ahead of Lag B'Omer 2015 Jackson Reverses on the Eruv; Mahwah on Parks A Letter by OJPAC Co-Founders to the Editors of "The Chronicle" Newspaper
cc/2020-05/en_middle_0016.json.gz/line4866
__label__cc
0.675871
0.324129
Let Me Count the Ways of Making Borscht Photograph: Joe Woodhouse During my childhood in Ukraine, my family had only one way of making borscht. Place oxtail in a heavy pot with cold water and aromatics. Simmer for hours until the meat is tender and the stock rich and viscous. Add the skimmed fat to a frying pan to soften the smazhennia, a Ukrainian sofrito of diced onions and finely julienned carrots, until the natural sugars are drawn out. Then comes the acidity: juicy tomatoes in the summer; fizzy, funky fermented tomato purée in the winter; and, always, some julienned beetroot—not too much, and only the light-colored borshevoy buriak, which grow in the sandy soils of southern Ukraine. (“How can one use this ghastly red beetroot—it dies the potatoes red, everything red!” my late grandmother Lusia would say with deadly seriousness.) Boil large chunks of potato and red kidney beans in the broth until soft, but cook shredded cabbage only briskly, to retain a slight crunch. Season with dense homemade sour cream, salt-cured pork pounded with garlic and salt, or, if you’re old-school, umami-rich powders made from pulverized sun-dried tomatoes and gobies, a bull-faced fish found in the Sea of Azov. The soup must be thick, so the spoon stands up straight. Garnish with handfuls of dill, fermented in winter. Rye sourdough or garlic pampushky bread, and often whole spring onions and hot red chilies in the summer, are to be bitten into between each spoonful. It wasn’t until I reached adulthood that I realized that borscht could be made another way. I was just out of graduate school and working as an assistant Russian literary translator. My main work was on classics—Pushkin’s “The Captain’s Daughter,” Platonov’s “The Foundation Pit”—but my mentor also translated smaller articles on the side, and when he didn’t have enough time to take on new assignments he would send them my way. One day, an unusual one arrived in my in-box: a study, conducted by a Russian academic, on the history of borscht. I don’t remember all the details of the article, and my translation has been lost to time, but one description stayed with me: borscht in the early nineteenth century, made for the Russian tsar, consisted of three stocks blended together—one of veal, another of morel mushrooms, and a third of goose and dried prune, with sour cherries used for acidity instead of tomatoes, which were not yet common in Russian cooking. This sounded like the most luxurious foundation of a borscht I could imagine—both worlds apart from my family’s version and somehow similar, a balance of meaty and sour and sweet. In the years since, I’ve become a chef and cookbook author, and in researching varieties of borscht I’ve discovered an astounding range of preparations. The soup is eaten everywhere in Eastern Europe, from the formerly Prussian Kaliningrad, where Russia now meets Poland, all the way through the Caucasus, and extends into Iran and Central Asia, finishing somewhere out by the eastern island of Sakhalin, near Japan, or the Kamchatka Peninsula, near Alaska. In Poland, for instance, they cook a soup in the Ukrainian style, but also make a thinner Russian one and a gorgeous Christmas version, an elegant and clear bright-red consommé with delicate dumplings called uzska (ears), filled with porcini or wild mushrooms and sauerkraut. For sourness, apples are often added to the stock, just as unripe Mirabelle plums and apricots are used in some parts of Ukraine and Romania. In deep winter in Poland, Ukraine, and the Baltics, zakwas, a fermented liquid made with beets and other aromatics, is the foundation of choice. In Moldova, where maize is king, a fermented starter is sometimes made with polenta and bran water infused with sour cherry leaves or even young cherry branches, to cut through a fatty pork stock. Georgians and Azerbaijanis, as always, put their own delicious spin on things, adding either fresh, chopped red chili or hot chili flakes and lots of chopped fresh cilantro and dill. Beef, well-marbled and on the bone, is one of the most cited sources for stock-making, but pork stocks seem to have the most variations, with versions made of anything from simple fresh cuts to smoked ribs, ham hocks, and sausages in Hungary and Poland to crunchy pork ears in Ukraine. Lacking pork or beef, you can always use a wiry rooster; its tough meat might stick between your teeth, but its bones will help to create the most flavorsome of broths. The only thing I haven’t encountered to date is a seafood-based borscht. Maybe one exists in Kamchatka, home to the world’s largest crabs and other oceanic delicacies? If you have a recipe, please, do speak up. More surprising than the many carnivorous varieties is the overwhelming number of vegetarian recipes, born of scarce times when people had to make do without meat. Root vegetables like celeriac, parsnip, and turnips were often used to give flavor and body, and dry mushrooms were popular in forest-dense areas. In spring, across Eastern Europe, those heavy tubers would be swapped for young beet tops, sorrel, wild garlic, nettles, soft herbs, spring onions, or garden peas, all of which would contribute to a widespread creation of a completely different, gentler soup called green borscht. It is fresh and zingy, enriched with a garnish of chopped hard-boiled eggs. Ice-cold bright-red beetroot consommé, originating in Lithuania, but also popular today in Poland, is garnished with chopped radishes and cucumbers to add the crunch and kefir or buttermilk for that desired sour note. For sweetness, among those who managed to escape the U.S.S.R., even ketchup has been adopted with glee. Variations are dictated by the land, weather, and local traditions, but also by circumstance: people from different cultures intermarry; families are both willingly and forcibly moved. In my sixteen years in the U.K., I have often heard stories that begin with “I’m Czech, but my Crimean Jewish grandmother . . . ”; “Our borscht in Mennonite Manitoba by way of western Ukraine is . . . ”; “My Iranian dad loved this version of my Russian mother’s borscht . . . ” In recent years, my own father started grating ginger into his borscht, convinced that my five-year-old son, who is half Thai, might prefer it with an Asian twist. It turned out that dad’s gingery addition did not spoil the soup. It just added a subtle hint of warmth, so appealing that I, too, now add some to my pot. I still, however, always seek out the paler “candy” beets, fearful of what babushka Lusia would say if she ever saw that my borscht potatoes were dyed that screaming purple-red. Babushka Lusia’s Ukrainian Winter Borscht 4-5 lbs. oxtail 1/2 celeriac or 2 stalks of celery 4 allspice berries, roughly crushed 2 beetroots, peeled (preferably the pale variety, but the red kind will do) 1/2 small green cabbage, sliced 14-oz. can chopped tomatoes 14-oz. can red kidney beans 1/2 bunch dill, chopped Sour cream or crème fraîche to serve (optional) Fill a large pot with cold water. Halve one onion and add it to the pot. Roughly chop two carrots and the celeriac and add them, along with the allspice, peppercorns, and bay leaves. Add the oxtail and a good pinch of salt. Bring the water to the boil. Skim the froth and discard it. Turn the flame to low and simmer the stock for two to three hours, until the meat separates easily from the bone. While the stock is simmering, peel and finely dice the other onion. Roughly grate the remaining carrot. Cut the beetroot into matchsticks. Skim some of the beef fat with a ladle off the top of the stock and pour it into a large frying pan. Turn the heat to medium and wait for the fat to start sizzling. Add your onion and sauté it gently, stirring from time to time, until it softens and starts to caramelize. Then add the carrot and cook for about five minutes. Season with salt and taste—it should be well-seasoned. Add the beetroot to the pan and cook for a few minutes. Finally, add the tomatoes, cook for a couple of minutes, and taste. If it tastes too sour, add a pinch of sugar. Drain the beef stock into a large bowl. Reserve the oxtail, but discard the rest. Pour the stock back into the pot with the oxtail. Add the contents of the frying pan to the stockpot with the potatoes and cook for seven minutes over medium-high heat. Then add the cabbage and cook for another three minutes. The potatoes should be soft and the cabbage al dente. Finally, grate the garlic straight into the pot and give it a vigorous stir. Serve the borscht with plenty of chopped dill, some sour cream on the side, and some good-quality bread for dipping. The soup will taste even better the next day. This article first appeared in The New Yorker. More Writing Silk & black snow Georgian wine, Georgian soul
cc/2020-05/en_middle_0016.json.gz/line4875
__label__cc
0.536262
0.463738
Bachelorette’s Becca Kufrin Hands Out Final Rose (Spoiler Alert!) posted by Sierra Marquina - Aug 6, 2018 It’s official: Becca Kufrin is engaged to Garrett Yrigoyen. The season 14 Bachelorette handed out the final rose to the Reno, Nevada, native during the Monday August 6 finale of the hit ABC show. She sent home runner-up Blake Horstmann. "Sorry fellas, she's off the market, she's all mine!" Garrett told the cameras after getting down on one knee to propose to Becca with a stunning Neil Lane diamond ring. "There's so much that I want to do with you!" she told her new fiancé. "I want to get a Costco membership with you, and I want to have your kids... everything!" Blake was devastated to be sent home. "I did love her," he told the cameras holding back tears. "I just thought she loved me back." As Bachelor fans are well aware, Becca was famously blindsided by last season Bachelor Arie Luyendyk Jr., who ended their engagement on-camera. “Garrett's the one for me,” she gushed of her happy ending. “He's gonna be my teammate. He's gonna be the best partner. He's gonna stand by me every single day. He would be somebody that I could see my dad loving so much. … I can picture it all: I can picture us being together. I can picture kids and him driving around in a minivan. And I can picture us taking care of one another whenever we're sick. God, I'm so ready for this." Congrats to the happy couple!
cc/2020-05/en_middle_0016.json.gz/line4876
__label__wiki
0.869622
0.869622
nzresearch.org.nz Phytoplankton dynamics in North Island lakes, New Zealand Author: Ryan, E.F. Publisher: The University of Waikato Type: Thesis Link to this item using this URL: https://hdl.handle.net/10289/12774 The dynamics of phytoplankton were investigated in 40 lakes of the North Island, New Zealand. A range of environmental variables was examined on different temporal and spatial scales in relation to the surface and DCM ( deep chlorophyll maximum) phytoplankton communities in the lakes. The environmental variables that were considered relevant to these communities included turbulent mixing, limitation by light and nutrients, rates of sedimentation or ascent, and zooplankton grazing. Cylindrospermopsis raciborskii is a potentially toxic species of cyanobacteria, that in summer 2002-3 formed dense water blooms (> 100 OOO cells/ml) in shallow (max. depth :5 Sm) Waikato peat lakes and a hydro-electric dam on the Waikato River. Net rates of growth calculated within individual lakes demonstrated that C. raciborskii populations grew at rates close to maximum values observed under optimal conditions in laboratory cultures. Changes in species diversity in the lakes prior to and following the invasion of C. raciborskii were assessed. During occasions of C. raciborskii water blooms there was decreased diversity and the phytoplankton assemblage became nearly mono-specific. The shallow lakes in this study have high concentrations of nutrients and low water clarity, which are ideal conditions for growth of C. raciborskii, as it has a competitive advantage at low irradiance but limited capacity for buoyancy. The ability of C. raciborskii to fix nitrogen may also have enhanced its competitive ability amongst other phytoplankton species and, while nutrients were generally considered to be replete, nitrogen was more likely to limit growth of phytoplankton than phosphorus in the lakes studied. Lake Tarawera, part of the Rotorua lakes region (area 41.6 km2 and mean depth 50 m), was chosen to investigate variability of phytoplankton biomass with depth and between embayments and a mid-lake station. The variability of DCM depth was contributed by internal seiching, which was most prominent at the edge of the lake. A single mid-lake station was considered representative of lake-wide biomass at the DCM as the differences between stations were small. However, during a bloom of Anabaena lemmermanni, there was large inter-station variability in phytoplankton biomass in the surface mixed layer. Therefore, when quantifying surface populations, particularly buoyant cyanobacterial species which tend to accumulate in bays, discrete samples at a single station and depth may not adequately represent lake-wide biomass. During periods when bloom-forming species are present, several sampling stations should be used to adequately quantify biomass and variability of phytoplankton in the surface mixed layer. A population-dynamics theory of sinking phytoplankton, that utilizes interactions between growth limitation by light and nutrients, sinking rates and turbulent diffusion rates, was used to quantify factors contributing to DCM formation in Lake Tarawera. Five 'Modes' of vertical phytoplankton of biomass were categorised relating to four forcing functions. The first mode was a surface chlorophyll maximum (SCM); Mode 2 was a DCM; Mode 3 was a simultaneous double peak of buoyant cyanobacteria and a DCM assemblage; Mode 4 was a linear vertical distribution and Mode 5 was an exponential increase in biomass with depth. The incidence of these distributions and the existence of a DCM were examined in relation to different turbulent diffusion rates{< 0.1 to 10 cm2 s-1 ), sinking rates {+10 to -4 m daf1), and light and nutrient limitation. A DCM was simulated when net growth of the population superceded losses from turbulent diffusion, sinking and zooplankton grazing. Light climate strongly influenced net rates of growth of the DCM assemblage and its position; surface blooms of cyanobacteria could obliterate the DCM by shading cells and suppressing light available for their growth. This finding has important implications for eutrophication of lakes with DCMs, as relatively small changes in surface phytoplankton communities, for example through additional nutrient inputs, could obliterate the DCM. The relevance of the diatom DCM phytoplankton is that it has important ecosystem-level effects through sedimentation of nutrients and organic matter, and transfer of biomass to higher trophic levels resulting from preferential grazing. Further examination of DCM communities was carried out in Lake Tikitapu, a small lake (mean depth 18 m, area 1.5 km2 ) in the Rotorua basin. The DCM assemblage in this lake comprised dinoflagellate species. The DCM persisted over the period of thermal stratification, in the metalimnion, and also at a depth where irradiance was approximately 2-3 % of the surface value. Statistical analysis found that the light level at the DCM was more important than the depth of thermocline in determining the depth of the DCM. There was no evidence of diurnal vertical migration of the DCM in Lake Tikitapu, but dispersion of the DCM varied seasonally, whereby the width was strongly positively correlated to the width of the metalimnion (r2 = 0.89, p < 0.01). Light and nutrient incubation experiments provided further evidence for the dominant role of light in influencing the DCM position. There was a biomass decrease in DCM populations that were incubated at high irradiance ( 40 % of surface irradiance ), suggesting that surface irradiances may be damaging or inhibitory to growth. A wide range of North Island lakes was investigated in an attempt to delineate the roles of lake mixing, trophic state and light climate in the composition of lake phytoplankton assemblages. For 40 lakes mixing regimes were divided into three classes; stable seasonal stratification, intermittent stratification and mixed, and trophic states were separated in oligotrophic, mesotrophic and eutrophic. In addition, average photosynthetically available radiation experienced by phytoplankton was determined based on integrated levels over the surface mixed layer, and values were divided into three regimes where 5 % or less corresponded to low light, 5 - 20 % to medium light, and > 20 % to high light. Non-metric multi-dimensional scaling (MDS) and analysis of similarities (ANOSIM) were used to detect patterns in phytoplankton composition between lakes and to infer which environmental variables were associated with underlying trends in composition. MDS showed a clear separation of stratified from intermittently stratified and mixed lakes based on phytoplankton composition, and phytoplankton assemblages in stably stratified lakes were significantly different from those in intermittently stratified lakes (p < 0.05) and mixed lakes (p < 0.05). However, results of ANOSIM indicated that trophic state was not a statistically significant factor influencing phytoplankton assemblage composition. Mixing regime therefore provided a more accurate predictor of summer phytoplankton composition than trophic state or light climate, as lakes of different trophic state but similar mixing regime had similar phytoplankton assemblages. In this study, field work and modelling were used to contribute to the current understanding of spatial and temporal dynamics of phytoplankton in lakes, the roles and interactions of various environmental variables in governing populations, and implications of blooms on assemblage diversity. Phytoplankton assemblage composition and biomass are highly variable, but much of this variation may be explained through detailed analysis. Investigations into the vertical distributions of phytoplankton communities to ascertain the presence of a SCM or DCM, along with quantification of vertical stratification/mixing regimes in lakes, and interactions of buoyancy with horizontal transport in the surface mixed layer, will greatly facilitate in explaining the variability. Subjects: Freshwater phytoplankton New Zealand Waikato, Phytoplankton populations New Zealand Waikato, Lake plants New Zealand Waikato, Algal communities New Zealand Waikato Citation: ["Ryan, E. F. (2006). Phytoplankton dynamics in North Island lakes, New Zealand (Thesis, Doctor of Philosophy (PhD)). The University of Waikato, Hamilton, New Zealand. Retrieved from https://hdl.handle.net/10289/12774"] Copyright: All items in Research Commons are provided for private study and research purposes and are protected by copyright with all rights reserved unless otherwise indicated. Metadata Dashboard Govt.nz
cc/2020-05/en_middle_0016.json.gz/line4886
__label__cc
0.732136
0.267864
Arctic adventurer to speak in Sudbury Sudbury Star Staff Adam Shoalts in this file photo. Adventurer and author Adam Shoalts will be in town Jan. 22 for a presentation at the Science North IMAX theatre. Shoalts is the author of three books, the latest titled Beyond The Trees, which describes a four-month solo canoe journey across Canada’s Far North. While he hails from southwestern Ontario, Shoalts moved to Sudbury in 2016 and called it home for a year-and-a-half, before embarking on his epic Arctic trip. Shoalts began the odyssey at a remote outpost in the Yukon, travelling east — and often upriver — to Hudson Bay. En route, he encountered wolves, muskox and massive waves, not to mention ice floes that still clogged the bays of Great Bear Lake. On Jan. 22, from 7 p.m. to 10 p.m., Shoalts will be sharing stories and images from that gruelling adventure with a Sudbury audience. The event is hosted by the Rainbow Routes Association in partnership with Science North and Laurentian’s Outdoor Adventure Leadership Program. Tickets are $10 (children under 12 get in free). To learn more about the presentation and secure a ticket in advance, visit tinyurl.com/tpyyf9u. Author Adam Shoalts chronicles journey across Canada’s Arctic Competitive rates, easy online application process helps My Canada Payday thrive...
cc/2020-05/en_middle_0016.json.gz/line4887
__label__cc
0.622877
0.377123
Obscure and Confused Ideas idiosyncratic perspectives on philosophy of science, its history, and related issues in logic The perfectionist's paradox EDIT: ADDED Oct. 16 2018: As Karim Zahidi notes in the first comment below, I made an elementary logical error in thinking that (1) is evidence for (2). So I have crossed out the original mistake like this below. But I still think the argument after that step may work: so now the argument just starts from (2) as a supposedly plausible claim, instead of trying to justify (2) via (1). This might sound initially like a too-clever undergrad ‘gotcha’ paradox. However, I think that at least for some folks who have perfectionist tendencies, the following is experienced as a genuine difficulty in their lives. The following strikes me as plausible: (1) It’s OK to make some mistakes. If (1) is true, then it seems the following should be true as well, since it’s just a restricted version of (1): (2) It’s morally OK to make some moral mistakes. (3) Making a moral mistake is doing something morally impermissible, (4) if something is morally OK, then it is morally permissible. And (2)-(4) logically entail (C) It’s morally permissible to do some morally impermissible things. And (C) looks like a contradiction. (For all I know this is already out there somewhere, but it was not on the interesting list of paradoxes of deontic logic in the Stanford Encyclopedia.) posted by Greg Frost-Arnold @ 4:35 PM 2 comments 'Extra-Weak' Underdetermination I’ll start briefly with a few reminders and fix a little terminology. I then introduce a new(?) sub-species of underdetermination argument, whose premises are logically weaker than existing underdetermination arguments, but still(?) deliver the anti-realist’s conclusion. Underdetermination arguments in philosophy of science aim to show that an epistemically rational person (= someone who weighs their available evidence correctly) should suspend belief in the (approximate) truth of current scientific theories, even if such theories make very accurate predictions. A scientific theory T is strongly underdetermined = T has a genuine competitor theory T*, and T and T* make all the same observable predictions. (So the two theories’ disagreement must concern unobservable stuff only.) A scientific theory T is weakly underdetermined = T has a genuine competitor theory T*, and all the observable data/ evidence gathered thus far is predicted equally well by both T and T*.(†) (So collecting new data could end a weak underdetermination situation.) Anti-realists then argue from the purported fact that (all/most) of our current scientific theories are undetermined, to the conclusion that an epistemically rational person should suspend belief in (all/most) of our current scientific theories. Realists can reasonably respond by arguing that even weak underdetermination, in the above sense, is not common: even if one grants that there is an alternative theory T* that is consistent with the data gathered so far, that certainly does not entail that T and T* are perfectly equally supported by the available data is unlikely. There is no reason to expect T and T* would be a perfect ‘tie’ for every other theoretical virtue besides consistency with the data. (Theoretical virtues here include e.g. simplicity, scope, relation to other theories, etc.) The evidential support for a hypothesis is not merely a matter of the consistency of that hypothesis with available data. At this point, anti-realists could dig in their heels and simply deny the immediately preceding sentence. (The other theoretical virtues are ‘merely pragmatic,’ i.e. not evidential.) But that generates a standoff/stalemate, and furthermore I find that response unsatisfying, since an anti-realist who really believes that should probably be a radical Cartesian skeptic (yet scientific anti-realism was supposed to be peculiar to science). So here’s another reply the anti-realist could make: grant the realist’s claims that even weak determination is not all that common in the population of current scientific theories, and furthermore that typically our current theory T is in fact better supported than any of the competitors T1, T2, ... that are also consistent with the data collected so far. The anti-realist can grant these points, and still reach the standard underdetermination-argument conclusion that we should suspend belief in the truth of T, IF the sum of the credences one should assign to T1, T2, ... is at least 0.5. For example: suppose there are exactly 3 hypotheses consistent with all the data collected thus far, and further suppose Pr(T) = 0.4, Pr(T1) = 0.35, and Pr(T2) = 0.25. In this scenario, T is better supported by the evidence than T1 is or T2 is, so T is not weakly underdetermined. However, assuming that one should not believe p is true unless Pr(p)>0.5, one should still not believe T in the above example. I call such a T extra-weakly underdetermined: the sum of rational degrees of belief one should have in T’s competitors is greater than or equal to the rational degree of belief one should have in T. We can think about this using the typical toy example used to introduce the idea of underdetermination in our classes, where we draw multiple curves through a finite set of data points: We can simultaneously maintain that the straight-line hypothesis (Theory A) is more probable than the others, but nonetheless deny that we should believe it, as long as the other hypotheses’ rational credence levels sum to 0.5 or higher. And there are of course infinitely many competitors to Theory A, so it is an infinite sum. The realist, in response to this argument, will thus have to say that that infinite sum will converge to less than 0.5. The above argument from extra-weak underdetermination is clearly related to the ‘catch-all hypothesis’ (in the terminology above, ~T) point that has been discussed elsewhere in the literature on realism, especially in connection with Bayesian approaches (see here and the references therein). But I think there is something novel about the extra-weak underdetermination argument: as we add new competitor theories to the pool (T3, T4… in the example above), the rational credence level we assign to each hypothesis will presumably go down. (I include ‘presumably,’ because it is certainly mathematically possible for the new hypothesis to only bring down the rational credence level for some but not all of the old hypotheses.) So the point here is not just that there is some catch-all hypothesis, which it is difficult(?) to assign a degree of rational belief to (that's the old news), but also that we increase the probability of something like the 'catch-all' hypothesis by adding new hypotheses to it. (I have to say 'something like' it, because T1, T2... are specific theories, not just the negation of T.) (†): Note that, unlike some presentations of underdetermination, I do not require that T and T* both predict ALL the available data. I take "Every theory is born refuted" seriously. And I actually think this makes underdetermination scenarios more likely, since a competitor theory need not be perfect -- and the imperfections/ shortcomings of T could be different from those of T* (e.g. T might be more complicated, while T* has a narrower range of predictions). posted by Greg Frost-Arnold @ 12:02 PM 0 comments cognitive impenetrability of some aesthetic perception For me, one of the interesting experiences of getting older is seeing, from the internal first-person perspective, many of the generalizations one hears about 'getting older' come true in my own life. One of the most obvious/ salient ones for me is about musical tastes. I love a lot of hip hop from the early-to-mid 90's. (This is probably still my favorite hip hop album of all time.) I do also like some of the stuff that is coming out now, but on average, the beats in particular just sound bad to me. In particular, the typical snare sound -- I can't get over how terrible and thin it sounds. But on the other hand, I know full well that, as people get older, they start thinking 'Young people's music today is so much worse than when I was a kid!' And that I heavily discounted old people's views about new music when I was in school. Yet this makes absolutely no difference to my perceiving the typical trap snare sound today as really insubstantial and weak -- just ugly. The theoretical knowledge makes zero difference to my experience. This reminded me of Fodor's famous argument from the Müller-Lyer illusion* for the cognitive impenetrability of perception. No matter how many times I am told that the two horizontal lines are the same length, no matter how many times I lay a ruler next to each line in succession and measure them to be the same length, I still perceive one line as shorter than the other. My theoretical knowledge just can't affect my perception. In a bit of jargon, the illusion is mandatory. My experience of the typical hip hop snare sound today is similarly mandatory for me, despite the fact that I know (theoretically/ cognitively) that, as an old person, I should discount my aesthetic impressions of music coming out today. This seems like it could make trouble for a Fodorian who wants to use the mandatoriness of illusions as an argument that perception is unbiased/ theory-neutral -- in a conversation about the best hip hop albums of all time, my aesthetic data would extremely biased towards stuff that came out between 1989-1995. *(Have you seen the dynamic Müller-Lyer illusions? Go here and scroll down to see a few variants.) posted by Greg Frost-Arnold @ 7:25 AM 0 comments Morals and Mood (Situationism vs virtue ethics, once more) Given how much has been written in the last couple of decades about the situationist challenge to virtue ethics, I'm guessing someone has probably already said (something like) this before. But I haven't seen it, and I'm teaching both the Nicomachean Ethics and the section in Appiah's Experiments in Ethics on situationism vs. virtue ethics now, so the material is bouncing around in my head. First, a little background. (If you want more detail, there are a couple nice summaries of the debate on the Stanford Encyclopedia of Philosophy here (by Alfano) and here (by Doris and Stich).) The basic idea behind the situationist challenge to virtue ethics is the following: there are no virtues (of the sort the virtue ethicist posits), because human behavior is extremely sensitive to apparently minor -- and definitely morally irrelevant -- changes in the environment. For example, studies show that someone is MUCH more likely to help a stranger with a small task (e.g. picking up dropped papers, or making change for a dollar) outside a nice-smelling bakery than a Staples office supply store, or after finding a dime in a pay phone's coin return, or in a relatively quiet place than a relatively loud one. The Situationist charges that if the personality trait of generosity really did exist, and was an important driver of people's behavior, then whether people perform generous actions or not would NOT depend on tiny, morally irrelevant factors like smelling cinnamon rolls, finding a dime, or loud noises. A virtue has to be stable and global; that behavior can change so much in response to apparently very minor environmental changes suggests that there is no such stable, global psychological thing contributing significantly to our behavior. That's the basic Situationist challenge. Defenders of Virtue Ethics have offered a number of responses to this situationist challenge (the SEP articles linked in the previous paragraph describe a few). Here is a response that I have not personally seen yet: a person's mood is a significant mediator between the minor situational differences and the tendency to help a stranger. When we describe the experimental results as a correlation between a tiny, apparently unimportant environmental change and a massive change in helping behavior, then the experimental results look very surprising -- perhaps even shocking. But it would be less surprising or shocking, if instead of thinking of what's going on in these experiments as "The likelihood of helping others is extremely sensitively attuned to apparently trivial aspects of our environment," we rather think of what's happening as "All these minor environmental changes have a fairly sizeable effect on our mood." For to say that someone in a particularly good mood is much more likely to help a stranger is MUCH less surprising than "We help people outside the donut shop, but not outside the Staples." In other words: if mood is a major mediator for helping behaviors, then we don't have to think of our behaviors as tossed about by morally irrelevant aspects of our environments. That said, we would have to think of our behavior as shaped heavily by our moods -- but I'm guessing most people would probably agree with that, even if they've never taken a philosophy or psychology class. Now, you might think this is simply a case of a distinction without a difference, or "Out of the frying pan, into the fire": swapping smells for moods makes no real difference of any importance to morality. I want to resist this, for two reasons; one more theoretical/ philosophical, and the other more practical. First, the theoretical reason recognizing that mood is a mediator in these experiments matters: I don't think a virtue ethicist would have to be committed to the claim that mood does not have an effect on helping behaviors. Virtue ethicists can agree that generosity should not be sensitive to smells and dimes per se. However, the fact that someone who is in a better mood is (all else equal) more likely to help strangers than someone in a worse mood is probably not devastating evidence against the virtue ethicist's thesis that personality traits (like generosity) exist and play an important role in producing behavior. Second, more practically: one concern (e.g. mentioned by Hagop Sarkissian here) about the Situationist experimental data in general is that often times we are not consciously aware of the thing in our situation/environment that is driving the change in our behavior (I may not have noticed the nice smells, or the absence of loud noises). But mood is different: I have both better access to my mood, and a baseline/ immediate knowledge that my mood often affects my behavior. Whereas given the situationist's characterization of the data, I often don't know which variables in my environment are causing me to help the stranger or not. So if I am in a foul mood, and realize I am in a foul mood, I could potentially consciously 'correct' my automatic, 'system-1' level of willingness to help others. Of course, on this way of thinking about it, i.e. mood as mediating, I often won't know what is CAUSING my good mood. But that's OK, because I will still be able to detect my mood (usually -- of course, sometimes we are sad, or angry, or whatever, without really noticing it. But my point is just that we are better detectors of our current mood than we are of the various elements of our environment that could potentially be influencing our mood positively or negatively). So in short: I think the situationist's challenge to virtue ethics is blunted somewhat if we think of mood as a mediator between apparently trivial situational variables and helping behaviors. Tarski, Carnap, and semantics 1. Synthese recently published Pierre Wagner's article Carnapian and Tarskian Semantics, which outlines some important differences between semantics as Tarski conceived it (at least in the 1930s-40s) and as Carnap conceived it. This is important for anyone who cares about the development of semantics in logic; I'd been hoping someone would write this paper, because (a) I thought it should be written, but (b) I didn't really want to do it myself. Wagner's piece is really valuable, in my opinion. And not merely for antiquarian reasons: many today have the feeling that semantics in logic (roughly: model theory) is the natural/ inevitable way to come at semantics in logic. But how exactly to pursue semantics was actually very much up for debate and in flux for about 20 years after Tarski's 1933 "On the Concept of Truth in Formalized Languages." And the semantics in that monograph is NOT what you would find in a logic textbook today. 2. I am currently putting the finishing touches on volume 7 of the Collected Works of Rudolf Carnap, which is composed of Carnap's three books on semantics (Introduction to Semantics, Formalization of Logic, and Meaning and Necessity). There is a remark in Intro to Semantics that is relevant to Wagner's topic, which Wagner cited (p.104), but I think might be worth trying to investigate in more detail. Carnap writes: our [= Tarski's and my] conceptions of semantics seem to diverge at certain points. First ... I emphasize the distinction between semantics and syntax, i.e. between semantical systems as interpreted language systems and purely formal, uninterpreted calculi, while for Tarski there seems to be no sharp demarcation. (1942, pp. vi-vii) I have two thoughts about this quotation: (i) Is Carnap right? Or did he misunderstand Tarski? (Carnap had had LOTS of private conversations with Tarski by this point, so the prior probability I assign to me understanding Tarski better than Carnap does is pretty low.) (ii) If Carnap is right about Tarski on this point, then (in my opinion) we today should give much more credit to Carnap for our current way of doing semantics in logic than most folks currently do. We often talk about 'Tarskian semantics' today as a short-hand label for what we are doing, but if there were 'no sharp demarcation' between model theory and proof theory (i.e. between semantics and syntax), then the discipline of logic would look very different today. Against Selective Realism (given methodological naturalism) The most popular versions of realism in the scientific realism debates today are species of selective realism. A selective realist does not hold that mature, widely accepted scientific theories are, taken as wholes, approximately true---rather, she holds that (at least for some theories) only certain parts are approximately true, but others parts are not, and thus do not merit rational belief. The key question selective realists have grappled with over the last few decades is: which are the 'good' parts (the "working posits," in Kitcher's widely used terminology) and which are the 'bad' parts (the "idle wheels") of a theory? An argument against any sort of philosophical selective realism just occurred to me, and I wanted to try to spell it out here. Suppose (as the selective realist must) there is some scientific theory that scientists believe/ accept, and which according to the selective realist makes at least one claim (call it p) that is an idle wheel, and thus should not be rationally accepted. It seems to me that in such a situation, the selective realist has abandoned (Quinean) methodological naturalism in philosophy, which many philosophers---and many philosophers of science, in particular---take as a basic guideline for inquiry. Methodological naturalism (as I'm thinking of it here) is the view that philosophy does not have any special, supra-scientific evidential standards; the standards philosophers use to evaluate claims should not be any more stringent or rigorous than standards scientists themselves use. And in our imagined case, the scientists think there is sufficient evidence for p, whereas the selective realist does not. To spell out more fully the inconsistency of selective realism and methodological naturalism in philosophy, consider the following dilemma: By scientific standards, one either should or should not accept p. If, by scientific standards, one should not accept p, then presumably the scientific community already does not accept it (unless the community members have made a mistake, and are not living up to their own evidential standards). The community could have re-written the original pre-theory accordingly to eliminate the idle wheel, or they could have explicitly flagged the supposed idle wheel as a false idealization, e.g. letting population size go to infinity. But however the community does it, selective realism would not recommend anything different from what the scientific community itself says, so selective realism becomes otiose ... i.e., an idle wheel. (Sorry, I couldn't help myself.) On the other hand, if, by scientific standards, one should accept p, then the selective realist can't be a methodological naturalist: the selective realist has to tell the scientific community that they are wrong to accept p. I can imagine at least one possible line of reply for the selective realist: embrace the parenthetical remark in the first horn of the dilemma above, namely, scientists are making a mistake by their own lights in believing p. Then the selective realist would need to show that there is a standard operative in the scientific community that the scientists who accept p don't realize should apply in the particular case of p. But that may prove difficult to show at this level of abstraction. Confirmation holism and justification of individual claims How do epistemological(/confirmation) holists think about the justification of the individual claims that compose the relevant ‘whole’? Epistemological holism or confirmation holism, I take it, holds that sentences cannot be justified or disconfirmed in isolation. In other words, we can only fundamentally justify or disconfirm sufficiently large conjunctions of individual claims. What counts as ‘sufficient’ depends on how big a chunk of theory you think is needed to be justifiable: some holists allow big sets of beliefs to be confirmed/justified even if they are proper subsets of your total belief-set. (I will use 'individual claim' to mean a claim that is 'too small' i.e. 'too isolated' to admit of confirmation, according to the holist.) I’m guessing confirmation holists also think that the individual claims that make up a justified whole are themselves justified. (If holists didn’t think that, then it seems like any individual claim a holist made would be unjustified, by the holist’s own lights, unless they uttered it in conjunction with a sufficiently large set of other utterances.) The individual claims are justified, presumably, by being part of a sufficiently large conjunction of claims that are fundamentally/ basically justified. Individual claims, if justified, can only be derivatively justified. Presumably, if one believes that ‘A1 & A2 & … & An’ (call this sentence AA) is justified, then that person has (or: thinks they should have) a rational degree of belief in AA over 0.5. But now I have questions: (1) How does a holist get from the degree of belief she has in AA, to the degree of belief she has in a particular conjunct? There are many, many ways consistent with the probability calculus to assign probabilities to each of the Ai’s to get any particular rational degree of belief (except 1). (2) We might try to solve that ‘underdetermination’ problem in (1) by specifying that every conjunct is assigned the same degree of belief. This seems prima facie odd to me, since presumably some conjuncts are more plausible than others, but I don’t see how the holist could justify having different levels of rational belief in each conjunct, since each conjunct gets its justification only through the whole. (Perhaps the partial holist can tell a story to be told about claims participating in multiple sufficiently large conjunctions that are each justified?) (3) Various ways of intuitively assigning degrees of belief to the individual conjuncts seem to run into problems: (i) The holist might say: if I have degree of belief k in AA, then I will have degree of belief k in each conjunct. Problem: that violates the axioms of the probability calculus (unless k=1). (ii) Alternatively, if the holist wants to obey the axioms of the probability calculus, then the rational degree of belief she will need to have in each conjunct must be VERY high. For example, if the degree of belief in AA is over 0.5, and each conjunct is assigned the same value (per (2)), and there are 100 individual conjuncts, then one’s degree of belief in each conjunct must be over 0.993. And that seems really high to me. (iii) One alternative to that would be to say that each conjunct of a large conjunction has to be over 0.5. But then you would have to say that the big 100-conjunct conjunction is justified when your rational degree of belief in it is anything above 7.9x10-31. And that doesn’t sound like a justified sentence. Two final remarks: First, it seems like someone must have thought of this before, at least in rough outline. But my 10 minutes of googling didn’t turn up anything. So if you have pointers to the literature, please send them along. Second, for what it's worth, this occurred to me while thinking about the preface paradox: if you think justification only fundamentally accrues to large conjunctions and not individual conjuncts, then it seems like you couldn’t run (something like) the preface paradox, since you couldn't have a high rational degree of belief in (an analogue of) the claim ‘At least one of the sentences in this book is wrong.’ Defining 'inductive argument' should not be this difficult Carnap, give me strength. I cannot define ‘inductive argument’ and ‘fallacious argument’ in a way that correctly captures the intuitive boundary between inductive and fallacious arguments. Like (almost) everyone else, I define ‘deductively correct,' i.e. 'valid' as follows: An argument A is deductively correct (valid) = If all of A’s premises are true, then A’s conclusion must be true = If all of A’s premises are true, then it is impossible for A’s conclusion to be untrue. Now, there are two (or maybe three) definitions of ‘inductive argument’ that follow this pattern of definition. (Definition 1: probable simpliciter) An argument B is inductively correct = If all of B’s premises are true, then B’s conclusion is probably true = If all of B’s premises are true, it is unlikely that B’s conclusion is untrue (Definition 2: more probable) An argument C is inductively correct = If all of C’s premises are true, then C’s conclusion is more likely to be true = If all of C’s premises are true, the probability of the conclusion’s untruth decreases Definition 1: Pr(Conclusion | Premises) > 0.5 Definition 2: Pr(Conclusion | Premises) > Pr(Conclusion) (If you think >0.5 is too low, you can pick whatever higher cutoff you like. My current problem is different from picking where to set that threshold number.) Now I can state my problem: it looks like neither definition makes the correct classifications for some paradigm examples of fallacies. On Definition 1, any argument whose conclusion highly probable regardless/independent of the truth or falsity of the premises, will count as inductively correct. That is, any non sequitur whose conclusion is probably true will count as inductively correct. (This is the inductive analog of the fact that a logical truth is a deductive consequence of any set of premises. But it just feels much more wrong in the inductive case, for some reason; maybe just because I've been exposed to this claim about deductive inference for so long that it has lost its un-intuitiveness?) On Definition 2, hasty generalization (i.e. sample size too small) will count as inductively correct: suppose I talk to 3 likely US Presidential voters and all 3 say they are voting for Clinton. It is intuitively fallacious to conclude that Clinton will win the Presidency, but surely those 3 responses give some (small, tiny) boost to the hypothesis that she will win the Presidency. But non sequiturs and hasty generalizations are both paradigm examples of fallacies, so neither Definition 1 nor Definition 2 will work. I said above that there might be a third definition. This would simply be the conjunction of Definitions 1 and 2: If the premises are true, then the conclusion must be BOTH probable simpliciter (Def. 1) AND more probable (Def. 2). It seems like this would rule out both non sequiturs (because the truth of the premises increases the probability of the conclusion) and hasty generalizations (because the conclusion wouldn’t be probable simpliciter). Problem solved? I don’t think it is, because there could be a hasty generalization for an argument whose conclusion is probable even if the premises are all false. Given our current background information (as of Sept. 6 2016) about the US Presidential race, the above example probably fits this description: ‘Clinton will win’ is more likely to be true than not, and the sample of three voters would boost a rational agent’s confidence in that claim (by a miniscule amount). That said, I will grant that a reasonable person might think this example is NOT a fallacy, but rather just an inductively correct argument that is so weak it is ALMOST a fallacy. Before signing off, I will float a fourth candidate definition: Definition 4: Pr(Conclusion | Premises) >> Pr(Conclusion) put otherwise: Definition 4: Pr(Conclusion | Premises) > Pr(Conclusion)+n, for some non-tiny n>0. You could also conjoin this with Definition 1 if you wanted. This would take care of hasty generalizations. But does it create other problems? (You might object “That n will be arbitrary!” My initial reaction is that setting the line between inductive and fallacious at >0.5 [or wherever you chose to set it] is probably arbitrary in a similar way.) Now I can state my problem: it looks like neither definition will make the right classifications for some paradigm examples of fallacies. the no-miracles argument may not commit the base-rate fallacy Certain philosophers argue that the No-Miracles Argument for realism (Colin Howson, Peter Lipton), the Pessimistic Induction against realism (Peter Lewis), or both arguments (P.D. Magnus and Craig Callender) commit the base-rate fallacy. I am not sure these objections are correct, and will try to articulate the reason for my doubt here. I need to give some set-up; many readers will be familiar with some or all of this. So you can skip the next few paragraphs if you already know about the base-rate objection to the No-Miracles Argument and the Pessimistic Induction. I suspect many readers are familiar with the base-rate fallacy; there are plenty of explanations of it around the internet. But just to have a concrete example, let’s consider a classic case of base-rate neglect. We are given information like the following, about a disease and a diagnostic test for this disease: (1) There is a disease D that, at any given time, 1 in every 1000 members of the population has: Pr(D)=.001. (2) If someone actually has disease D, then the test always comes back positive: Pr(+|D)=1. (3) But the test has a false positive rate of 5%. That is, if someone does NOT have D, there is a 5% chance the test still comes back positive: Pr(+|~D)=.05. Now suppose a patient tests positive. What is the probability that this patient actually has disease D? Someone commits the base-rate fallacy if they say the probability is fairly high, because they discount or ignore the information about the ‘base rate’ of the disease in the population. Only 1 in 1000 people have the disease. But for every 1000 people who don’t have it, 50 people will test positive. You have to use Bayes’ Theorem to get the exact probability that someone who tests positive has the disease; the probability turns out to be slightly under 2%. In the context of the No-Miracles and Pessimistic Induction arguments, the objection is that both arguments ignore a relevant base rate. For example, the No-Miracles argument says: (A) Pr (T is empirically successful | T is approximately true) = 1 (B) Pr (T is empirically successful | ~ (T is approximately true)) <<1. Inequality (B) is supposed to capture the ‘no-miracles intuition’: the probability that a false theory would be empirically successful is so low that it would be a MIRACLE if that theory were empirically successful. Hopefully you can see that (A) corresponds to (2) in the original, medical base-rate fallacy example, and (B) corresponds to (3). Empirical success is analogous to a positive test for the truth of a theory, and the no-miracles intuition is that the false-positive rate is very low (so low that a false positive would be a miracle). The base-rate objection to the No-Miracles argument is just that the No-Miracles argument ignores the base rate of true theories in the population of theories. In other words, in the NMA, there is no analogue of (1) in the original example. Without that information, even a very low false-positive rate cannot license the conclusion that an arbitrary empirically successful theory is probably true. (And furthermore, that base rate is somewhere between extremely difficult and impossible to obtain: what exactly is the probability that an arbitrary theory in the space of all possible theories is approximately true?) OK, that concludes the set-up. Now I can state my concern: I am not sure the objectors’ demand for the base rate of approximately true theories in the space of all possible theories is legitimate. Why? Think about the original medical example again. There, we are simply GIVEN the base rate, namely (1). But how would one acquire that sort of information, if one did not already have it? Well, you would have to run tests on large numbers of people in the population at large, to determine whether or not they had disease D. These tests need not be fast-diagnosing blood or swab tests; they might involve looking for symptoms more ‘directly,’ but they will still be tests. And this test, which we are using to establish the base rate of D in the population, will still presumably have SOME false positives. (I’m guessing that most diagnostic tests are not perfect.) But if there are some false positives, and we don’t yet know the base rate of the disease in the population, then—if we follow the reasoning of the base-rate objectors to the NMA and the PI—any conclusion we draw about the proportion of the population that has the disease is fallacious, for we have neglected the base rate. But on that reasoning, we can never determine the base rate of a disease (unless we have an absolutely perfect diagnostic test), because of an infinite regress. In short: if the NMA commits the base-rate fallacy, then any attempt to discover a base rate (when detection tools have false positives) also commits the base-rate fallacy. But presumably, we do sometimes discover base rates (at least approximately) without committing the base-rate fallacy, so by modus tollens, the NMA does not commit the base-rate fallacy. NMA does not commit the base rate fallacy, because it does not ignore AVAILABLE evidence about the base rate of true theories in the population of theories. In the medical example above, the base rate (1) is available information; under-weighing generates the fallacy. In the scientific realism case, however, the base rate is not available. If we did somehow have the base rate of approximately true theories in the population of all theories (the gods of science revealed it to us, say), then yes, it would be fallacious to ignore or discount that information when drawing conclusions about the approximate truth of a theory from its empirical success, i.e. the NMA would be committing the base-rate fallacy. But unfortunately the gods of science have not revealed that information to us. Not taking into account unavailable information is not a fallacy; in other words, the base-rate fallacy only occurs when one fails to take into account available information. I am not certain about the above. I definitely want to talk to some more statistically savvy people about this. Any thoughts? Karim Zahidi // 16/10/18 Greg Frost-Arnold // 16/10/18 Unknown // 29/6/17 Neil Sinhababu // 31/3/17 Anonymous // 25/7/18 P.D. Magnus // 13/2/17 Greg Frost-Arnold // 14/2/17 Anonymous // 8/9/16 Greg Frost-Arnold // 9/9/16 Tristan Haze // 10/9/16 Jonathan Surovell // 11/9/16 P.D. Magnus // 8/9/16 antimeta Boundaries of Language consequently.org Entia et Nomina Extended Cognition blog Footnotes on Epicycles Fragments of Consciousness Honest Toil hpb etc. It's Only a Theory Logic Matters LogBlog logicandlanguage.net Nothing of Consequence Opiniatrety Philosophy Talk Soul Physics Taking Up Spacetime That Logic Blog Thoughts Arguments and Rants The Unethicist my department my graduate alma mater HOPOS-L archives PhilSci archive online papers in philosophy Complete works of Darwin online cognitive impenetrability of some aesthetic percep... Morals and Mood (Situationism vs virtue ethics, on... Against Selective Realism (given methodological na... Confirmation holism and justification of individua... Defining 'inductive argument' should not be this d... the no-miracles argument may not commit the base-r...
cc/2020-05/en_middle_0016.json.gz/line4890
__label__cc
0.733148
0.266852
(-) At The Museum (8) (-) Evolution (6) (-) Human Connections (3) (-) Crabs, Shrimp & Relatives (9) Success Stories in Ocean Conservation It is easy to feel hopeless when reading the news coverage of ocean conservation.... A Tale of a Right Whale Suspended at the center of the Sant Ocean Hall is a life-size model of a North... Sally Lightfood Crab, Galápagos Islands, Ecuador The Galápagos Islands site in Ecuador was inscribed on the World Heritage List in... Whale Entanglement This is North Atlantic right whale #3333 who was spotted with fishing gear trailing... Fishing Gear Solutions This whale is entangled in fishing gear. Entangled whales often need human help to... The Design of a Beautiful Weapon This summer, many of you have likely enjoyed feasting on crabs, be they blue,... Claws Out: Fiddler Crabs Do Battle Male fiddler crabs each have a single super-sized claw that they use as a weapon to... Surveying Life On Sea Turtles “It is strange to think of a sea turtle as an ecosystem,” says Amanda... Searching for Crustaceans in the Deep Sea In this video Smithsonian research zoologist Dr. Martha Nizinski takes viewers with... What Lives in the Gulf of Mexico? Exploring Marine Collections on Google Earth When he was 10 years old, Stephen Cairns lived in Cuba where he kept a collection... Tracking volcanic rock to the shores of Belize Mangrove Mystery – Where Did All the Pumice Come From? For years, scientists...
cc/2020-05/en_middle_0016.json.gz/line4891
__label__wiki
0.653989
0.653989
Explore All Topics Careers Economy Ecosystems Geodesy Hazards Navigation Observations Ocean Recreation Story Maps Tools NOS Education About Just for Kids Nautical Charts Sea Floor Mapping Corals Currents Estuaries Global Positioning Pollution Tides Prince William's Oily Mess The Lionfish Invasion Games Resources Projects Ocean &Climate Literacy Planet Stewards Program Sea Level Rise The Earth Scientist Oysters In the Chesapeake Bay Professional Development Coral Reefs Estuaries Living in Weather Ocean & Climate Tides & Currents Climate Resources Lesson Plans Curriculum Education Games Discover Your World Discover Your Changing World What are coquina and tabby? Coquina and tabby are “bullet-proof” building materials born of the sea. The Castillo de San Marcos National Monument in St. Augustine, Florida, stands sentinel over Matanzas Bay. The coquina structure remains sturdy after three centuries. The natural coquina outcroppings at Washington Oaks Gardens State Park near Palm Coast, Florida, are among the largest on the Atlantic Coast. Credit: Washington Oaks Gardens State Park Nearly every child who’s played on the beach has built a simple sand castle by creating a turret with an upturned bucket of sand. Others, more elaborate (and typically built with help from an ambitious parent), boast multiple structures surrounded by moats and rivers that ebb and flow with the motion of ocean waves. But did you know that near St. Augustine, Florida — the nation’s oldest city — there exists an actual “castle” made of sand? Located on 20.5 acres on the western shore of Matanzas Bay, the Castillo de San Marcos National Monument is the oldest (circa 1695) and largest masonry fort in the continental United States. The Castillo’s masonry, or stonework, is largely comprised of coquina (Spanish for “small shells”) — a natural concrete derived from the ocean. Coquina is a rare form of limestone composed of the shell fragments of ancient mollusks and other marine invertebrates, which, over time, are glued together by dissolved calcium carbonate in the shells. Coquina is also the name of a common tiny clam found everywhere on Florida beaches. Their shells, which come in countless colors, are reflected in the Castillo’s muted hues. As a building material, coquina is lightweight, easy to find (it’s indigenous to the Florida coast), easy to use, and nearly indestructible. Not only is coquina bullet-proof, it is virtually cannon-ball- proof! Due to its plentiful microscopic air pockets, coquina is easily compressed. In days long past, cannon balls fired at the Castillo simply lodged in its walls. Which, one supposes, is why the old fort still stands after 300 years. One of the best places to see coquina in its natural state is Washington Oaks Garden State Park near Palm Coast, Florida, about 30 miles south of St. Augustine. The park’s picturesque coquina outcroppings are some of the largest on the Atlantic Coast. A related building material is tabby, often called coastal concrete, which is basically manmade coquina. Tabby is composed of the lime from burned oyster shells mixed with sand, water, ash, and other shells. As far back as the 1600s, Spanish and English settlers used tabby to build their homes and other structures, and to pave their roads, throughout the coastal Carolinas, Georgia, and Florida. Many tabby buildings still stand today, including Georgia’s Fort Pulaski near Savannah and the R.J. Reynolds mansion on Sapelo Island. These historic structures, among many others, are testament to both the ingenuity of early Americans and the untold bounty of the sea. What's In a Name? Discover National Park System Designations
cc/2020-05/en_middle_0016.json.gz/line4897
__label__cc
0.58241
0.41759
Sentinel 9.4 I’m a tinker. I’m supposed to be smart. So how can I have been so stupid? Ballistic raised one hand and pointed at Kid Win. He waited until Kid Win moved before kicking at the uneven, rubble-strewn ground, sending a spray of concrete and wood fragments flying like a hail of bullets. It only grazed the teenage hero mid-leap, lacerating the side of his stomach, hip and thigh, chipping his armor. It still hit hard enough that it twisted him in midair. He landed on his back atop the rubble that covered the ground, grunted. “Hey!” Ballistic bellowed, “Little girl!” Kid Win saw Ballistic pointing at Vista. The villain, between his build and armor, had the frame of a football player, a dramatic contrast to the young heroine. He pointed at her, paused long enough for her to bend the ground into a semblance of cover, then launched a chunk of concrete at her. The concrete flew at an angle that wouldn’t have hit the girl anyways, struck the barrier and shattered, sending debris careening onto and into the girl. Vista screamed and fell backwards, part of her barrier crumbling to land on top of her. He’s telling us exactly where he’s going to attack next. Kid Win looked up, saw Sundancer with her orb hovering a good fifteen feet off the ground, keeping it away from the walls of the building and the corpses that were hung above them. Even though it was fifteen feet up and thirty feet away, he could feel the heat of it prickle his exposed skin. He knew from the Endbringer fight that she could make it bigger, move it faster. As the burning sphere drifted forward, staying at roughly the same height, Flechette and Glory Girl were forced to scramble away. Shadow Stalker leaped off of the top of the wall and into the alleyway next to the building to get away from the heat. Only Vista remained where she was, caught under debris that she was striving to shrink down and push away. It dawned on Kid Win. Sundancer and Ballistic, at the very least, were holding back. Because they were strong enough that going all out would leave corpses. The revelation didn’t make him feel any better. In fact, it was just the opposite. If these guys got desperate or panicked, they might stop being so polite about it. Trickster and Genesis were tangling with Weld and Clockblocker – Clockblocker was putting paper in the air, freezing it to give himself footholds to go after his flying opponent. Any time Genesis moved to attack, Clockblocker set paper in her way, edge towards her, or he tried to duck in close enough to touch her. Giving up on more physical means, she exhaled a cloud of the choking smoke. Clockblocker and Weld both worked together to minimize the spread of the cloud, using paper and plywood, freezing it in place with Clockblocker’s power. Kid Win decided they had a handle on that. It was up to him to help against Ballistic and Sundancer. As he climbed to his feet, breaking into a run before he was even standing straight, he raised his spark pistol and fired off a series of oversized blue sparks at Ballistic. Trickster managed to teleport him again, swapping his position with Ballistic’s. The forward momentum of his sprint was enough to get him out of the way of his own gunfire. His spark pistol sported a small power core that used spatial warping technology to magnify and then reabsorb a steady electrical current. The barrel was wired with a helix-shaped electromagnetic rail, based on some of Armsmaster’s old data on the ‘hard’ light Purity and Dauntless created. Nanomolecular, ionically charged rifling on the barrel’s interior was arranged to guide the fired charges into a rough elliptical shape, which sustained their shape and consistency the longest. In laymen’s terminology, it was not unlike a power bar that was plugged into itself, with a small addition that made each revolution of the current larger than the one before. An attached battery kept the current going. The shots themselves were ‘hard’ electricity condensed into balls, which meant they had a physical impact to them, due to how they carried and transferred kinetic energy. Given how the weapon charged, waiting a few seconds between shots meant the next shot hit harder, up to a limit. I can make something like this, which is brilliant, then I go and dismantle my fricking hoverboard to get parts for a project I never even finish. Idiot. Ballistic marched towards Vista, who was trying to climb to her feet. He was intercepted by Glory Girl, who slammed him into a wall. She punched him, drove her knee into his gut, then slammed him against the wall again, to keep him off-balance and hurting. Ballistic slumped against her and grabbed at the collar of her costume for support. A second later, Glory Girl was a blur, disappearing into the skyline. His attacker gone, Ballistic fell onto his hands and knees with a grunt. Flechette threw a handful of darts at Sundancer, pinning the girl against the wall. Somehow Flechette had avoided Trickster’s attention. How? Kid Win turned to look, saw that she was standing so her body blocked Trickster’s line of sight to both the darts and his teammate. So he can only teleport what he sees? Kid Win moved to mimic Flechette’s technique, running to a position where he would be between the injured Ballistic and Trickster. He cocked his spark pistol. He was nearly lined up for his shot when his gun disappeared from his hand, an awkwardly sized piece of wood taking its place. A second later, his mask and visor cracked against a hard surface. He had to grip the wall to steady himself and keep from falling. He’d been teleported. Then the wall moved beneath his hand, and he heard Clockblocker shout, “Get down, Kid!” He let himself fall, simultaneously realizing he had been leaning against Genesis, in her gargoyle-like form. Weld slammed into the villainess, his left hand in the form of a heavy miner’s pick. It did a surprising amount of damage, but she didn’t seem to care. She gripped Weld around the face with a claw, raked his chest twice with criss-crossing slashes of her other hand, leaving deep gouges in the metal. The same noxious black smoke that she had been breathing began to billow out of the hole the pick had made in her chest. Clockblocker charged, but Genesis shoved Weld so the two heroes stumbled into one another, delaying them long enough for her to leap into the air. She beat her wings to keep herself aloft and out of reach. Kid Win unslung his laser rifle and fired at the villainess. His first shot grazed her, as one flap of her wings carried her higher into the air, but the next two hit the mark. One struck her in the shoulder, leaving a hole large enough to fit his hand through, the other struck her in the side of the head, doing a similar amount of damage. Genesis dropped from the sky, exploded into a mess of dark smoke and pebbles as she struck the ground. Feeling a moment’s panic, he checked the settings on his gun. Normal levels, no anomalies. It could heat metal and other inorganic materials, cut through more fragile materials, but against a person, it wouldn’t do more than hurt and maybe leave the mildest kind of burn. That’s her power, he reminded himself, you didn’t kill her. But his gun had done a surprising amount of damage. Was it some interaction with how she pulled her new shapes together? A specific wavelength, a weakness to lasers? He wasn’t about to complain. He wheeled around, fired on the other villains. An injured Ballistic opened fire on Vista, discharging a series of pieces of rubble at an angle. It struck the ground just in front of the girl and fallout from the impacts showered her. Each shot drove her back further, buying him a chance to limp to Sundancer’s side. He touched the darts that were fixing her to the wall, sending them flying into Weld’s face. “Fuck!” Weld cursed, the metal spikes of the darts jutting out of his jaw, cheekbone, eyebrow and forehead, “Takes forever to get my face right after something like this!” Trickster’s teleportations had placed the enemy’s group in the interior of the building, with the Wards surrounding them. Surrounding one’s enemy wasn’t quite an advantage when the enemy could teleport, but for a moment, they all paused where they were, various weapons at the ready. It was the kind of momentary peace that fell when everyone was waiting to react to what the others were doing. A wind blew past them, and Kid Win blinked as a fat droplet of water spattered against his visor. It was starting to drizzle. He glanced up at the corpses where they hung on the walls of the building. “The water’s going to wash away the evidence if you don’t let us go and hurry to check on the bodies,” Trickster spoke. “Crime scene techs can’t get here in time with the roads like they are,” Weld spoke. “And we’re not allowed to touch the evidence anyways. Rules.” “Rules? You shouldn’t sweat those things so much,” Trickster chuckled, “Here, I’ll help you out.” Weld disappeared, and the burned corpse flopped to the ground. “Shit!” Clockblocker shouted, running forward. Weld dropped from the wall for the second time in a matter of minutes as the restraints intended for the woman’s corpse tore free of the concrete. Vista reshaped the wall to ease his descent. Kid Win raised his laser rifle to fire at Trickster. Dumb. He regretted it the second his finger left the trigger. As he predicted, he found himself somewhere else in the blink of an eye, and the impact of his own gunfire slammed into his back, intensely hot. He threw himself to the ground at the base of the building, where water pooled, rolling so his back was submerged. It’s not lethal, can’t do any permanent harm, you had it vetted, tested on pig meat. The balance of the fight had abruptly shifted. Clockblocker, Flechette and Vista were where the three Travelers had been, and vice versa. “Nuh uh uh, kiddo,” Trickster spoke, as the gap in the wall began closing behind his group, “Up you go.” The flayed corpse appeared in Vista’s position. No! Kid Win turned, saw Vista on the wall. She’d gotten tangled in the loops of wire that had been holding the corpse up. The metal wire was coiled around a shattered part of the wall, and more than one wire had caught around her neck. Another looping of wire bound her body, one of her arms caught against her side. She struggled to pull at the wire on her neck with her free hand, but it was little help. The wire pulled so tightly against her throat that Kid Win feared it would cut her skin. “Trickster!” Sundancer cried out, horrified. “Just run!” was the villain’s only reply. The three villains started running, leaving the building behind, their footsteps sloshing and splashing. Kid Win raised his laser pistol, aimed carefully, then fired, landing the shot a half-foot to the right of Vista’s throat. The wires heated and split, freeing her, and she dropped a foot before catching on more wires. Nothing dangerous, this time, but it was a fair distance to fall and one slip could see her getting cut on the wire, strangled or cracking her head open as she fell. Shadow Stalker materialized behind Trickster, catching him around the throat in a headlock. She used one foot to kick his feet out from under him, and then forced him face first into the water. Kid Win hesitated. Help her or help Vista? Vista. Shadow Stalker would say she could handle herself. Made a point of trying to. He fired more shots to free Vista, missing the wires one or two times. The heroine, for her part, focused on angling the wall beneath her to allow herself to slide down instead of falling the full distance. Ballistic shot Shadow Stalker, driving her back. The attack had left a gaping hole just below her heart, the edges wispy. The gap closed, but the attack had separated her from Trickster, and hurt her badly enough that she crumpled to the ground, a hand to her chest. Kid Win fired a salvo at the retreating villains, grazed Ballistic. Sundancer turned, directing her orb between their groups. She dropped it into the water. Massive clouds of heated steam rose where the orb met water, obscuring the battlefield. By the time it cleared, the villains were gone. It took a minute to check that none of them had suffered any permanent damage. After some debate, they moved the bodies to a more secure, dry spot, inside the building. Glory Girl managed to make her way back two minutes after the Travelers were gone, helped with the last body that still hung on the wall. By the time they were done, the rain was pouring down. Kid Win stared down at the corpses, an ugly feeling in his gut. He was dumb, easily distracted, prone to leaving his projects unfinished, and it was moments like this that this knowledge hit him particularly hard. His dad had made him get tested, and the doctors had labeled him with ADD and dyscalculia. He held to the opinion that the ADD diagnosis was way overused – he liked to think that he was just a daydreamer, prone to getting lost in his thoughts. The dyscalculia was something concrete that he couldn’t deny or explain away. He couldn’t keep numbers in his head, couldn’t make the most basic intuitive leaps or connections with them. All of that had been before he got his powers. Nothing had changed, except that now he could visualize something, instinctively know how he could put it together. His disability or disabilities put him a step behind the rest. His daydreaming was worse, because his thoughts were so damn interesting, now. He couldn’t take reliable measurements without using computers to do it. Couldn’t finish half his projects without feeling compelled to move on to something else. The PRT staff insisted he was exceptional with antigrav and guns, had it even marked in his file, but he knew it wasn’t so true. He finished his guns because they were simple, in their own way. It was easy enough to take three half-finished gun projects and mash them together. Create something with multiple settings, even. As far as he was aware, he was the only Tinker in the PRT’s records that didn’t have a defined specialty, gimmick or trick. He was increasingly worried that his special talent as a tinker was being able to occasionally make something despite his learning disability. Which would suck, if it were true. There were exceptions. He’d finished bigger projects. His hoverboard, driven by the idea of how awesome it would be to fly. Even then, it had been a chore. Monumentally stupid of him to dismantle it. The idea and motivation driving the action had been good: he was graduating the Wards in a little while, he’d be expected to change his name and adjust his methods, because an adult calling himself Kid Win was lame. He’d had an idea about a harness with a floating array of turrets that could fire different munitions depending on what gun he holstered in the main slot. Self adjusting and adaptive the way his Alternator Cannon was. Except he’d gotten frustrated at a snag in the testing, put it down to take a break and hadn’t picked it up again in six days. His hoverboard had effectively been destroyed for no reason, when it might have made the difference in getting the Travelers into custody. His Alternator Cannon was the real gem. It had been the result of a medication the PRT’s doctor had prescribed, which he’d been forced to stop after two weeks when he began to get increasingly dizzy, anxious and nauseous. While he’d been taking the pills, he’d been focused, had a glimpse, maybe, of what he could do if it weren’t for his distractibility and daydreaming. When Piggy had spoken of destroying the thing, the mere thought had been crushing. Then Leviathan had destroyed it for real, maybe the only truly brilliant thing he’d be able to make. He harbored fears it might even the only brilliant thing he’d ever be able to make. He wasn’t the worst hero ever, he knew that. He had things he could do. He could let the worries and the dozens of unfinished projects alone, most days. That changed when his team got thrashed. Thoughts like that had been plaguing him since the Endbringer event a week ago. He couldn’t shake the notion that he was in the running for the weakest member of the team. The notion that he was dumb, second-rate. That this loss, here, was his fault, because he had dropped the ball. The people of this city deserve a better hero, a more focused one. Weld spoke, disturbing him from his thoughts, “I just got a message. PRT is on their way. We head back now.” Hearing the unenthusiastic replies of his teammates, Kid Win realized that the rest of the team wasn’t in any better of a mood than he was. Losing had a way of doing that. Strangely comforting. “Got word from the Protectorate. They’re handling the case with the bodies, we’re not to touch it or get involved in any way,” Weld spoke, folding his arms. He had what looked like acne – blisters of extra-shiny metal on his face where the remainder of the darts hadn’t yet been fully integrated into his ‘skin’. He reclined in an expensive, custom-made office chair, capable of supporting his dense, heavy body. Everyone else had found seats in the central room of their headquarters. Everyone, that was, except for Glory Girl, who had gone home. She wasn’t yet an official member of the team. “No word on what’s going on?” Clockblocker asked. “They’re staying quiet on the subject,” Weld spoke. Vista leaned forward, “Maybe a serial killer?” “We should focus on what we do know,” Weld shook his head. “As far as tonight’s patrols-“ “Actually,” Kid Win cut in, “Sorry. But I have one theory.” “What?” Clockblocker asked. Kid Win glanced at Weld, checking to see if their leader was ok with it. Weld didn’t say anything, which he took as assent to continue. “There were two other crime scenes, right? Any idea if there were the same number of bodies at each crime scene?” “Same number-” Weld raised an eyebrow, “Why… Oh. Shit. I think I follow.” Smarter than you’d think, given his brute-force power and his appearance, Kid Win realized. Or I’m just that bad with numbers. The connection took me twenty minutes to make. “Three crime scenes with three bodies each. So it’d be nine bodies?” Clockblocker asked, “Each killed in some different way? I don’t see what killer that would fit with.” “Not one killer,” Kid Win answered, “Nine bodies, each for different killers.” “The Slaughterhouse Nine,” Clockblocker leaned back in his seat, groaning, “Fuck, that’d be all we needed.” “Wouldn’t be the first time they’ve arrived at a location in the wake of an Endbringer event,” Flechette pointed out. “Maybe it’s them,” Weld conceded, “And maybe the Protectorate figured that much out, with the clues they have from the other two scenes. It could be someone or something else. Either way, it’s not our case, not even in our league, and we should stay as hands off as we can manage. We need to talk about patrols and tonight’s duties.” “The grunt work,” Flechette offered a literal grunt to punctuate the statement. Kid Win and Clockblocker chuckled. “Vista’s due for a patrol, and as a young member, she has to go with someone. Lily?” Flechette smiled a little, “Quick to make me pay for the snark, huh? No, it’s cool, I’ve been wanting a chance to shoot the shit with Vista.” She extended her fist, with index finger and thumb extended to form a gun, mock fired it at her junior teammate. Vista rolled her eyes. “Clockblocker, you and I will handle the night’s shifts after that. Your call if you want to patrol with me or not, we can cover different routes and go for a wider area if you’d rather.” “Alright. We’ll figure it out.” “Leaving Shadow Stalker. You okay with the late-night, Sophia?” “Yeah, fine,” Sophia didn’t look up from her laptop. “And me?” Kid Win asked. “Special duty, tonight,” Weld smiled, “You’re recruiting.” “There’s a kid calling himself Chariot. Been racing around the city with a powered suit that lets him move a hundred miles an hour. Assault finally caught up with him last night, brought him into custody. Wound up calling the kid’s mom, got him to agree to talk to our recruiter. You. You’ll be meeting the kid in his home.” “Shared interests. You’re both tinkers. You have the best idea of how he thinks.” Kid Win nodded. He couldn’t quite put his finger on what he was feeling. A measure of excitement at the idea of getting to talk to another tinker that wasn’t Armsmaster? Sure. Fear? Would he be replaced by a new tinker? It was an immature thing to be spooked about, he knew that, but that didn’t make it any less real. “Cool,” he spoke, by way of agreement. “You convince him, it’ll look good to the guys upstairs,” Weld informed him. Right. Great. Pressure. “Now, onto a more serious topic. I’m seeing that this team is really disorganized, these days. I have no problem handling the brunt of the paperwork, it gives me a degree of insight into what’s going on that the files don’t. I don’t even mind cleaning up the kitchen and showers here when the janitors are off duty. But we really need to communicate. Last night Flechette went on patrol and ran into a situation with Parian she should have been briefed on. It could have turned hostile.” “Sorry,” Vista muttered. “It turned out okay,” Flechette smiled a little. “Right. It’s okay, it’s understandable, given all we’re trying to handle,” Weld reassured her, “But we can’t miss out on details and updates on the overall situation. The Protectorate have their hands full with the gang wars between Fenrir’s Chosen, Purity’s group and Coil, they’re now dealing with this serial killer or serial killers, and they’re still updating the records. So here’s what we’re going to do, I’ve checked it with Piggot, she agrees. I’m picking up an extra patrol shift, and I’ll be adjusting your patrol shifts down by twenty minutes each, moving them around slightly. With the downtime that creates, we’re going to have meetings like this, every day.” Pausing, Weld glanced at Clockblocker, as if expecting a response. When Clockblocker only nodded assent, Weld’s eyebrows rose a fraction in surprise. He continued, “Gives us a chance to talk about our recent patrols, fears, concerns, ideas. Or hell, just talk, because I’m seeing this trend where we only see each other in passing, while patrolling or in class, and some of you are going out of your way to spend time together and hash stuff out, even at the detriment of stuff like school.” “You’re talking about class, earlier,” Clockblocker said. “More or less. Not saying it’s a bad thing, but we can restructure our schedules, make time for it, instead of detracting from an area we need to pay attention to.” “Sure,” Clockblocker agreed. Was there a note of irritation in his voice? Kid Win couldn’t tell. Dennis was playing along, at least. “Now, about the paperwork you guys have been submitting, there’s been a few recurring problems…” Kid Win sighed and settled into his seat. This was going to be a little while. The building was ugly, had trash piled up on either side of the front door, a sour smell wafting out from it. The water level wasn’t so bad here, and the building was almost entirely intact. The only sign of damage was the boarded up windows on the first and second floors where the glass had been knocked out of the window frames. Red brick, it seemed like the usual sort of tenement building one would find in the Docks. He stepped inside. A Hispanic boy in the front hall whistled sharply as Kid Win stepped inside, while a group of Asian-American boys and girls in dirty clothing ran around him, screaming at a ear-piercing volume as they continued a game, some pointing and hooting at the superhero. Occupants aside, it was dark, with only two dingy lightbulbs and no open windows. It’s nine o’clock at night. Don’t these kids have a bedtime? He checked the folded paper he had in his hand, found the room number, and headed up the stairs. A morbidly obese, older man sat halfway up the stairs, maybe a babysitter for the kids. Kid Win hoped the man was a babysitter, because the man was white and the kids weren’t, meaning he probably wasn’t family. If he wasn’t getting paid, there was only one uncomfortable explanation for why the man would be willing to tolerate that yelling and squealing. Or maybe he’s deaf. Let’s go with that. The fat old man didn’t budge an inch as Kid Win approached, forcing the boy to squeeze by. He made his way up, ignored a gang of fit twenty-something Asian guys who were standing guard in the hallway on the second floor. On the third floor, he headed past people who were sleeping on blankets in the hallway, found apartment 306. The door opened a second after he knocked. A tired looking Hispanic woman greeted him, “You’re the superhero, I take it?” “Yes. Kid Win,” he extended his hand. She shook it firmly. “Ashley Medina. My son’s back through here.” There was a sense of pride in the narrow apartment, Kid Win saw. An undercurrent of aesthetic taste, matching knick-knacks and furniture. There were marks of a vacuum cleaner’s recent run over the carpet and both kitchen counters and dining room table were immaculately clean in a way that suggested she’d gone to some effort to clean up. In a building like this, though, there was only so much you could do. There was a water stain on the ceiling, dark brown marks on the carpet under a small rug, maybe from a previous occupant. “If you’ll wait here, I’ll get him.” Kid Win sat on the sofa. He noticed the cathode ray tube television was missing its screen, had been gutted. Quite likely for parts. The toaster was a goner, too. Only the wireless modem in the corner of the kitchen had survived, green lights blinking. He has priorities, at least, Kid Win thought, with mild amusement. Gotta have an internet connection. When Chariot arrived, Kid Win stood, offered a hand. There was a delay before the kid shook it. He was lanky, with big ears and close shorn hair that made him look slightly goofy, but he had a wary look in his eye. He wore a t-shirt and jeans that were stained with grease, had lots of little cuts and stains on his fingers, hands and forearms. Been there. Substandard tools, not enough parts. I can use that. “Please sit,” Chariot’s mother said. Kid Win obliged. Chariot was the last to take a seat. Was he reluctant, something else? “Chariot, is it?” Kid Win ventured. God, hope I don’t fuck this up. “Mm,” was the noncommital reply. “Just to give me an idea, on a scale of one to ten, how interested are you, in maybe joining the Wards?” “Ten’s high?” “Ten’s a lot of interest.” “Trevor!” Chariot’s mom admonished, “They offer funding, education-“ “We do,” Kid Win interrupted. If mom pushes, this guy’s only going to get less interested. Shit, a four is low. Maybe if I do the talking… “It’s good money, with room for better money. Especially for a tinker like you or me.” “How’s that?” “The guys in charge want tinkers. They really want tinkers, both because they want us in a position where we won’t be making trouble for them, and because and they want the kind of stuff we can create.” “I’m not giving up my stuff.” Kid Win paused. This is like looking into a mirror to a year and a half ago. “Look, I can see your TV, your toaster. Chances are you’ve gone to the Trainyard or a scrapyard to find some stuff. Old batteries, car parts, chains, good metal, whatever.” “He wanted to go to the Trainyard,” Chariot’s mother cut in, “I told him no, caught him trying to sneak out.” Chariot scowled a little, looked away. This would be easier without her here. “I get it. Been there. You’re hungry to use your power, but more than any other kind of cape, you’re facing a hurdle in terms of the entry-level resources you need. This is where the team would support you. You get funding, a lot of funding, to put your stuff together.” Kid Win reached into his belt, retrieved a compact disc. He placed it on the glass coffee table, then withdrew a set of small tools from the other side of his belt. He dismantled the object and began laying out the components one by one. Chariot reached for the nearest component, and Kid Win moved to block the boy’s hand. “Don’t touch, please. Look only. Trace oils and static charge could damage something.” The boy gave him an annoyed glance, bent over the table to look closer at the chips. “What’s this crystal?” Chariot asked. “3D computer chip. Uses light instead of electrical current. They’re made by this Protectorate tinker down in Texas. She gets funding to produce a set number every month, in addition to her regular pay. So long as you’re in the program, you can put in an order for her stuff, with the specs you want.” “And this metal threading, gold?” “Gold, for maximum conductibility.” “That’s a camera, this would be the power source, that part does something with wavelengths, and this reads energy… but I’m not getting it. What does this do?” Kid Win quickly slipped the pieces back together, turned the compact device over, then pulled out his smartphone. Touching the screen, he activated the compact device. It floated above the coffee table. He turned his smartphone around to show them the image it was streaming from the device’s camera. “So much effort, for a video camera?” Chariot’s mother commented, “My tax dollars are going towards this?” The dumbfounded look Chariot gave his mother put Kid Win in the awkward spot of having to suppress a smile. This is a point for me. If I asked him again, what would he say? Five, six? “You join the Wards, you get exactly what you need to reach your full potential as a Tinker.” A small lie there. Not like I’ve reached my full potential. “And anything you make, the PRT buys the rights from you. If you’re willing to give up that much, you can do well for yourself.” “You’re talking money?” That had piqued Chariot’s interest. He leaned forward, elbows on his knees. “I maybe shouldn’t, but I’m going to tell you what I’m getting out of it, because it’s almost definitely going to be the exact same for you. I get paid, but the money goes straight into a trust. I’ve made enough to pay for my college education, and every dollar I earn beyond that is going to be waiting for me as a cash award, if and when I graduate from a four-year postsecondary program. I’m getting four hundred dollars in allowance each month, just to mess around in my workshop, all my materials are paid for, and I currently have about two thousand dollars sitting in the bank, right now, from that. Once I turn eighteen? I make more. It automatically transitions to a job with good pay, working with the Protectorate, and the hours will be totally flexible around any classes I take.” “But he’s risking his life,” Chariot’s mother spoke. Chariot frowned. “He is. There are responsibilities. But honestly? There’s zero way he’s going to be able to go out and try out any of the stuff he’s made without running into trouble. People are going to pick fights, just because he has powers. If he tries to hang out in a workshop he establishes on his own, they’re going to find him, strong-arm him into putting something together for them. Not just villains, either. Heroes too. Being a tinker doesn’t just make you a target. It makes you a resource. It’s why pretty much every tinker out there is a member of a larger, more powerful team.” “Then Trevor could just not use his powers?” she spoke. “Sure,” Kid Win folded his arms, leaning back against the back of the couch. “What do you think, Chariot? You think you could keep from using that power of yours? Be normal?” Chariot frowned, looked down at his scratched-up hands, “No.” Kid Win nodded in agreement, “It’s a part of you, Chariot, a part of how you think, now. I’m telling you this is the best option. The safest. Having a team means you’re protected, free to do what you need to do.” Chariot’s expression indicated clear interest. Then he frowned, “I don’t want to give up my stuff to others. It’s mine.” Something struck Kid Win as off about the reply. What was it? It was out of tune with the flow of the conversation, didn’t quite match up with Kid Win’s own experiences being recruited. Maybe it sounded forced? But why would Chariot fake reluctance? He pushed forward, anyways, “I get that, really. But it’s only given away in name. You still get to use it, you just can’t give it away or sell it to others. The benefit is that you gain access to all the stuff and plans other PRT tinkers have made. I can’t show you any more of that than I have, but the fact is, you’d be able to look at my blueprints as easily as I could look up yours, get inspiration… “…Or you could look at the sort of stuff Dragon makes.” Chariot’s eyes lit up. “Tell me you’re not interested, now.” “I’m… kind of interested.” Again, that vibe. Pretending he’s not as interested as he is. “They can’t force you to join, but they do want you on the team. There’s no negotiating. You’d get the same I get, pretty much, so if you’re holding back or trying to fake like you don’t want to join when you do, you’re just wasting your time and mine.” “I’m not,” Chariot replied, defensive. “It’s only… this is a big deal.” “It is. So take my card. Call me if you have any questions, or if you want me to pass on word that you’re joining the team.” Kid Win fished in his belt and then handed his card to the boy. Black with white lettering and his starburst-gun emblem on the back. “Okay,” Chariot replied. “Talk it over with your mom. Get back to us.” “Thank you,” Chariot’s mother spoke, standing. Kid Win stood as well. He shook her hand again. “Not a problem,” Kid Win replied. He punched the boy lightly on the shoulder as he stood, “Join. It’d be good to talk shop with someone else that gets this stuff.” Chariot nodded. The mother led Kid Win to the door, and he headed out the building – the fat man from the stairwell was gone, and only the Hispanic boy by the front door was still in the hallway. Kid Win stepped outside. Something’s off with this scenario. He tapped his foot a second, then stepped around the building and into the alleyway. He retrieved his smartphone, and used it to send the hovering camera up to the third floor, checked in the windows where the apartment would be. The boy was leaving the bathroom, going into his room. Kid Win moved the camera to the next window over, the boy was sitting down at his computer, turning it on. Straight to the computer. Hm. Kid Win pocketed the hovering camera, then turned his attention to the smartphone. According to the phone, there were three wireless modems in the building. One was named with a string of violent swear words, the other was on its default settings. Both were unlocked. He chose the third, locked connection, clicked a button on the screen to have his phone decrypt the password. Fifteen seconds later, he could see someone online. Kid Win watched the white text scroll by with details on the connection’s activity. Google docs – pages of technical stuff, the boy was adding notes on gold wiring, shortform notes on antigravity, 3D crystals. The next page the boy visited, five minutes later, was an email account. Twenty seconds later, an email was sent. To: C1298475739@cryptmail.com Guy from wards came. I’m in. Kid Win stared at the screen for a long while. Cryptmail. That wouldn’t be an agreement with the PRT. “So someone got to you before we did,” he muttered to himself. He tapped the armor over his ear twice to open a communications channel, “Console?” “Weld here, manning the console.” “Do me a favor, call everyone back to the base for a quick meeting? And maybe call Piggot?” This entry was posted in 9.4 and tagged Ballistic, Chariot, Clockblocker, Flechette, Genesis, Glory Girl, Kid Win, Shadow Stalker, Sundancer, Trickster, Vista, Weld by wildbow. Bookmark the permalink. 74 thoughts on “Sentinel 9.4” Ummm, first post? I haven’t read the chapter yet, but I’d bet real money it’s good. They all are. 🙂 People are “first”ing my chapters? Woohoo, I’ve made it! AndrewL11 on June 11, 2017 at 01:12 said: I’m sorry, but I can’t not reply to this comment. This is the best reply I’ve seen to a “first”. It was hilarious. Thanks for making my day. xD AVR on April 14, 2012 at 00:40 said: Dennis really doesn’t appreciate how good Weld is. Like night and day compared to my own boss. Similarly, someone’s going to give Kid Win a confidence boost and win his loyalty someday. Hopefully it’ll be one of the good guys. Except Weld’s more of a manager than a boss. Piggot would be the actual boss. That sounds sorta finnicky. You are right as far as Dennis’ prejudice towards the new leader. Can be hard, perhaps, to adapt to new leadership, however good it may be, when your prior leader was a genuine friend. Guns on August 22, 2016 at 09:17 said: Weld is meant to be the team leader, not a boss or manager. He’s suppose to actually be a part of the team and on their level rather than being seen as a superior. Thats why Aegis was so good. He was an admired and respected friend rather than a boss. I mean, if this doesn’t relate to my life right now. Mike on August 22, 2016 at 23:51 said: Dude you just necro corrected the AUTHOR of the story. pizzahedron on February 11, 2017 at 23:07 said: sort of. they can both be right. weld is supposed to be a team leader, but he’s acting more like a manager. he came in wanting to make changes without existing as a team member first. necro that necro. Olivier on April 14, 2012 at 01:33 said: Well, his problems are a bit more complex than can be fixed with a good pep talk, but surely it could help. Isn’t there a tinker somewhere who’s a chemistry wiz and likes to create super meds or something? 😛 Probably. But they, like Panacea, might have reservations about affecting the brainmeats. Or, worse, they might have zero reservations at all. swagrabbit on November 25, 2013 at 19:22 said: well… yep Rasta-man, to da rescue, mon! Here, smoke dis, you’ll be awesome. This stuff will make you fly, help your glaucoma, clear up acne, get rid of halitosis, and walk your dog for you. Now, this here’s my sidekick, Mary Jane. She’s a little blunt, but she throws a mean right hook, makes their heads ring like “Bong!” Invulnerable too. Hit her too hard and you’ll be coughing instead. Is her real name perhaps Mary-Hannah? Super high? One bit of a typo- “what I’m getitng getting out of it” Thanks Pink, fixed. [i]”They really want tinkers, both because they want us in a position where we won’t be making trouble for them, and because and they want the kind of stuff we can create.”[/i] THere’s an extra ‘and ‘there…. “and because and they want “ frozen chicken on April 14, 2012 at 03:21 said: I’m just curious as to whether this is related to Skitter’s plan.. Nomen Nescio on April 15, 2012 at 10:09 said: probably not directly, but who knows — if Skitter’s still planning to do anything about Coil and his “pet”, you wouldn’t need many layers of indirection to tie most anything in with that. Chariot’s probably been suborned by Coil. getting an insider into the wards would be handy for him, and could be used to set up any number of dominoes; trying and failing to do so might not cost him very much, if he’s set up enough cut-outs and taken basic care. so it’s likely him this new kid’s emailing. interesting but very low probability alternate: Chariot’s been suborned by Skitter, who wants an observer in the wards to… idunno, warn her if they go after her so she can have her back watched? probably not the case, but it could be the case and might be fun if it was. Purely from the C part I’m going to guess Coil, but that’s really flimsy. It’s his style, but flimsy evidence. He’d love to be walking around with Dragontech. With the poison gargoyle thingy by Genesis, Win probably just didn’t realize how much flimsier something big has to be to fly into the air under its own power that way. It’s really nice to see Sophia get hurt. Also, while I’m not a big fan of Weld dragging up paperwork and talking about what they’ve done wrong, as I’ve been forced to sit through that talk, he has a point about communication. It’s not just a cliche about being married; communication is important. Important enough for troops pinned down by enemy fire to call in medivac while getting Command to use satellites to direct drones to blast the crap out of the enemy. It also helps to make sure that general resentment is aired before it turns into people walking away out of anger, clears up drama, aids in figuring out useful tactics, and allows for the rapid dissemination of Your Momma jokes. That last one’s very important, because obviously Your Momma gets around. One of the hindrances even if they do get talking is that everyone’s got to grow up and be able to handle criticism. Trust me, talking to a delusional irresponsible person isn’t any fun at all. That’ll probably become an issue with Sophia. Agree, communication problems lead to accidents, same work being done more than once, mistakes, bad inflamed egos, … I could quote a lot of examples, the last being an oven that shouldn´t be turned off but nobody wrotte “do not turn off” over it. Simple mistake, hours of work lost. Writing a note is soooo difficult … Pahan on April 14, 2012 at 11:20 said: Nice chapter. The Wards were outclassed the Travelers, who were holding back, but I sensed that Trickster did get a little desperate towards the end, between trying not to cause permanent harm and actually getting away. (His last teleportation of Vista was quite dangerous to Vista.) I think it’s the first time we’ve seen Ballistic use his power against a person directly: Glory Girl is tough enough to just fling away from the battlefield without causing permanent damage. Does Ballistic’s power affect living things, or did he just ling away her costume while she was wearing it? (In the latter case, I’d have thought that the costume would be gone but Glory Girl would stay, in all her… glory…) Fun fact: I googled “1298475739” to see if the number had any special meaning, and I got “about 75 results”, most of them unrelated to Worm. This is a nice illustration that even highly improbable coincidences do happen given enough opportunities. However, if you include the C, googling “C1298475739”, every single hit (all 4 of them) were for this story. What I don’t know is if that’s any more or less interesting than Pahan’s observation. 😛 Also, I interpreted Ballistic’s decision to his powers on GG as being based on her ability to fly — he shot her straight into the air, where impact with anything is highly unlikely, knowing she wouldn’t fall once the impetus from his power was finally overcome by gravity. He kicked her arse so high she kissed the moon! One of these days, Alice… one of these days! Breaker? Darn near killed ‘er! Abyssonym on May 24, 2017 at 19:07 said: 1298475739 resembles a unix timestamp which translates to Wed Feb 23 15:42:19 UTC 2011. The in-universe date is sometime in May 2011, I believe. Okay, so I wasn’t go to comment on this, but I can’t resist. Wildbow, I’m wondering how much you know about learning disabilities and Attention Deficit Disorder. Clearly you’ve done your research, but I think you’ve missed out on a couple of key things that don’t usually come across in the literature: 1. Unless Kid Win has had some specific coaching in interviewing and understanding social cues, it’s highly unlikely that he would pick up on multiple “off” reactions when talking to Chariot. Children with learning disabilities spend all of their school years playing catch-up with their peers, even if they are also gifted, and learning social interactions is almost always one of the soft skills that falls by the wayside. They are so busy trying to make up for their deficiencies learning what they are told to learn that they end up missing out on some of the learning that isn’t directly presented to them. In addition, people with ADD (both children and adults) are classically lacking in awareness of social cues in normal situations. However, this would be mitigated somewhat by the newness and inherent stimulation in this particular important situation, potentially revving Kid Win’s social awareness skill up to par. If this is the case, though, you may have misrespresented the level of stimulation and excitement that this situation created within him. 2. I think you’ve done a great job of explaining the effect of Kid Win’s discalculia on his everyday life. You’ve also captured a lot of the frustration, confusion and shaken confidence that most people with ADD feel in reaction to their accumulated failures and unfinished projects. (I especially liked how he got stuck when it came down to the boring testing stuff. That was spot-on.) However, I wonder if you know enough about the ADD brain to properly incorporate one of the side effects of Attention Deficit Disorder that ends up being a strong advantage when it is stimulated into the forefront of activity. Specifically, people with ADD have periods of what is know as “hyper-focusing” — and no, this is not a super power 🙂 — where the ADD individual perseverates on a particular task (programming a computer, playing video games, writing a story, fixing a car, etc.) for an extended period. I’ve heard stories (from psychologists) of people with ADD forgetting to bathe for a week or even EAT for more than a day as they hyperfocused on a particular task. Presumably, a Tinker with ADD would end up this situation, building super ice-cream-makers with more bells and whistles than a Rube Goldberg museum, on a frequent basis. Of course, the type of supervision that the Wards program provides would also help to interrupt that cycle, but I can totally see Kid Win forgetting to go out on patrol because he was busy working on a new hoverboard with a built-in washing machine. These are more observations of potential rather than criticisms. You already know how much I love this serial, and your execution thereof. And I love the idea of a Tinker with a learning disability. (I meet talented, intelligent people all the time who have some sort of LD, but have managed to find ways to work around it, and play to their strengths. Just don’t ask them to identify the triangles in a puzzle, or criticize them on their spelling, or expect them to tell you what time it is by glancing at a clock without a digital display.) You’ve been so thorough and non-cliché about your treatment of character traits so far, and I guess I just want to make sure this talent of yours shines as well in this area too. Thank you, Hg. Well said, and very informative. Tried to do my research beforehand, but a lot of the stuff you mentioned didn’t come up, nor has it really come up when I’ve heard my cousin (who has ADD or ADHD -can’t recall) or his aunt talking on the subject. I could excuse the errant details and say it’s a misdiagnosis of Hyperthyroidism, which has the same symptoms and might play an effect on his mood (as seen in this chapter), but he received medication & it helped. It bears thought one way or the other (perhaps his hoverboard and alternator cannon were crafted during these moments of hyperstimulation), and I’ll be sure to address it when I can figure out how to restructure the chapter. Most definitely before I release the story as an ebook. Wraith on October 20, 2012 at 11:34 said: On the other hand, I do have ADD myself, and if anything, I tend to be oversensitive to social cues, although that could also be attributed to social anxiety. For me, at least, the negative cues tend to stand out a lot more than the positive ones, so Kid Win picking up on the “off” feeling here seemed perfect. And since I realize this is my first time commenting on the story, I’ll point out that I’m really enjoying reading Worm. I had actually stumbled across back near the beginning of the year, but forgot to bookmark it before I lost the tab, and so I wound up not thinking about this for many months. I’m quite glad I found it again, though, as this is truly a very well-crafted story. Keep up the good work, Wildbow. Great Greedy Guts on June 17, 2013 at 20:11 said: Would like to toss in myself, on the ADD line of things. Classic ADHD symptoms include issues with social cues, yes, but there are as many exceptions as not. For one thing, as I understand it, there are more or less two sorts of ADHD. The more hyperactive one (which is the more commonly diagnosed) and the more inattentive one (which is less commonly seen, and largely (though not entirely) more prevalent in women). Inattentive-type seemed to me to be what Win has, he loses track of things and finds it hard to pick them back up, but he doesn’t really act out or seem to be bursting with energy. Inattentive-type people are usually not diagnosed because they don’t disrupt classrooms, they sit quietly and have issues following along. Not sure if social cues stuff is more prevalent on one side or the other, but I think different learning disabilities get hit there, and while it might increase odds of misreading something, it’s not like he wouldn’t pick up anything. Often people pick up on those things very quickly just to be able to better follow along, and put more weight on cues that aren’t there. Tag on May 13, 2018 at 13:55 said: So…binge-reading, and so this is my first comment thus far, and I kinda wanna offer you some encouragement, Wildbow. I wanna sorta piggy-back on Wraith by saying I think you did fine. (Also ‘Great Greedy Guts’) And awesome writing besides. I have pretty bad ADHD, as well as a masters in psychology (and was going for a PhD, but had to drop out…partly cuz of the ADHD). Your representation was perfect. It didn’t read as a cliche, nor did it read as unrealistic – it read as a real person with multiple struggles, one happening to be his ADHD diagnosis and associated symptoms. I could throw in more info about what ADHD is, but I don’t think you need that – your representation was perfect. (and come to think of it, I very much appreciate seeing ADHD-representation in fiction. represent!). (note: Hg is pointing out characteristics of a typical individual with ADHD, so good on him/her too, though I think the ‘hyperfocus’ phenomena is a bit more debatable then that; it’s just that each person is different, and ADHD is one of the more ‘varied’ disorders, partly because of the debate one what constitutes ADHD). I’m partly commenting here so that Wildbow (in the ‘future’, since I’m responding so late) gets some positive feedback. So…if you read this Wildbow, I also think you properly used ‘sociopath’ and ‘antisocial’. That was brought up before a few chapters ago, and (as I suspect Wildbow knows…the author seems well-researched) though parts of the behavioral health field ignore the terms sociopath and psychopath (and some conflate the two, or just use one), both terms are well-established as distinct from ‘antisocial,’ and each-other. And I haven’t seen any of these terms misused in the story so far. (for those curious about the terms, but don’t want to look it up: “antisocial” is a descriptor that refers to how a person works against society, basically, as in “antisocial personality disorder” or “antisocial behavior” – it’s usually referring to criminal behaviors. While sociopaths and psychopaths are highly likely to act “antisocial,” they are much less common…which is why they aren’t recognized in the DSM-5. Sociopathy/psychopathy are basically defined by a lack of empathy; whereas a psychopath theoretically has this trait innately [or from early childhood], sociopaths tend to be less extreme, as their lack of empathy is an adaptation due to their environment [e.g. particularly bad foster homes, or gang environments]. I can definitely see Lung as a psychopath, and both Bitch and Regent as likely sociopaths. Interestingly though, a typical psychopath is actually quite charming, though superficial; because they lack empathy altogether, they reflexively treat people as tools, and ‘act’ friendly/confident/caring/etc. in order to use them.) I can confirm the failing to eat for days side (my record was two and a half days without food or sleep while hacking on somehing: I barely remembered to go to the loo). Technically — and this is largely a matter of terminology, not biology — the social things aren’t ADD itself (you can have ADD without any social problems at all other than those caused directly by your being too hyperactive and flickery to interact easily with people) but due to its high degree of clustering with autism spectrum disorders. Most people with one have at least a shading of the other. Nuclear Paradox on January 23, 2013 at 16:55 said: “screaming far too loud as they continued a game” Shouldn’t that be “loudly”? Also I’m loving your writing massively. Heh I’ve even convienced a friend of mine to read it with. 😀 Pinkhair on March 20, 2013 at 02:39 said: ” furniture. There ” Extra space. “One was named with a string of violent swear words, the other was” ‘Another’ instead of ‘the’ other? Should “Right” be in italics, too? If mom pushes, this guy’s only going to get less interested. Shit, a four is low. Maybe if I do the talking… “get less interested” is in roman type as well. That said: I love this chapter. Kid Win kicks so much ass. Ballistic used his power on Glory Girl? He isn’t subject to the Manton Effect? Wow. He suddenly becomes more powerful by my reckoning. (And, less importantly, my vague ideas on how he could use his power to fly aren’t so impossible…) usermist2 on April 18, 2015 at 17:44 said: Ballistic’s power is instantaneous acceleration of objects along with improbable aiming skills. So, no, he didn’t do something like accelerate only her head (which it seems like he can do with inanimate objects). greatwyrmgold on April 25, 2015 at 19:08 said: He can still accelerate animate objects. And where are aiming skills stated/suggested to be a secondary power? Mike on November 23, 2015 at 17:02 said: Necro response but figured I’d say something in case other rereaders are confused. Ballistic didn’t accelerate Glory Girl, he accelerated her costume with her in it. Presumably the material is strong enough not to tear away from her body. That doesn’t seem right. Her costume is never hinted to be something so super-strong, and even if that was the case her final velocity would be greatly slowed due to her body weighing far more than any one piece of her costume. It seems like neither mass nor force factor into ballistic’s power at all. He can launch darts, filing cabinets, and cars at the same ridiculous velocity; if mass mattered at all we’d see a difference in at least one of those. Seems like it has a set speed, much like Rail in the PRT Quest. On that note, anything Rail accelerated was highly resistant to damage while moving; perhaps that’s why GG’s costume didn’t just fly off without her? greatwyrmgold on January 14, 2018 at 09:57 said: Let me explain the logic of what I think I said back then. Let’s say Ballistic is Manton-limited and just accelerating Glory Girl’s costume. When his power does its thing, said costume is moving at a high velocity; however, it is immediately slowed by something Ballistic’s power can’t affect, ie Glory Girl. Since Ballistic isn’t Flechette, the costume is rapidly decelerated by a much larger, formerly-stationary mass. Glory Girl ends up somewhat higher than before and perhaps has an uncomfortable wedgie, but she isn’t flung through the ceiling. In other words, while the mass of what Ballistic accelerates doesn’t affect its initial speed, that doesn’t mean it can’t slow down when it hits something else. liminal2016 on May 22, 2017 at 16:20 said: Wildbow has said on Reddit that he specifically targeted her costume, and it dragged her along. greatwyrmgold on May 23, 2017 at 06:15 said: Oh. Not sure the momentum transfer would play out, but that makes more sense. Oh, and quick typo notice: “According to the phone, there were three wireless modems in the building. One was named with a string of violent swear words, the other was on its default settings. Both were unlocked.” Either Kid Win is very innumerate indeed, or you meant “…there were two wireless modems…” Wait, dangit, never mind. Stupid stupid stupid, should have read the rest of the paragraph. Clint Olson on October 10, 2013 at 14:47 said: > A wind blew past them, and Kid Win blinked as a fat droplet if water spattered against his visor. “Droplet if water” doesn’t parse. Is it supposed to be “droplet of water”? Quick edit: “and because and they want the kind ” Too many ands. Loved the part several chapters ago where Rachel engraved her fallen dogs’ names in the monument. Most emotional part of the story so far. calebm on November 13, 2013 at 13:17 said: You should have used the word conductivity, not conductibility. And gold doesn’t have the highest conductivity, silver and copper are both better conductors. Gold is used in expensive electronics because it makes the best contacts. That wire should be silver. Sorry I had to point this out, but I figured you’d rather be correct on this. stevarious on November 18, 2013 at 23:04 said: “it was not unlike a power bar that was plugged into itself, with a small addition that made each revolution of the current larger than the one before.” And they use this shit to make popguns and prisons. Instead of…you know… ANYTHING else. No fucking wonder Taylor can’t figure out who the good guys are. Elevators. Or one elevator, at least. That’s the *one* civilian application of tinker technology we’ve seen, and it’s only in the Protectorate HQ. Yeah, you might how that in thirty years of tinker they might have built something for transport, industrial power generation, agriculture, etc… but they did at least build one elevator. That elevator stands as a unique civic tinker design, condemning them every time it’s mentioned. Guess for all the realistic features of the world Richard Reeds (and tinkers in general) is still useless. While tinkers have most obvious capability to improve the world others could make a big contribution too. Panacea would probably be more useful in pharmaceutical testing than if she healed people individually; she’d have a clearer idea than any scanner what effects a new drug was having, and by discovering a new drug and advancing medical science she’d help a lot more people than if she tried healing them one at a time. With energy generators like Sundancer supplying unlimited clean energy and sensors and thinkers like Panacea and Tattletale advancing medicine most of the world’s problems could be solved in a snap. kgy121 on October 8, 2015 at 18:45 said: I think the main points Kid Win brought up during his recruitment speech relate to this. Since those Tinkers who are grabbed by hero/villain teams are basically being forced to outfit them, they aren’t using their abilities to create non-combat devices. Since the Tinkers grabbed by the government have all of their rights to produce and distribute their equipment removed, they aren’t able to make any sort of difference to society, entirely according to the ‘normals in charge’ status quo’s plan. Since if you stop using your power to not draw attention to yourself, you can’t use your power to do anything, they can’t even do any non-combat Tinkering if they aren’t under anyone’s thumb. The tinkers have the greatest possible ability to improve society, but none of them are free to use them. ” … might even the only brilliant thing …” missing “be”. The Kid Win material about his self-doubts is brilliant; definitely NOT “the only brilliant thing” in Worm. Well executed! ” … retrieved a compact disc.” Add player, reduce confusion. Gary on August 12, 2016 at 13:35 said: I think it was supposed to be “compact device” but I’m not certain. Still needs to be fixed. I am pretty sure, also, that it was intended to be “compact device”, after reading the rest of the paragraph. –Dave, not a typo, but a wordo Tim McCormack on November 1, 2016 at 19:51 said: It is literally a disc that is compact, not a CD — specifically, it’s the hovering video camera. But I agree that it should be clarified. Other editorial notes: – «it was moments like this that this knowledge hit him particularly hard» — Missing “in” or “at” – «screaming at a ear-piercing volume» — Should be “an” I note that both the heroes and a good few of the villains go to extreme lengths to not actually do any lasting harm to each other, right down to ensuring that their oh-so-cool-looking weapons are actually incapable of doing more than mildly warming the skin! Presumably these are the sane ones who know that this heroes/villains thing is largely a charade set up to give everyone some training — formal for the heroes, informal for the villains, but still training — while they wait for the next apocalyptic attack from an Endbringer or some other high-powered group who doesn’t have such scruples. (I would suggest that Lung and Bakuda don’t share them, and it is clear that the Slaughterhouse Nine don’t care how much damage they do.) This is the first time I have ever seen anything in this genre explain plausibly how superpowered types can whale on each other for so long but always come back for another round. Durabo on January 15, 2015 at 18:14 said: I feel I need to point out the fact that the best conductor besides a super conductor is silver not gold. The reason gold is used on switches and plugs is because it doesn’t oxidize anywhere near as fast as any other metal and oxidized metal even silver is less conductive than gold. Sorry hadn’t read the other comments. Ignore this if you want 🙂 Dreamer on January 24, 2015 at 13:48 said: Kin Win’s “laser rifle” seems to have become a “laser pistol”, just before he shoots the wire holding Vista to the wall. If this isn’t a mistake, it could do with being explained better. Otherwise, fascinating story. Axle on February 21, 2015 at 01:02 said: Kid Win was my favorite ward since the moment I heard him riding on the hoverboard. This chapter only further reinforces him as my favorite. Disco on September 10, 2016 at 18:44 said: This situation with Chariot sort of parallels with Skitter’s original intention of joining The Undersiders. I wonder what Kid Win is going to do abut him. Slenderwoman on November 27, 2016 at 11:49 said: As anKLJ noted, while trying to recruit the new kid Kid Win pulled out a “compact disc” (CD) from his pocket and started… disassembling it? The next time it’s mentioned it’s called a “Compact Device” instead, but the typo’s a bit confusing. “I get that, really. But it’s only given away in name. You still get to use it, you just can’t give it away or sell it to others. The benefit is that you gain access to all the stuff and plans other PRT tinkers have made. I can’t show you any more of that than I have, but the fact is, you’d be able to look at my blueprints as easily as I could look up yours, get inspiration… missing end quotes? I looked up CryptMail, and found http://cryptmail.klitsche.org/ What is CryptMail? CryptMail is a simple crypter/ encrypter your email-adresse with Javascript. This means: Users need to have a Javascript enabled Browser to use CryptMail. Javascript is enabled. How does it prevent email address crawling? Usually crawlers parse the source of an html page without executing the included javascript code. Conclusion: if the email address is crypted crawlers won´t find your email address in your source. I continued reading quite a bit upon the mention of crawlers. Not the one I’m thinking about though XD nagel182 on January 30, 2017 at 06:37 said: Damn this arc is frustrating to read, after how the last arc ended…. i dont care about the wards or any heroes! i want TAYLOR! I know i can skip but still the wordbuilding in this arc is good, so i just keep reading. «he’d been forced to stop after two weeks when he began to get increasingly dizzy, anxious and nauseous.» that’s a common mistake: something that *causes* nausea is “nauseous”; the medicine in this case. It made him feel *nauseated*. Ibskib on August 11, 2017 at 17:59 said: I feel like there’s something missing, what form is she in here? Is Shadow Stalker suddenly a strong regenerator, or is the shadow form more vulnerable to projectiles than might be expected? Gotta agree with Clockblocker, Weld kinda *is* trying hard to be disliked… So much that for a moment I relished the idea of his name being a grim foreshadowing for some kind of Bradbury’s Veldt scenario. Flying chipmunk on August 6, 2018 at 12:11 said: “there was only one uncomfortable explanation for why the man would be willing to tolerate that yelling and squealing. I kind of missed the implication here. Would anyone mind explaining? I already said it, but I have to say it again: The Wards are really a shitshow. Imprisoning a boy just for using his stuff? Really? That brings me directly to the Villains. And then those conditions… He is even happy about 2k in his account. A good techican can make waayyyy more. The only pro is the free parts what is good at the beginning. What did Kid mean that the “Scenario” is off? Leave a Reply to Kaida Tong Cancel reply
cc/2020-05/en_middle_0016.json.gz/line4906
__label__cc
0.588679
0.411321
Ben Labat & the Happy Devil Ben Labat & the Happy Devil : The Revival 12" Ben Labat & the Happy Devil : Soapbox Anthems 12" Ben Labat & the Happy Devil : Homeward 12" Ben Labat & the Happy Devil : A Face For Radio 12" ABOUT: Ben Labat & the Happy Devil Louisiana-based Americana band Ben Labat and The Happy Devil released their fourth full-length album, “Homeward,” on August 18, 2017. Marking the collective’s first new music since 2014’s The Revival, Homeward represents a distinct and conscious embrace of Labat’s folk and Americana roots. These 10 tracks exemplify his vivid lyricism and impressive songcraft, delicately weaving together harmonica, ukulele, piano, and acoustic guitar to create a rustic sonic palette. Over this entrancing backdrop, he carries undeniable hooks and lyrical musings that are as ponderous as they are powerful. The band also includes Jerry Martin (guitar, vocals), Dave Guidry (bass) and Travis Lovell (drums) with additional help in the studio from Travis Thibodeaux (touring member of Journey) on keys and vocals from Ansley Rimmer (Hydrogen Child). The group has performed in legendary venues everywhere from New York and Los Angeles to Nashville, Austin and New Orleans. Moreover, Labat’s songs have sound-tracked key moments in The Ghost Whisperer, The Real World, Jersey Shore, the films Mini’s First Time, and Middle of Nowhere starring Susan Sarandon. Homeward sees Ben return to the sounds that always inspired him and kicks off his brightest musical chapter yet.
cc/2020-05/en_middle_0016.json.gz/line4909
__label__wiki
0.677345
0.677345
How to Create & Print a Booklet How to Disable Photo Printing Wizard How to Print & Bind Your Own Cookbook How to Design the Front and Back Covers of Your Book How to Make a Pop Can Drive Flyer Renee Vians Updated February 21, 2017 A pop can drive is a type of fundraiser. Community organizations collect aluminum beverage cans then turn them into a recycling facility to raise money. Creating a flyer is an effective way to promote the event. You do not have to be a graphic designer to make one. You can make a pop can drive flyer with desktop publishing software, such as Microsoft Publisher or Adobe Illustrator. Organize all the facts related to the pop can drive like contact information of the sponsoring organization, the date, time and location. Create a new document on your desktop publishing software and type this information into a text box. Acquire a fitting image for the flyer. In this case, an aluminum beverage works well for a pop can drive. Place the image at the top of the flyer for more visibility. Craft a hook. Create an eye-catching hook, or headline, that invites people to read more about the pop can drive. For instance, a community service organization might use a hook like "Give Your Cans to Helping Hands." Include a call to action at the bottom of the flyer. Incorporate persuasive words that tell people who read the flyer what you want them to do. The call to action can be as simple as "Drop Pop Cans Today." Choose a font that is legible at a distance. You may need to experiment with different fonts before finding one that works. Also, select one or two fonts for a flyer. Using too many fonts can cause visual clutter. Try one font for the headline and another for the body copy. Proof the pop can drive flyer before printing. If you are going to make multiple copies of the flyer, you want to avoid costly mistakes. Sometimes it's easier to spot mistakes on paper than on the computer screen. Print a single copy in draft mode. Ensure the layout and the information are free of spelling and punctuation errors. Print the flyer and take it to a copy shop to make the number of copies needed. Choose a font from the Serif group. Serifs have hooks at the end of the letters that make them easier to read. Serifs that are effective for display include Garamond, Georgia and Times New Roman. Black ink, as opposed to color, is more legible for a flyer. Use colored paper with black ink if you would like to add visual interest. Avoid large images that distract from the body copy or the message you are trying to communicate. Vians, Renee. "How to Make a Pop Can Drive Flyer." , https://penandthepad.com/how-4843089-pop-can-drive-flyer.html. 07 August 2017. Vians, Renee. (2017, August 07). How to Make a Pop Can Drive Flyer. . Retrieved from https://penandthepad.com/how-4843089-pop-can-drive-flyer.html Vians, Renee. "How to Make a Pop Can Drive Flyer" last modified August 07, 2017. https://penandthepad.com/how-4843089-pop-can-drive-flyer.html Paper Image Flyer Design at Microsoft Design Tips at Flyerboy Flyer Tips at USA Fundraising Renee Vians has been writing online since 2008. She earned a Bachelor of Arts in English and journalism and language arts certification from the University of Nebraska-Kearney. Her articles have appeared on various websites. Pens That Write on Metal How to Create an Ebook for Free How to Do a Storyboard for Children's Books How to Make a Good PPT Presentation How to Make Movie Intros With Premiere Pro How Do I Title an Appendix Chart in APA Style? How to Download Ebooks How to Create a Fake Book Cover for Free
cc/2020-05/en_middle_0016.json.gz/line4910
__label__cc
0.696693
0.303307
Paperback / softback Trade paperback (US) - $22.00 CAD A comical and revealing account of what it's like to run for office with no political experience, little money and only a faint hope of winning, told first-hand by celebrated writer Noah Richler. During the 2015 federal election, approximately 1200 political campaigns were held across Canada. One of those campaigns belonged to author, journalist and political neophyte Noah Richler. Recruited by the NDP to run in the bellwether riding of Toronto-St Paul's, he was handed $350 and told he would lose. But as veteran NDP activists and social-media-savvy newbies joined his campaign, Richler found himself increasingly insulated from the stark reality that his campaign was flailing, imagining instead that he was headed to Parliament Hill. In The Candidate, Richler recounts his time on the trail in sizzling detail and hilarious frankness, from door knocking in Little Jamaica to being internet-shamed by experienced opponents. The Candidate lays bare what goes on behind the slogans, canvassing and talking points, told from the perspective of a political outsider. With his signature wit and probing eye, Noah Richler's chronicle of running for office is insightful, brutally honest and devastatingly funny.
cc/2020-05/en_middle_0016.json.gz/line4911
__label__wiki
0.547581
0.547581
That California Rumble Is No Quake; It's Only the Alegre Family, All Tanked Up and Out for a Drive Dick Alegre’s license plate frame proclaims, “My other car is a Sherman tank.” This is no joke. Welcome to friendly Santa Paula, Calif., home to the Alegre family and their 70,000-pound, genuine WWII-surplus adoptee. The “Bastogne Bastard,” for such is its name, is a functioning Sherman tank—complete with an eight-cylinder, 450-horsepower engine, twin 158-shoe tire tracks and an inoperable 75-millimeter gun—which Alegre, 57, purchased for his son, Richie, 6. Alegre anted up more than $40,000 to live down his reputation as merely a big talker. A real estate investor, avocado farmer, retired tractor dealer and former WWII pilot, Alegre overheard Richie bragging to a friend that his dad was going to get him a much larger version of the remote-controlled tank he already owned. The friend was skeptical of such talk, pointing to the unfinished treehouse also promised to Richie. Well, quicker than you can hum a chorus of Over There, the 35-ton veteran of the Battle of the Bulge was peacefully parked in the Alegre driveway, and Richie was the envy of every paramilitarist tyke in the neighborhood. “I think this is the ultimate in toys,” boasts Alegre the elder, who has gone gonzo himself over the tank. He now answers the phone by saying “Patton here” and wears a T-shirt emblazoned with the message “Impervious to all but a Direct Hit.” Richie is equally enthralled with the winsome war machine, claiming that “Bastogne Bastard” is his favorite toy and will be for “more than a long time, maybe infinity.” Alegre didn’t want his daughter, Debbie, 10, to feel ignored, so he spent another $5,500 for Debbie’s choice of mobile military memorabilia: a 2½-ton amphibious truck, known as a DUKW, that is licensed for highway driving. Showing a keen grasp of human psychology, Alegre’s wife, Kitty, feels there is little danger that the children will be spoiled by excessive military spending. Says Kitty with a laugh: “The bottom line is how much their father wants the same toy.”
cc/2020-05/en_middle_0016.json.gz/line4914
__label__cc
0.633237
0.366763
Posts Tagged ‘pruning’ A BBC Preservation Order TAKE NOTICE This noble institution should be preserved. It is not perfect but it is better than any alternative. It contributes enormously to the culture of the nation. It is our BBC This notice should be nailed to the door of Broadcasting House and all BBC premises. Damaging or cutting off parts or branches of the institution is not allowed. Adequate space must be given to the institution’s roots which must not be interfered with. Severe penalties will be applied to anyone who knowingly or recklessly damages the institution in any way. Then David Cameron, Nick Clegg and a heavyweight team need to take Mark Thompson aside and give him a good talking to. We want to preserve the BBC and its unique qualities but we need a hard pruning of dead wood and unproductive growth. Preserving the roots and fundamental strength are the most important objectives. Cutbacks in the right places will stimulate stronger new growth elsewhere. I agree that Sky should contribute towards those commercial channels that it broadcasts free-to-air. It ties viewers into its subscription packages because they are comprehensive. This is gives it an unfair advantage throughout the market, as does its coverage and bandwidth. Sky is a parasite on traditional TV companies. Its unfair advantages have enabled it to develop the best user interface and experience in the market. Even so, it is expensive and has a reputation for appalling customer service. Its relationship with Newscorp means it is part of a monstrous media empire which requires much more regulation in the interests of consumers and the community at large. It should be required to invest more in original programming and production. If necessary, a new media tax should be introduced to enforce appropriate investment and safeguards. The BBC’s biggest mistake is the level of executive pay. There is no justification at all for anyone in the BBC to earn more than the Prime Minister. It is public money. Anyone unhappy with this should resign today. No one is indispensable. The BBC has always been the best in its business at bringing on new talent. The Licence Fee should remain unchanged. It is fantastic value for money and shows just how expensive Sky is. The BBC Trust should be strengthened in its primary role as regulator and it should enforce cost savings, efficiencies and executive pay. It should also ensure that the BBC becomes more responsive and closer to its audience. Its complaints and feedback system is fundamental to this. It needs to be brought back in house and given real priority. See here. Britain adores its BBC. Let’s ensure we preserve it and allow it to flourish. Posted in Business, Consumerism, Politics, television, The Media Tagged with adore, appalling, audience, bandwidth, BBC, BBC Trust, branch, broadcast, Broadcasting House, channels, community, complaints, comprehensive, consumer, cost saving, coverage, culture, customer service, cutback, cutting off, damaging, David Cameron, dead wood, efficiency, enforce, executive pay, expensive, feedback, flourish, free-to-air, fundamental, growth, in house, indispensable, institution, interfered, invest, investment, Licence Fee, Mark Thompson, media, media empire, monstrous, nation, Newscorp, Nick Clegg, noble, not allowed, original programming, parasite, penalties, preserved, prime minister, priority, production, pruning, public money, qualities, regulation, regulator, reputation, responsive, roots, safeguard, severe, sky, stimulate, strength, strengthened, stronger, subscription, talent, tax, TV, unchanged, unfair advantage, unproductive, user experience, user interface, value for money, viewer
cc/2020-05/en_middle_0016.json.gz/line4916
__label__wiki
0.620859
0.620859
To opt out of the DART cookies you may visit the Google ad and content network privacy policy at the following url http://www.google.com/privacy_ads.html Tracking of users through the DART cookie mechanisms are subject to Google’s own privacy policies. Other Third Party ad servers or ad networks may also use cookies to track users activities on this website to measure advertisement effectiveness and other reasons that will be provided in their own privacy policies, How to straighten my penis – has no access or control over these cookies that may be used by third party advertisers. When visiting How to straighten my penis – , the IP address used to access the site will be logged along with the dates and times of access. This information is purely used to analyze trends, administer the site, track users movement and gather broad demographic information for internal use. Most importantly, any recorded IP addresses are not linked to personally identifiable information. If you have any questions regarding the privacy policy of How to straighten my penis – then you may contact us at How to straighten my penis – @gmail.com Last updated Sun, 13 Mar 2011 01:07
cc/2020-05/en_middle_0016.json.gz/line4918
__label__wiki
0.887463
0.887463
Jeff WeissContributor Jeff Weiss has written for Pitchfork since 2011 and is the co-author of Biggie & 2Pac: Rap's Greatest Battle. He is the editor of Passion of the Weiss, a columnist at LA Weekly, and the co-host of the Earwolf hip-hop podcast, Shots Fired. Supreme Clientele The New Power Generation Best New Album November 18 2014 Acid Rap Best New Album May 7 2013 Best New Reissue January 23 2013 Cobra Juicy Cancer for Cure Best New Album May 21 2012 Kenny Dennis EP Subject: Matter Kamasi Washington on the Music That Made Him a Jazz Colossus The 36-year-old saxophonist talks about the albums that have meant the most to him, five years at a time. by: Jeff Weiss Jonathan Lethem on the Music of His Life The author talks about the songs that have defined him, five years at a time. Run the Jewels’ Universal Theory of Not Giving a Fuck El-P and Killer Mike talk about the pursuit of hope, liberty, and rap glory in the Trump era. The Year in Rap 2015 Jeff Weiss details Drake’s two high-profile rap wars this year—the hot one with Meek Mill and the cold one with Kendrick Lamar—and how his flouting of traditional hip-hop ethics runs parallel to our accelerating world of nihilist-flavored capitalism. Angelic Wars: Revisiting Goodie Mob’s Soul Food Coming out of the same collective that birthed OutKast, Goodie Mob played an essential part in the rise of Southern rap. Jeff Weiss pays tribute to their 1995 debut, which overflows with the darkness and joy of a culture blossoming in spite of oppression. Searching for Tomorrow: The Story of Madlib and DOOM's Madvillainy Ten years after the release of Madlib and DOOM's mind meld of an album, Jeff Weiss traces the history of Madvillain and details how these two mystifying artists came together for a rap classic. Gangsta Sermon: Warren G's Regulate... G Funk Era Jeff Weiss tells the story of rapper and producer Warren G, from his fated break at a bachelor party hosted by Dr. Dre to his classic debut album, which soundtracked the summer 20 years ago. Blind Date: Odd Squad's Fadanuf Fa Erybody In 1989, a B-boy stoner met a blind wunderkind at a talent show. Five years later, Devin the Dude, Rob Quest, and Jugg Mugg released a rap classic. Jeff Weiss recounts the Houston trio's unlikely story. Last Words: Eazy-E's It's on (Dr. Dre) 187um Killa Jeff Weiss re-evaluates the gangsta-rap originator's vicious final proper album as part of his Rolling on Dubs column, which looks back on some of hip-hop's greatest LPs upon their 20th anniversary. The Big Chill: Souls of Mischief's 93 'til Infinity With his new column, Jeff Weiss revisits one classic hip-hop album each month and retraces the past through a contemporary vantage point. This first edition covers Souls of Mischief's indelible debut. My Year in Music: Jeff Weiss
cc/2020-05/en_middle_0016.json.gz/line4926
__label__cc
0.528602
0.471398
Giffords had history with Palin, Tea Party (CNN) - As of Saturday, Arizona Democratic Rep. Gabrielle Giffords' name appeared on a website titled "take back the 20" as part of a list originally issued by Sarah Palin of vulnerable House Democrats. A map on the site showed crosshairs over the contested Democratic districts. Palin first posted the list in March 2010, naming 20 House members who voted for health care reform and represented districts that Republican Sen. John McCain of Arizona won in the 2008 presidential election. The post read, "We'll aim for these races and many others. This is just the first salvo in a fight to elect people across the nation who will bring common sense to Washington," and was accompanied by a map with targets over the districts. At the time, Giffords responded to the map by saying on MSNBC that her long-serving colleagues had "never seen anything like it." "The thing is, the way that she has it depicted has the crosshairs of a gun sight over our district," Giffords said in March. "When people do that, they've got to realize there's consequences to that action." After Giffords was shot in Tuscon, Arizona, Saturday, Palin responded on her Facebook page: "My sincere condolences are offered to the family of Rep. Gabrielle Giffords and the other victims of today's tragic shootings in Arizona. On behalf of Todd and my family, we all pray for the victims and their families, and for peace and justice." At a press conference Saturday, Pima County Sheriff Clarence Dupnik criticized people who are making a living off "inflaming the American public." "When you look at unbalanced people, how they respond to the vitriol that comes out of certain mouths about tearing down the government, the anger, the hatred, the bigotry that goes on in this country is getting to be outrageous," Dupnik said. "Unfortunately, Arizona has become sort of the capital. We have become the Mecca for prejudice and bigotry." And Saturday's tragedy was not the first time the Arizona Democrat was targeted. The day after she voted in favor of health care reform, a glass panel at her Tucson office was shattered. Giffords won a close race against Republican Jesse Kelly in November. Kelly was a Tea Party favorite who ultimately received 47 percent of the vote to Giffords' 49 percent. The Republican-leaning 8th district went for George W. Bush in 2000 and 2004. Tea Party Express Chairwoman Amy Kremer responded to the events Saturday by saying the group is "shocked and saddened" by the "terrible tragedy." "These heinous crimes have no place in America, and they are especially grievous when committed against our elected officials. Spirited debate is desirable in our country, but it only should be the clash of ideas," Kremer said in a statement. "An attack on anyone for political purposes, if that was a factor in this shooting, is an attack on the democratic process. We join with everyone in vociferously condemning it." Filed under: Arizona • Gabrielle Giffords • Sarah Palin Sarah Palin, a perfect example of things that should have never come to the main-land. January 9, 2011 01:26 am at 1:26 am | Congratulations Sarah Palin, you got what you were looking for. Your hands have blood in it! Palin is an accessory to murder. Not holding her and those of her mindset accountable is simply negligent. I am waiting to read the conservative post about crime in the black community What a suprise that CNN would fan the flames further by posting this story Brian A We as a nation should be coming together at a time like this, regardless of whether you are a Republican, Democrat, Independent, or just don't care. We should use this tragedy as a reason to all come together as one. After listening to the reckless accusations on the left, it is now evident that we are more divided today than we were yesterday, and that is the shame. Jane Marek Many saw this coming. The fearful use the hatred in their political speech since they are afraid to tell the truth that they are run by the rich. This is just the sad reality that we have abused our freedoms and are now going to loose them because of it. The pen is mightier than the sword, but some political parties can only preach fear and hatred. Sick! stejo I would love to hear Palin apologize for such a violent image on the website, but I seriously doubt that will happen. TJINLV “If foreign terrorists had a map and a list...the CIA would be on top of whoever created the list. The FBI cannot ignore the map, it's contents or the sponsor of such a devastatin­g, cruel and vicious act. Mrs. Palin should be picked up by police, handcuffed and marched in for "questioni­ng" at the minimum. To ignore the obvious is also a crime.” Give me a break. Are you really trying to blame the Tea Party and Sarah Palin for her unfortunate death? Do you really hate Palin and the Tea Party so much that you will use the horrible murder of Giffords to score political points. Disgusting. Squich Sarah Palin and the rest of the GOP Republican trash who have been stirring up hatred in our nation because they are too ignorant to debate on substance and don’t care about consequences of their works should be charged for in sighting violence. Bachman and Boehner should be in jail with her before the sun comes up. There needs to be a full investigation of the funding of the tweet, face book and other accounts being used to spread hate and insight violence. SHAME ON THESE REPUBLICAN TRASH and their slow ignorant and hateful leaders Limbaugh Boehner, McConnell and Beck who fan the flames trying to build a movement. These are sick people who have NO values. There is no doubt that the constant over the top, violent rethoric coming out of Palin, Limbaugh and Beck, and by right-leaning commenters in these blogs and news sites on a daily basis is largely responsible for this tragedy. It only takes one deranged individual to take this pervasive vitriol to the next level. CanadaKid So polarizing...Left vs. Right...Religion vs. Religion vs. Non-Religious...Fox vs. MSNBC...this pundit vs. that pundit...North vs. South...black vs. white...Sarah Palin vs. common decency...America is viciously gnawing itself to death...its the death of the American spirit..and its disgusting... Not that any of this is false, but what is the relevance of this to a shooting? If the shooter is a Tea Partier, OK, you might have a point. Given that we know next to nothing (and what I've heard indicates he's a deranged lunatic of leftist persuasion) it seems like CNN is hoping readers draw conclusions facts currently don't warrant by mentioning the Tea Party in the same breath as the shooting. Shame on you for taking advantage of a tragedy like this. Ed Mullins This story is beyond the pale. If you want to politicize the motives of the shooter, let's be factual. His classmate from high school and college described him as a "left-wing pothead." Furthemore, his favorite books include Communist Manifesto and Mein Kemf. Add to this is his support for flag-burning. This guy was a radical, deranged liberal. He was not a conservative, nor a member of the tea party. So while I am no fan of Sarah Palin, she had nothing to do with this. You should be ashamed. Maybe NOW that idiot from Wasilla will finally consider how her endless litany of IGNORANCE and HATE are endangering this country, and SHUT UP! Palin reaps what she has sown. Kevin O'Neill We don't know whether, or how, this was politically motivated, but if it was it should be no surprise. According to the right wing, Fox News, Limbaugh crowd, to be a Democrat, or (gasp) a liberal is akin to being unAmerican. Sarah Palin had this Congresswoman in her "sights" during the last campaign. The hatred and vitriol on the right to anyone else is incredibly destructive, and is tearing the country apart. Monem Shafik I feel sad & disappointed:Our Country is the world leader of freedom and democracy and I hope that such a lunacy that lead to the tragedy of killing five people and injuring many others in Arizona, will not be a reason for counter attack...We are not in a jungle...We need to adhere to self control and put America above all our political differences...Violence is not the solution and will never be. The whole bit about the cross hairs is total stupidity. This just makes anyone that comments on it in media or gov't look like an idiot. Sadly, one idiot shown in the video was the congresswoman that was shot today. Apparently she already had brain damage. When the sheriff said there may be reason to believe this individual may have mental issues, he showed he has mental issues, stupidity. Duh, of course the shooter has mental issues. Any idiot can tell you that. Jay in NC Are you all forgetting that one of the people killed, Roll, was Republican appointed? I think CNN is trying to spin this as an attack on Democrats. Look at all the hate and 'death to Bush' posters and where was the concern then. There is hate out there, it is from the left, but do not expect the media to ever consider that. Palin won't get it, she will never understand why placing crosshairs over Giffords could possibly be negative. She isn't smart enough to understand that words have power only when they influence others to action. For years now Palin has been using the language of war and killing and violence and those words sink in. They bring people to acton. And the result is this. Now Palin's supporters will plead ignorance too. Briston Palin will have a warm and heartfelt welcome in Arizona. That's for sure! Sarah Palin incited violence in a well documented way. Her conviction as coconspirator should come easily! This article is political exploitation at it's highest. The author of this article is just a much a monster for trying to somehow use this horrible tragedy for political gain...before the people killed can even be buried. The shooter was obviously extremely mentally unstable and didn't have any links to any political parties. Exploitation articles like this make me sick to my stomach.
cc/2020-05/en_middle_0016.json.gz/line4929
__label__wiki
0.542517
0.542517
[email protected] 01334 463000 Contact Us Grass Pitches Gym and Performance Suites The Home of Golf Getting to St Andrews Introduction to the University Easter Rugby Camp Summer Rugby Camp Summer Hockey Camps “The Regional Performance Squads National Camp weekend has been held at another location for 11 years and 2018 was the first time it has ever been moved and we could not have wanted a better location than St Andrews University. Working on a talent development project with 120 14-16yr olds requires many elements including performance, education, social, lifestyle and safety. The facilities provided across the David Russell Apartments, Meeting rooms, Football pitches and Saints Sport Centre were first class. We were initially concerned that the campus was larger than our normal venue however the smooth transition from halls to pitches to classrooms for both players, staff and parents was facilitated and supported very well by the St Andrews University staff. I would encourage any party, large or small, looking for a high level of facility provision and service to use St Andrews as a venue.” Donald Gillies, Head of Girls & Women's Football London Scottish FC “We were guests of University of St Andrews for our pre-season performance camp. The experience was first class. The accommodation and food was excellent. The training facilities were outstanding. The pitches were immaculately prepared. The gym and other indoor facilities were extremely well kitted out. The location of the accommodation, pitches and performance centre were all well placed next to each other and walking distance from the magical St Andrews town centre and beaches. What was most striking was the staff of University of St Andrews who in all departments seemed so connected to a common cause of delivering a great customer experience for us. They all went the extra mile to help and always with a smile on their faces.” Dave Morris, Director of Rugby “Aberdeen FC have attended the St Andrews Tournament for a number of years, competing at all three age groups. The facilities at the University are first class and some of the best pitches that the young players will play on all season. The organisation has proven to be very professional and once again we will include the competition in our Academy tournament programme for 2019.” Gavin Levey, Head of Academy Coaching Fettes College The rugby boys are looking in good shape after the end of day 1 in St Andrews for pre-season. Thanks to St Andrews sport department for the use of your wonderful facilities! pic.twitter.com/1AmcuVFvGY — Fettes Sport (@Fettes_Sport) August 23, 2018 Scotland Rugby Thanks @OldCourseHotel @SaintsSport for looking after us this week. World class facilities in one of the best places in the world #standrews pic.twitter.com/SlbeYHURx5 — Gregor Townsend (@gregortownsend) June 1, 2017 Gregor Townsend, Head Coach Blackpool Football Club “The facilities here at St Andrews, this is the second time we’ve come here, are outstanding. The pitches and the gymnasium that we get to use are fantastic.” Gary Bowyer, Manager, Blackpool Football Club Heart of Midlothian Football Club “The pitches were of a high standard. The playing surfaces and warm-up areas were well prepared and attended by ground staff. We had requirements for ‘lining’ and staff went above and beyond to ensure everything matched our specifications.” Craig Levein, Director of Football, Heart of Midlothian Football Club “Beautiful pitches in a perfect condition. Congratulations and thanks!” Txiki Begiristain, Director of Football, Manchester City Football Club Fulham Football Club “Thank you for extending the use of your facilities to the Fulham first team this summer. You have certainly helped us give them the best possible preparation ahead of the 2014/15 Football League Championship Season.” Darren Preston, Chief Operating Officer, Fulham Football Club “Thank you for your assistance last week at your sports complex. I must thank you for the professionalism and kindness shown to our Football Club; it went absolutely perfect for us and gave us some thinking of when we will come back again. The attraction is very obvious, good facilities, no intrusion into our training and a staff who cared for all our needs, so thank you for that.” Sir Alex Ferguson CBE Gloucester Rugby Club “The facilities and staff at the University of St Andrews were excellent during our week-long training camp. The quality of the pitches was outstanding which contributed to a great week of training in what is a very important pre-season period. All in all a great week’s training and valuable experience which will hopefully give us a springboard into what is a very challenging and intense premiership season.” Mark Bitcon, Head of Sports Science, Gloucester Rugby Club “The facilities here are incredible as are the training facilities.” Thierry Henry, FC Barcelona, 2008 “The attraction is very obvious, good facilities, no intrusion into our training and a staff who cared for all our needs, so thank you for that” Sir Alex Ferguson CBE, Manchester United FC, 2012 “The facilities here at St Andrews, this is the second time we've come here, are outstanding. The pitches and the gymnasium that we get to use are fantastic.” Gary Bowyer, Manager, Blackpool Football Club, 2017 “The pitches were of a high standard. The playing surfaces and warm-up areas were well prepared...staff went above and beyond to ensure everything matched our specifications.” Craig Levein, Director of Football, Heart of Midlothian Football Club, 2016 “Thanks for looking after us this week. World class facilities in one of the best places in the world.” Gregor Townsend, Head Coach, Scotland Rugby, 2017 “The facilities and staff a were excellent during our week-long training camp” Mark Bitcon, Gloucester Rugby Club, 2009 “Beautiful pitches in a perfect condition. Congratulations and thanks.” Txiki Begiristain, Manchester City Football Club, 2014 University Sports Centre, St Leonards Road, St Andrews, Fife KY16 9DY
cc/2020-05/en_middle_0016.json.gz/line4937
__label__cc
0.623024
0.376976
Hard News: Pills, not so many thrills Craig Ranapia, 10:28 Aug 23, 2007 But it's interesting to see Labour now acting like an Opposition party and employing the same slow-drip attempt to erode its opponents' credibility as has worked so well for National. Emphasis on the 'attempt' part, and I think there has to be a meaningful distinction drawn between (legitimate) political and policy differences, and the personally destructive crap that runs from the petty to the outright sinister. I really think Labour is falling into the same trap as the rabid right-wingnuts who think screeching to the converted doesn't give everyone else the shits. OK, I know there are going to be people who do now, and always will, think John Key is an evil Rogernome who will sell New Zealand as a job lot to Darth Rove by morning tea time given half the chance. Just as there are now, and always will be, those who think Helen Clark is a malevolent bitch squatting at the apex of a vast man-hating, anti-family Communist-Lesbian Cabal. What-fraking-ever. Michael Savidge, 10:39 Aug 23, 2007 Russel, Do you have any scoop on what form the post-BZP products will take? Is there any real reason to hope they will exceed the performance of the soon-to-be-banned pills and still manage to hurt less the next day? Somewhere near Wellington… • Since Nov 2006 • 324 posts Report Reply FletcherB, 10:51 Aug 23, 2007 I have no inside info, and in fact no actual interest.... but logic suggests whatever replaces BZP has to be not as good.... if something better was available, it would have already been put on the market. "A legal high thats better than BZP" would be quite the selling point wouldnt it? What-ever replaces BZP is bound to be not quite as good.... whether thats less effective (as in desired effects) or worse undesired effects, I dont know.... but if something better was available it would already be the best selling.... Its for this exact reason there wont be much of a black-market for BZP.... because legal was its only selling point.... once you are prepared to buy off the black market, better products are available. West Auckland • Since Nov 2006 • 887 posts Report Reply Graeme Edgeler, 11:01 Aug 23, 2007 It's petty in an entirely different way to the David Parker thing - who was alleged (and completely vindicated) to have misled the Companies Office over the appointment of an auditor - which is an important safeguard for minority shareholders. I doubt very much that there is even the hint of Key having done anything wrong - residency rules under the Companies Act differ substantially from those under the Electoral Act. I think this is important, people should not mislead the registrar of electors and they should not mislead the Companies Office - and if Key has actually broken the law I want to know, and I'm open to charges. The reason this is petty, is because Labour is almost certainly wrong, and are just trying to get a bit of stink around Key. And in relation to the Electoral Act they are both too late to bring any charges, and wrong that it would see him lose his seat. Neil Morrison, 11:08 Aug 23, 2007 The most succinct condemnation of Chavez is a simple comparison with him to President Lula of Brazil - a centre left politician who really is doing something for the less well off, without the benefit of all that oil money. Conor Foley often has very good pieces on Brazil in The Guardian. BenWilson, 11:22 Aug 23, 2007 What-ever replaces BZP is bound to be not quite as good I shudder to think how bad that would be. NoDoz perhaps? Hopefully Anderton doesn't make drinking coffee illegal before his sorry arse leaves politics forever. As for Pilger, I think he's coming at it from the "Chavez isn't so bad because others are much worse" angle. His move to get rid of term limits would put Venezuelan leadership on a similar standard to NZ's so it's not time to shout "fascist" just yet. Extra judicial killings are a shocking travesty, although I'm inclined to wonder if that's just the Venezuelan police force doing it's thang the way it always did. Restricting freedom of speech is seldom good - but perhaps the Electoral Financing Bill deserves a closer look if you're really a stickler for that. All those equivocations aside, Venezuela sounds like a shit place. That I'd probably rather go there than Columbia doesn't say much. InternationalObserver, 11:33 Aug 23, 2007 I would suggest to this Govt that more people have been harmed by our 'Wild West' financial markets/rules than BZP party pills. And yet the Government's new regulations to protect New Zealanders (and it's the old bumble headed pensioners like my Dad who are always stung) from cowboy finance/investment schemes won't take effect until mid 2008. But BZP party pills will be gone by Xmas. but if something better was available it would already be the best selling Not necessarily. Why develop and introduce a new product when the new rules have not yet come into effect. Besides, they've still got warehouses full of BZP products to unload. As for Pilger, I think he's coming at it from the "Chavez isn't so bad because others are much worse" angle. or ... "my enemy's enemy is my friend" ... which is not always the best stategy. Since Jun 2007 • 909 posts Report Reply Michael Fitzgerald, 11:34 Aug 23, 2007 "While any sensible person would have qualms about Chavez' recent actions" Much of central/south america are at war (only on occation openly). As such being on a war footing requires strength. Is he doing anything different than Helen Clark has actually achieved (& wants to continue)? On Human Rights how about making it illegal for a people to try and get justice form courts, solely based on race! Since May 2007 • 631 posts Report Reply Idiot Savant, 11:44 Aug 23, 2007 You're right on the button about Chavez. He's not a murdering psychopath (yet), but he's dangerously authoritarian and on a path that undermines rather than strengthens Venezuela's democracy. What he's done for the people of Venezuela has been great (RWDB's MMV), but he should have accepted the constitutional limits rather than seeking to make himself President-for-life. Palmerston North • Since Nov 2006 • 1713 posts Report Reply Well, Chavez "really is doing something for the less well off" as well. The difference is that Lula is doing it constitutionally and properly, without transforming his country into a dictatorship. but he should have accepted the constitutional limits rather than seeking to make himself President-for-life But remember, he is an avowed fan of Fidel Castro ... dictators always see themselves as benign. Contrast this with US democracy: Bush I & II, and now possibly Clinton I & II. He insists not, but who would be surprised if Jeb ran in 2012? Not at all. Bowden's Ease (methylone) was way better than BZP, but the MoH changed its mind on whether it fell afoul of the Misuse of Drugs Act, belatedly deciding that it was an ecstasy analog after all. Although it doesn't make much sense, the key determinant for new substances will be whether they can be construed to be already illegal. Then manufacturers will have the opportunity -- under yet-to-be-defined rules -- to make a case on safety. The Chen Palmer factor will be most interesting there. The difference is that Lula is doing it constitutionally and properly, without transforming his country into a dictatorship. The other difference is that Brazil is a LOT bigger than Venezuela. About 10 times as many people. It's like comparing the problems NZ faces with the problems faced by the UK. Kyle Matthews, 12:29 Aug 23, 2007 Umm, yup. I have mixed feelings about Chavez, as do probably a fair few people on the left. I also have mixed feelings about Helen Clark, again, ditto. But the difference between them and what they're doing, is quite a bit really. Helen Clark, for example, isn't importing thousands of AK47s into her country to prepare for an American led insurgency. Or going on six hour long socialist rants (with a whiteboard I saw on the Daily Show). Or standing up at the UN ranting about how bad the US is. Or shutting down media outlets, persecuting her opposition with death squads, etc etc etc. She's also not as popular as Chavez I see! That doesnt disprove my point..... if methylone was better as you say, but turned out to be legal, do you doubt it would have started outselling BZP? Yes, the new regulations will change things... but as things stood up until now, if a better legal high was already available, we'd already know about it. We dont. Ergo what will replace BZP will likely be less desirable than BZP. (and if something better and legal was available, maybe it and not BZP would be the target of new legislation?) I'm not convinced by the "if a better legal high was available we'd know about it either". Because BZP was so crap I'd rate it as lamer than coffee. Its success was due to cunning marketing, to giving the impression of something cool and slightly dodgy, rather than 0ld 5k00l like alcohol or coffee or cigarettes or anything else parents would use. The funniest thing is that it probably led to quite good parties because of it's *ineffectiveness*. Most of the ones I went to as a kid were pissed-stoned affairs, where people did drunken stoner things, and parties were canned by the actions of a few. Nothing like a huge puke across the dinner table, or someone getting violent to kill the vibe of love. That kids could socialize without being actually high is the biggest achievement of BZP. If it was needed as a social lubricant on account of it's symbolic "we're kids rebelling together" function, at least it was mostly harmless. Now that's going to be removed by wowsers. Great. Back to piss then? Hopefully the hole in the market will replaced by something equally harmless-but-hip. Maybe sports drinks full of caffeine and glucose, or hemp and guarana will make a comeback. They just need to convey the ideas "XTreem, L3g4l, H1gh" and pay some wowsers in the government to get bitter on it, and kids will flock. Terence Wood, 12:48 Aug 23, 2007 Conor Foley's great isn't he. That being said, anyone who wants to pin the police repression tag on Chavez is going to have to do the same to Lula too. I've always had my doubts about Chavez and I've always been a huge fan of the PT (Lula's political party - heck, I liked them so much I wrote my masters thesis on them). But police repression is, in all probability, every bit as high in Brazil as it is in Venezuela. And there's not a whole heap that Lula has been able to do about it (in many Brazilian cities the police function more or less as a gang in their own right). I suspect the same is true in Chavez's case too. As for the banning television channels and meddling with the constitution - I agree there - Chavez looks definitely to be on the slide. Oddly enough, while it was doubtless whiffy, the refusal to renew RCTV's frequency licence doesn't trouble me as much as some of the other stuff. It did at least take place through a real regulatory structure, and RCTV did seem to have breached its licence terms. It's still allowed to produce locally and broadcast via satellite. The prosecution of individual journalists on trumped-up criminal defamation charges because they wrote about the activities of senior ministers is, on the other hand, seriously chilling. It's appalling that Pilger's fervour allows him to dismiss such things. The funniest thing is that it probably led to quite good parties because of it's *ineffectiveness*. Ben, they worked for everyone else but you. Just not for all that long -- and not nearly as long as they made you feel absolutely ghastly. Helen Clark, for example, isn't importing thousands of AK47s into her country to prepare for an American led insurgency. Aunty Helen has led the rearming of the NZDF. (Of course the notable exception of the strike force - that has never ever been used - hell I came closer to shooting one down - a pure cock up in training , not terrorism. ) And led NZ into more fights since WWII, so who's the war monger? Exactly which invasion has Chavez been party to? Closing a TV station & banning coverage of MPs in parliment, a matter of degree but all going the same way. And which ethnic group has Chavez made illegal to have legal representation in a court of law? Yes, it would have, but it was banned before it emerged from Bowden's public trial/direct marketing operation. It had quite a fan base. Yes, the new regulations will change things... but as things stood up until now, if a better legal high was already available, we'd already know about it. We dont. You don't. The manufacturers already have samples, and I'm pretty sure they'll be better than BZP. Which wouldn't be hard. Surely the fact that Matt Bowden was trying to find something better and bring it to market suggests that.... well... that people were trying to find something better? (and legal) Ben- I agree that it was definitely a marketing success, and maybe "cool factor" was more in effect than actual psychotropic effects... But unless you think the BZP sellers were intentionally selling something weaker than they had available, for the "good of society"... it doesnt follow that something better had to be available just because BZP was so poor. There are other good reasons my suspicions could be incorrect.... development costs could be too high for the total market to justifty? Something better, but too costly to produce might exist? I just think it stands to reason that when you main selling feature is that its legal.... when that gets removed, you have to resort to the next best legal thing, and by definition, next-best is not as good as the thing that preceded it. Now, with the change in regulations of what you can bring onto the market in the future.... that will change the economics considerably. Maybe it will become too expensive/difficult to prove anything safe? And the market will die off completely. Or maybe the market is big enough to justify huge expenditure to find a replacement that does indeed turn out to be better than BZP, (when such expenditure couldnt be justified with BZP in the market). Alcohol is my drug of choice so its all moot to me.... I was just thinking out loud. I guess if "they" have only just recently discovered better than BZP alternatives.... I can see why they would hold off with new regulations coming in soon.... But if they have known about these better alternatives for some time, why have they not been selling them already? Invent a better mouse-trap and people will buy it, etc. Ben, they worked for everyone else but you. Phew, I thought I must have just been crazily at odds with common perceptions of what 'high' actually meant. Maybe I have odd brain chemistry, and it just didn't work for me. Then again, I do recall some effects - there was a sort of gnawing feeling in the stomach, rather like anxiety, and sleeplessness (which I suffer from anyway). Is that what kids call getting high these days? I must confess my experiments with other uppers (which I won't go into here) have also had similar observations. Perhaps I'm just not an uppers kind of guy. Or perhaps I'm too critical to let a placebo effect work on me. Fletcher, it doesnt follow that something better had to be available just because BZP was so poor. Actually I was saying that coffee was stronger, but kids didn't want an upper that their parents used, which smacked of squareness, however effective it might be, and is also an acquired taste. BZP rode the line of being something that was 'barely legal'. For a lot of kids it's enough that you might get busted by your parents, too much that you might get busted by the cops. Personally, I feel the exact opposite way ;-) Aunty Helen has led the rearming of the NZDF. I don't think the NZDF was ever 'un-armed' for Helen Clark to 're-arm' them. If you mean, modernised and getting rid of 50 year old bits of equipment, then yes, NZ has done some of that, rightly so, given the bad state that it had fallen into. Chavez is apparently preparing (rightly or wrongly) for an American-led insurgency, which he will fend off by supplying local militia with small arms. Helen Clark hasn't been out on the streets handing out AK47s. The sentence 'And led NZ into more fights since WWII' doesn't make sense to me. But Helen Clark has got NZ troops involved in one war - Afghanistan. Everything else in the past fifteen years has been peacekeeping (East Timor, Solomons), or reconstruction (Iraq) that I can think of. I'm not sure what is the exactly the same between Clark and Chavez about that. I didn't mention invasion. Well, coverage of MPs in parliament isn't banned, and hasn't ever been banned. Coverage of MPs for a certain purpose is now (still) banned. I don't agree with the legislation, but in actual fact it opened up coverage of MPs in parliament, because they can now use footage of MPs who aren't standing and speaking. The equivalent of Chavez would be closing down TV3 because they broadcast Ron Marks giving the finger. Again, planets apart. And I'm not sure what track you're on about ethnic groups not having legal representation in law.
cc/2020-05/en_middle_0016.json.gz/line4941
__label__cc
0.719369
0.280631
The complex and diversified mitochondrial gene pool of Berber populations Clotilde Coudray, A. Olivieri, A. Achilli, M. Pala, M. Melhaoui, M. Cherkaoui, F. El-chennawi, M. Kossmann, A. Torroni, J. M. Dugoujon The mitochondrial DNA variation of 295 Berber-speakers from Morocco (Asni, Bouhria and Figuig) and the Egyptian oasis of Siwa was evaluated by sequencing a portion of the control region (including HVS-I and part of HVS-II) and surveying haplogroup-specific coding region markers. Our findings show that the Berber mitochondrial pool is characterized by an overall high frequency of Western Eurasian haplogroups, a somehow lower frequency of sub-Saharan L lineages, and a significant (but differential) presence of North African haplogroups U6 and M1, thus occupying an intermediate position between European and sub-Saharan populations in PCA analysis. A clear and significant genetic differentiation between the Berbers from Maghreb and Egyptian Berbers was also observed. The first are related to European populations as shown by haplogroup H1 and V frequencies, whereas the latter share more affinities with East African and Nile Valley populations as indicated by the high frequency of M1 and the presence of L0a1, L3i, L4*, and L4b2 lineages. Moreover, haplogroup U6 was not observed in Siwa. We conclude that the origins and maternal diversity of Berber populations are old and complex, and these communities bear genetic characteristics resulting from various events of gene flow with surrounding and migrating populations. Annals of Human Genetics Gene Pool Mitochondrial Genes Passive Cutaneous Anaphylaxis Gene Flow Mitochondrial DNA Coudray, C., Olivieri, A., Achilli, A., Pala, M., Melhaoui, M., Cherkaoui, M., ... Dugoujon, J. M. (2009). The complex and diversified mitochondrial gene pool of Berber populations. Annals of Human Genetics, 73(2), 196-214. https://doi.org/10.1111/j.1469-1809.2008.00493.x Coudray, Clotilde ; Olivieri, A. ; Achilli, A. ; Pala, M. ; Melhaoui, M. ; Cherkaoui, M. ; El-chennawi, F. ; Kossmann, M. ; Torroni, A. ; Dugoujon, J. M. / The complex and diversified mitochondrial gene pool of Berber populations. In: Annals of Human Genetics. 2009 ; Vol. 73, No. 2. pp. 196-214. @article{a25d82d38af746daa83e4c4564186edf, title = "The complex and diversified mitochondrial gene pool of Berber populations", abstract = "The mitochondrial DNA variation of 295 Berber-speakers from Morocco (Asni, Bouhria and Figuig) and the Egyptian oasis of Siwa was evaluated by sequencing a portion of the control region (including HVS-I and part of HVS-II) and surveying haplogroup-specific coding region markers. Our findings show that the Berber mitochondrial pool is characterized by an overall high frequency of Western Eurasian haplogroups, a somehow lower frequency of sub-Saharan L lineages, and a significant (but differential) presence of North African haplogroups U6 and M1, thus occupying an intermediate position between European and sub-Saharan populations in PCA analysis. A clear and significant genetic differentiation between the Berbers from Maghreb and Egyptian Berbers was also observed. The first are related to European populations as shown by haplogroup H1 and V frequencies, whereas the latter share more affinities with East African and Nile Valley populations as indicated by the high frequency of M1 and the presence of L0a1, L3i, L4*, and L4b2 lineages. Moreover, haplogroup U6 was not observed in Siwa. We conclude that the origins and maternal diversity of Berber populations are old and complex, and these communities bear genetic characteristics resulting from various events of gene flow with surrounding and migrating populations.", keywords = "Berbers, Egypt, Morocco, MtDNA, North African settlement", author = "Clotilde Coudray and A. Olivieri and A. Achilli and M. Pala and M. Melhaoui and M. Cherkaoui and F. El-chennawi and M. Kossmann and A. Torroni and Dugoujon, {J. M.}", journal = "Annals of Human Genetics", Coudray, C, Olivieri, A, Achilli, A, Pala, M, Melhaoui, M, Cherkaoui, M, El-chennawi, F, Kossmann, M, Torroni, A & Dugoujon, JM 2009, 'The complex and diversified mitochondrial gene pool of Berber populations', Annals of Human Genetics, vol. 73, no. 2, pp. 196-214. https://doi.org/10.1111/j.1469-1809.2008.00493.x The complex and diversified mitochondrial gene pool of Berber populations. / Coudray, Clotilde; Olivieri, A.; Achilli, A.; Pala, M.; Melhaoui, M.; Cherkaoui, M.; El-chennawi, F.; Kossmann, M.; Torroni, A.; Dugoujon, J. M. In: Annals of Human Genetics, Vol. 73, No. 2, 17.02.2009, p. 196-214. T1 - The complex and diversified mitochondrial gene pool of Berber populations AU - Coudray, Clotilde AU - Olivieri, A. AU - Achilli, A. AU - Pala, M. AU - Melhaoui, M. AU - Cherkaoui, M. AU - El-chennawi, F. AU - Kossmann, M. AU - Torroni, A. AU - Dugoujon, J. M. N2 - The mitochondrial DNA variation of 295 Berber-speakers from Morocco (Asni, Bouhria and Figuig) and the Egyptian oasis of Siwa was evaluated by sequencing a portion of the control region (including HVS-I and part of HVS-II) and surveying haplogroup-specific coding region markers. Our findings show that the Berber mitochondrial pool is characterized by an overall high frequency of Western Eurasian haplogroups, a somehow lower frequency of sub-Saharan L lineages, and a significant (but differential) presence of North African haplogroups U6 and M1, thus occupying an intermediate position between European and sub-Saharan populations in PCA analysis. A clear and significant genetic differentiation between the Berbers from Maghreb and Egyptian Berbers was also observed. The first are related to European populations as shown by haplogroup H1 and V frequencies, whereas the latter share more affinities with East African and Nile Valley populations as indicated by the high frequency of M1 and the presence of L0a1, L3i, L4*, and L4b2 lineages. Moreover, haplogroup U6 was not observed in Siwa. We conclude that the origins and maternal diversity of Berber populations are old and complex, and these communities bear genetic characteristics resulting from various events of gene flow with surrounding and migrating populations. AB - The mitochondrial DNA variation of 295 Berber-speakers from Morocco (Asni, Bouhria and Figuig) and the Egyptian oasis of Siwa was evaluated by sequencing a portion of the control region (including HVS-I and part of HVS-II) and surveying haplogroup-specific coding region markers. Our findings show that the Berber mitochondrial pool is characterized by an overall high frequency of Western Eurasian haplogroups, a somehow lower frequency of sub-Saharan L lineages, and a significant (but differential) presence of North African haplogroups U6 and M1, thus occupying an intermediate position between European and sub-Saharan populations in PCA analysis. A clear and significant genetic differentiation between the Berbers from Maghreb and Egyptian Berbers was also observed. The first are related to European populations as shown by haplogroup H1 and V frequencies, whereas the latter share more affinities with East African and Nile Valley populations as indicated by the high frequency of M1 and the presence of L0a1, L3i, L4*, and L4b2 lineages. Moreover, haplogroup U6 was not observed in Siwa. We conclude that the origins and maternal diversity of Berber populations are old and complex, and these communities bear genetic characteristics resulting from various events of gene flow with surrounding and migrating populations. KW - Berbers KW - Egypt KW - Morocco KW - MtDNA KW - North African settlement JO - Annals of Human Genetics JF - Annals of Human Genetics Coudray C, Olivieri A, Achilli A, Pala M, Melhaoui M, Cherkaoui M et al. The complex and diversified mitochondrial gene pool of Berber populations. Annals of Human Genetics. 2009 Feb 17;73(2):196-214. https://doi.org/10.1111/j.1469-1809.2008.00493.x 10.1111/j.1469-1809.2008.00493.xLicence: Unspecified
cc/2020-05/en_middle_0016.json.gz/line4943
__label__wiki
0.579301
0.579301
Home › Popular Protest in Palestine: The Uncertain Future of Unarmed Resistance Popular Protest in Palestine: The Uncertain Future of Unarmed Resistance Paperback - $ 28.00 USD Popular Protest in Palestine provides an overview and analysis of the role and significance of unarmed civil resistance in the Palestinian national movement. Marwan Darweish and Andrew Rigby focus on the contemporary popular resistance movement in the Occupied Palestinian Territories, prefaced by a historical review of the thread of unarmed civil resistance that has run throughout the history of the Palestinian liberation struggle. The authors explore this underemphasized dimension of the Palestinian struggle, arguing that at the present juncture the popular resistance movement, especially in the West Bank, is the most significant form of struggle against the ongoing occupation. 2. Palestinian Resistance to the Establishment of the Israeli State 3. Palestinians In Israel: From Quiet Resistance to Audible Protest and Political Mobilisation 4. From the Nakbha to the Separation Wall: 2002–13 5. The Resurgence of Popular Resistance, 2002–13 6. Challenges Facing Palestinian Popular Resistance 7. The Role of Israeli Peace and Solidarity Activists 8. Aid, Advocacy and Resilience – the Role of International Humanitarian Aid Agencies 9. Links in the Chain – International Leverage? Authors: Marwan Darweish is a senior lecturer at the Centre for Peace and Reconciliation Studies at Coventry University. Andrew Rigby is professor of peace studies and director of the Centre for the Study of Forgiveness and Reconciliation at Coventry University. His most recent book is Justice and Reconciliation: After the Violence. Publisher: University of Chicago Press ISBN: 9780745335094 1 0/27/16 JBB
cc/2020-05/en_middle_0016.json.gz/line4946
__label__wiki
0.670929
0.670929
US5727046A - Personal electronic telephone directory apparatus with remote accessibility - Google Patents Personal electronic telephone directory apparatus with remote accessibility Download PDF petd Waleed S. Almulla Almulla; Waleed S. 1995-12-11 Application filed by Almulla; Waleed S. filed Critical Almulla; Waleed S. 238000003825 pressing Methods 0 abstract description 8 238000004422 calculation algorithm Methods 0 description 17 241000723668 Fax Species 0 description 4 241001076195 Lampsilis ovata Species 0 description 2 239000003550 marker Substances 0 description 2 230000002194 synthesizing Effects 0 description 2 230000001755 vocal Effects 0 description 2 H04M1/26—Devices for signalling identity of wanted subscriber H04M1/27—Devices whereby a plurality of signals may be stored simultaneously H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, i.e. memories whose operation does not require relative movement between storage means and a transducer, e.g. chips H04M1/274533—Telephone number directory management, e.g. manually editing, erasing or modifying data stored in the directory A stand alone Personal Electronic Telephone Directory (PETD) apparatus is provided, that includes an internal telephone line segment, an off hook circuit, a Dual Tone Multi-Frequency (DTMF) receiver, a ring detection circuit, a micro-controller, a memory, a speech synthesizer, and a DTMF generator. The PETD apparatus is a stand alone device intended for connection to an individual user's home telephone line, and for access by using a common touch tone ("DTMF") telephone. The user can access the memory of the PETD apparatus of the present invention locally or remotely. Then the user can issue coded instructions by simply pressing the keys of the DTMF telephone. By giving specific instructions, the user is allowed to add, retrieve or delete data from the memory of the PETD apparatus. The PETD apparatus communicates with the user by voice, generated by the speech synthesizer. Additionally, if the PETD apparatus is being accessed locally, then the user can instruct it to dial automatically the telephone number retrieved from the memory, so that the user can continue automatically with a telephone call to the retrieved telephone number. The present invention relates to special, enhanced electronic telephone directories, and particularly to a method and apparatus for providing a stand alone personal electronic telephone directory apparatus with local and remote accessibility. 2. Description of the Prior Art A telephone directory is a system that accepts an inquiry of a name, and then responds by giving the telephone number of that name. There have been numerous and varied proposals for providing remotely accessible telephone directories through central office based systems and services. These systems and services generally comprise arrangements for making inquiries of telephone number data through the keypad of a standard "touch tone" telephone device, otherwise known as Dual Tone Multi Frequency (DTMF) telephone device. U.S. Pat. No. 4,782,509 to Shepard discloses an automatic directory assistance request processor system, usable over a large geographic area. The user seeking directory information enters the name of the requested number by pressing the appropriate telephone keypad keys. Shepard's system converts the DTMF signal to digital data, and then searches for database data matching the requested data. The search is over data contained in a plurality of local exchanges. The system provides vocal outputs generated by a speech synthesizer. The voice responds by identifying the name and number of the sought party. In this system the user can only search for data existing in the system. The user can not delete or add personal data to the system through the DTMF telephone keypad. U.S. Pat. No. 4,608,460 to Carter et al. describes an automatic directory assistance apparatus accessed through a conventional telephone exchange. It receives DTMF input signals and responds via voice synthesis. The subscriber spells at least a part of the desired last name. The system will search for the inquired name and will respond by saying the found names and their corresponding numbers. This system is limited by being able to retrieve only data that has been stored in it by the system. The user does not have the ability to delete or add data to the system through the telephone exchange. U.S. Pat. No. 5,204,894 to Darden is directed to a personal electronic service that is administered by a central office. The service can provide a user with the ability to remotely store, retrieve and/or delete voice data from a telephone directory account that is personal to the user, and provided by the central office. In such arrangements, the user would pay a monthly fee for having a personal account, and possibly other charges based on use. A user must also hope that the service is offered close enough to her, where calling the central office would be charged as a local call. Further, even for setting up her personal directory in her account, the user would incur charges for her time on the telephone, unless the service has been set up with an "800" number that reverses the charges. While all of the foregoing systems theoretically can provide electronic telephone directories with remote accessing, they individually suffer varying disadvantages. For example, some of these systems can not be updated by the subscriber to store personal data. They all are complex expensive systems that require a significant investment to set up, complex equipment and expensive computers. Because of the nature and complexity of the described systems, it would be difficult for them to provide remotely accessible personal electronic telephone directories to each individual requiring such a feature for a reasonably low cost. Further, it would be prohibitively expensive for an individual or a small entity to own one of the described systems for private use. Finally, since all such systems are remotely operated, the user depends absolutely on the provider of a service. U.S. Pat. No. 5,454,029 to Noda describes a telephone answering machine with a telephone directory function. The directory function has been implemented by using the equivalent of a speed dialing function, wherein the names of the directory are stored in the memory in association with an abbreviated code assigned by the device. The code is a two digit serial number, and can be the speed dialling code. Each telephone number is stored in correspondence with the code associated with the name. Using an external telephone, a user can form an inquiry for the telephone number by entering its associated code. A drawback of this device is that the user must either remember the code or be able to verify it independently by a pocket book, that he must carry with him. Once required to carry a pocket book, the user might as well record the telephone numbers in it. Alternately, the user can instruct the device to recite all the stored names serially through the telephone line. Once the desired name is spoken, the user can issue another command to have the device also recite the corresponding telephone number. The device suffers from a serious limitation based on its design. Because reciting of the entries is in a serial fashion, the number of entries is practically limited; indeed, the preferred embodiment accommodates only 50 entries. If the name happens to be the fortieth stored, the user will first have to listen to 39 other names first. Worse, if the name happens to not be stored at all, then the user will have to listen to all 50 to discover this, without accomplishing anything else in the meantime. So, while implementing the device for a higher number of entries is easily possible, it also makes searching the memory of the device more time consuming. It is a primary object of the present invention to provide a personal electronic telephone directory apparatus to telephone subscribers as a stand alone device that has names and telephone numbers stored in its directory, and utilizes speech synthesis to respond to its users vocally. It is another object of the present invention to provide a personal electronic telephone directory apparatus that allows a user to store, retrieve, or delete personal data to it by following simple procedures. It is yet another object of the present invention to provide a personal electronic telephone directory apparatus with remote accessibility that can be connected to a conventional home telephone line and used without the need for any services from a central office. It is one more object of the present invention to provide a stand alone personal electronic telephone directory apparatus that can be connected to a conventional home telephone line while also permitting simultaneous connection of other devices to the same home telephone line. It is another object of the present invention to provide an efficient low cost personal electronic telephone directory apparatus with local and remote accessing features that can be owned and used by any individual or small entity for a reasonably low cost. It is yet another object of the present invention to provide a personal electronic telephone directory apparatus wherein telephone number data can be added, deleted, or retrieved locally (i.e. from home), or remotely (i.e. from away from home) using a conventional touch tone telephone. It is one more object of the present invention to provide a user with a personal electronic telephone directory apparatus that can dial automatically a retrieved telephone number, and permit automatically a subsequent telephone communication of the user with the retrieved telephone number. According to the present invention, a stand alone Personal Electronic Telephone Directory (PETD) apparatus includes an internal telephone line segment, an off hook circuit, a Dual Tone Multi Frequency (DTMF) receiver, a ring detection circuit, a micro-controller, a memory, a speech synthesizer, and a DTMF generator. The PETD apparatus of the present invention is a stand alone device intended for connection to an individual user's home telephone line, and for access by using a common touch tone ("DTMF") telephone. The PETD apparatus further allows connection of other telephonic devices, such as a FAX machine or a telephone answering machine to the same home telephone line. The intended connections are such that, unless specifically accessed, the PETD apparatus does not interfere with the normal operation of the telephone or the other telephonic devices. The user can access the memory of the PETD apparatus of the present invention locally or remotely. Then the user can issue coded instructions by simply pressing the keys of the DTMF telephone. By giving specific instructions, the user is allowed to add, retrieve or delete data from the memory of the PETD apparatus. The PETD apparatus communicates with the user by voice, generated by the speech synthesizer. As an additional feature, if the PETD apparatus of the present invention is being accessed locally, then the user can further instruct it to dial automatically the telephone number retrieved from the memory, so that the user can continue automatically with a telephone call to the retrieved telephone number. The PETD of the present invention is advantageous over the prior art because it can store data that is not retrievable from existing directory assistance services. This is especially useful for an individual that has nation wide or world wide contacts, or for storing telephone numbers that are unlisted. Additionally the PETD apparatus of the present invention eliminates the need and inconvenience of carrying pocket telephone directories or any other type of telephone directories. The PETD apparatus can be accessed by DTMF telephone calling from a different area code, or even a different country. Thus it eliminates the risk of losing a portable telephone directory that could have important data. The remote accessibility of the PETD is especially important for individuals in transit. The PETD apparatus of the present invention is user friendly, easy to use, and as convenient as using the closest DTMF telephone. It provides privacy, since all the data is stored in a privately owned apparatus at home, which further needs access codes to be accessed. It does not require any special equipment or services from a central office, as it can be plugged in to an existing home telephone line. Use of the preferred embodiment of the present invention does not preclude one of the telephone outlets of the subscribing user's home from being used, because it allows connection of additional equipment to it, such as telephones, answering machines, FAX machines, modems, etc. These and other objects and advantages of the present invention will be more appreciated and understood after a consideration of the following drawings and the detailed description of the invention. FIG. 1 is an illustration of possible connections for the preferred embodiment of the present invention. FIG. 2 is a diagrammatic illustration of components of the preferred embodiment of the present invention. FIG. 3A is a detailed schematic implementation of a circuit of the preferred embodiment of the invention. FIG. 3B is a schematic showing the pin designations of an audio transformer of the circuit of FIG. 3A. FIG. 3C is a schematic showing the pin designations of relays of the circuit of FIG. 3A. FIGS. 4, 5, 6, 7, 8, 9 and 10 are flow charts illustrating an algorithm for use with the apparatus of the present invention. FIG. 11 is a diagrammatic illustration of components of the second embodiment of the present invention. FIG. 12 is an illustration of possible connections for a second embodiment of the present invention. In all Figures like numbers are used for like components where applicable. Two main embodiments of the present invention will be described. The preferred embodiment of the present invention is a stand alone Personal Electronic Telephone Directory ("PETD") apparatus, and will be described first, in connection with FIGS. 1-10. An alternate embodiment of the present invention is a stand alone Caller Only PETD ("COPETD") apparatus, and will be described in connection with FIGS. 11-12. PETD--Connections The types of possible connections of the stand alone Personal Electronic Telephone Directory (PETD) apparatus of the present invention will now be described in reference with FIG. 1. The preferred embodiment of the present invention is represented by box 10, and will now be called PETD apparatus 21.0 for short. The PETD apparatus 10 of the present invention is preferably provided in its own enclosure 12, that features a male telephone port 14. The male telephone port 14 is also known as the caller port 14, because it is intended for users calling in to the PETD apparatus 10. A line cable 16 is preferably connected to the male telephone port 14. The male telephone port 14 can be implemented in many ways without departing from the meaning or the spirit of the present invention. One such way is to have it be a female type telephone plug, with line cable 16 terminating in two male-type plugs. Another such way is to have the male telephone port 14 be internal to the enclosure 12, with the line cable 16 again terminating in two male-type plugs, and apparently sourcing from the enclosure 12. The PETD apparatus 10 is further provided with a female telephone port 18. The female telephone port 18 is also known as the proximate port 18, because it is intended for users located proximately to the PETD apparatus 10. The female telephone port 18 is like a female type telephone plug or outlet. The stand alone PETD apparatus 10 is additionally provided with a ring detection switch 20, that is an Open--Close (ON-OFF) type switch. The line cable 16 is intended for connection to the telephone outlet 22, provided on a wall 24 of the home of a subscriber. The telephone outlet 22 is electrically connected to a Remote Telecommunication Network (RTN) 26 via a home telephone line 28. The RTN 26 is typically a switchboard or a network or a telephone exchange, such as one operated by a telephone company. The home telephone line 28 is the means of telephone access to the subscriber by remotely located telephones, such as telephone 30. The home telephone line 28 has a number assigned to the subscriber (and user of the PETD) by the telephone company. While the present description refers to the PETD apparatus 10 being located in the user's home, such is by way of illustration and not of limitation. Indeed, the user can install the apparatus of the present invention in other places such as his office, at the telephone outlet of a telephone line that reaches there. The user preferably makes the remaining connections as if the female telephone port 18 of the PETD apparatus 10 were the outlet 22 of the home telephone line 28. Specifically, the subscriber may connect a telephonic device 32 such as a FAX machine 32 to the female telephone port 18 via a proximate telephone cord 33, and a conventional DTMF telephone 34 to a female telephone port of the telephonic device 32. Alternately, the user may connect the DTMF telephone 34 directly to the female telephone port 18 of the PETD apparatus 10, via another proximate telephone cord 36. This way, use of the PETD apparatus 10 will not be precluding any of the available home telephone outlets from being used by other telephonic devices. According to the present description, a telephonic device is a device capable of detecting telephone rings of a home telephone line that it is connected to, and further capable of taking the home telephone line to an off hook state automatically. The connection can be direct (e.g. to an outlet of the home telephone line 28) or indirect (e.g. through another telephonic device). Examples of such telephonic devices are, therefore, telephone answering machines, FAX machines, modems, etc. Telephones are not within this definition of telephonic devices, because they can not take a home telephone line to its off hook state automatically. When on standby mode, the above described connections make the PETD apparatus 10 of the present invention appear "transparent" to a user of the telephonic device 32, or a user of the telephone 34, regardless of which party originated the connection. A local user using one of these two devices with the connections of FIG. 1 is termed a proximate user, since he is accessing the PETD 10 through its proximate port 18. Caller access of the PETD 10 can also be accomplished locally through another conventional DTMF telephone device 38, connected to another outlet 40 of the home telephone line 28. It is caller access because the PETD 10 will be accessed by its caller port 14. Such caller access is local access, because it originates from the home of the user. In addition to these connections, the user would also determine whether to open or close ring detection switch 20. The user makes that determination based on whether a telephonic device is also connected to the home telephone line 28. The switch should be normally closed, unless a telephonic device is connected to the proximate port 18 of the PETD apparatus 10 or to any outlet (e.g. 22, 40) of the home telephone line 28. PETD--Components The main components of the PETD apparatus 10 of the present invention will now be described in connection with FIG. 2. In FIG. 2 the single lines show single electrical lines, while the wide arrows show abstractly the flow of commands and of data. The PETD apparatus 10 of FIG. 2 is assumed to be connected to the RTN 26 through line cable 16 and home telephone line 28. Line cable 16 is actually a pair of electrical lines, of which individual line 29 is the signal line and individual line 31 is the common line. Additionally, the PETD apparatus 10 is assumed to be connected directly to DTMF telephone 34, through proximate telephone cord 36. Proximate telephone cord 36 is actually a pair of electrical lines, of which individual line 37 is the signal line and individual line 39 is the common line. As will be understood, these specific connections have been assumed with no loss of generality, and other connections are possible. The PETD apparatus 10 comprises an internal telephone line segment 41, comprised by a pair of electrical wires 42 and 44, otherwise known as common line 42 and signal line 44. Common line 42 is a common node for the Vss of the circuit of the PETD apparatus 10, for the home telephone line 28 (i.e. line 31), and also for the DTMF telephone 34 (i.e. line 39). Line 42 joins the female telephone port 18 and the male telephone port 14. Signal line 44 has a proximate end connected to relay 46 and a caller end connected to relay 48. The proximate end is configured so that it is capable of establishing a proximate connection of the internal telephone line segment 41 with the proximate telephone cord 36. The caller end is configured so that it is capable of establishing a caller connection of the internal telephone line segment 41 with the line cable 16. The configuration of the ends is preferably in the form of common telephone plugs or outlets, so that connections can be made by simply plugging in, as follows. A short wire or extended node joins relay 46 with female telephone port 18, and another short wire or extended electrical node joins relay 48 with male telephone port 14. A node is a place of connection of electrical wires. A node can be extended (i.e. a wire can be a node) without loss of generality. When relay 46 closes, a proximate connection is made between the internal telephone line segment 41 and the proximate telephone cord 36 that is connected to the telephone device 34. The proximate connection is accomplished by closing and opening the relay 46, which electrically connects and disconnects only the respective signal lines 37 and 44, but that is all that matters. The common lines 39, 42 are always connected during operation. This way the internal telephone line segment 41 becomes capable of receiving DTMF signals that have been applied to the proximate telephone cord 36 by a proximate caller. Similarly, when relay 48 closes, a caller connection is made between the internal telephone line segment 41 and the line cable 16 that is connected to the home telephone line 28. This way the internal telephone line segment 41 becomes capable of receiving DTMF signals that have been applied to the home telephone line 28 by a caller. The aforementioned "transparent" operation of the DTMF telephone 34 with the home telephone line 28 "through" the PETD apparatus 10 is allowed when both the relays 46 and 48 are closed, and thus the signal line 44 connects the signal line 29 to the signal line 37. Such is the case when the PETD apparatus 10 is in the standby mode. When the subscriber number corresponding to the home telephone line 28 is being dialled by a caller, characteristic voltage differences will appear on the line cable 16. A ring detection circuit is a circuit capable of detecting them, and it is further capable of producing a ring detection signal in response. This ring detection signal is intended to activate a mechanism that will take the home telephone line 28 to its off hook state. For proper implementation of the PETD apparatus 10, it is thus important to have a ring detection circuit connected somewhere in the system. Such can be implemented in many ways. One way is for the PETD apparatus 10 to rely indirectly on ring detection circuits of connected devices (telephones or telephonic devices). In such a case the PETD apparatus 10 need not have its own. Another way is to use the ring detection circuit of a telephonic device that has been manufactured in conjunction with a PETD apparatus. According to the preferred embodiment of the present invention, the PETD apparatus 10 has its own ring detection circuit 50. The ring detection circuit 50 has an input port and an output port. The input port is capable of connection with the line cable 16. This is accomplished by having a common line of the input port of the ring detection circuit 50 be connected to common line 42, and by further having a signal line of the input port of the ring detection circuit 50 be connected to the extended node between relay 48 and the male telephone plug 14. Thus, in the shown embodiment, the connection between the input port of the ring detection circuit 50 and the line cable 16 happens when the line cable 16 is connected to the male telephone plug 14. A ring detection signal is produced at the output port that carries ringing information (i.e. number of rings) and is signified by wide arrow 52. If a telephonic device is connected to the home telephone line 28, then the ring detection circuit 50 of the PETD apparatus 10 is actually undesirable, because it may interfere with the telephonic device by answering simultaneously with it. There are two solutions to this problem. First, to have the PETD apparatus 10 respond to the ring detection circuit 50 only after a number of rings that is large enough (e.g. 5), to where the telephonic device will hopefully have answered first. Such will be accomplished by the algorithm, as will be seen below. The second solution is to use a switch so that the ring detection circuit 50 can be disabled entirely. Accordingly, the stand alone PETD apparatus 10 optionally and preferably comprises a ring detection switch 20. The ring detection switch 20 is connected to the input port of the ring detection circuit 50 and to line cable 16. When the ring detection switch 20 is closed (ON), then the ring detection circuit 50 is enabled, and produces a ring detection signal. When the ring detection switch 20 is open (OFF), then the ring detection circuit 50 is disabled, and produces no output. The PETD apparatus 10 additionally comprises a DTMF receiver 54, that has an input port and an output port. The input port is connected to the internal telephone line segment 41. DTMF signals coming from a remote caller can be applied to the internal telephone line segment 41 only when the home telephone line 28 is in its off hook state. The DTMF receiver 54 produces electronic signals at the output port, in response to DTMF signals detected at its input port. The electronic signals are binary data, whose flow is shown by wide arrow 56. The PETD apparatus 10 also comprises an off hook circuit 57. The off hook circuit 57 is connected to the signal line 44 and to the common line 42. When activated, the off hook circuit 57 connects the signal line 44 with the common line 42 over electrical resistance. That will have the effect of taking the home telephone line 28 to an off hook state. An LED (not shown in FIG. 2) will simultaneously be lit to indicate that. The PETD apparatus 10 further comprises a microcontroller 58. The microcontroller 58 acts as a central processor for all electronic components, and for the flow of commands and data within the circuit of the PETD apparatus 10. The microcontroller 58 is connected to the output port of the ring detection circuit 50, and thus monitors the ring detection signal, when the ring detection switch 20 is closed. The microcontroller 58 is capable of establishing and disestablishing the proximate connection and the caller connection by opening and closing relays 46 and 48. Further, the microcontroller 58 can activate and deactivate the off hook circuit 57. The microcontroller 58 is connected to the output port of the DTMF receiver 54, and can thus perceive the electronic signals whose flow is represented by wide arrow 56. The microcontroller 58 is programmed in such a way that it is capable of interpreting the electronic signals as encoded instructions and encoded data. The exact implementation will be obvious to a person skilled in the art, in view of the present description. The PETD apparatus 10 further comprises a memory 60. The memory 60 is capable of storing telephone number data, in manners which will be elaborated on below. The microcontroller 58 is connected and programmed in such a way that it is capable of retrieving, adding and deleting telephone number data from the memory 60, in accordance with the encoded instructions and the encoded data received. In particular, the microcontroller 58 stores (wide arrow 62) and retrieves (wide arrow 64) telephone number data from memory 60. The PETD apparatus 10 also comprises a speech synthesizer 66, that has an input port and an output port. The input port is connected in such a way that it is capable of perceiving telephone number data that has been retrieved from the memory 60 by the microcontroller 58. Further as a result of instruction signals received, the microcontroller 58 outputs (or commands a memory element such as a latch to output) telephone number data and perhaps other information (wide arrow 68) to speech synthesizer 66. The speech synthesizer 66 is capable of producing at its output port electronic speech signals in response to telephone number data perceived at its input port. The output port of the speech synthesizer 66 is connected to the internal telephone line segment 41 through an audio transformer (not shown in FIG. 2) that will be elaborated on below. Accordingly, the electronic speech signals can be applied (wide arrow 70) to the internal telephone line segment 41 as voice signals, which would be heard at the DTMF telephone device, that was used to issue inputs. The voice signals are vocal renditions of the perceived telephone number data, or of other information such as announcements, menus, etc. Optionally and preferably the PETD apparatus 10 further comprises a DTMF generator 74, that has an input port and an output port. The input port is connected to the microcontroller 58. According to the preferred embodiment, the microcontroller 58 is further programmed in such a way that it is capable of issuing (or of causing a memory element such as a latch to issue) dial commands (wide arrow 76). The input port of the DTMF generator 74 is capable of perceiving the dial commands. The output port of the DTMF generator 74 is connected to the internal telephone line segment 41. The DTMF generator 74 is capable of generating DTMF dial signals at its output port in response to dial commands perceived at its input port. The dial signals are thus applied (wide arrow 78) to the internal telephone line segment 41, again through the audio transformer. PETD--Operation The operation of the stand alone PETD apparatus 10 will now be described in reference with FIGS. 1 and 2. The operation is intertwined with the software algorithm that will be used. A preferred (but not unique) algorithm is described in the next section. When on standby mode, the PETD apparatus 10 maintains both proximate and caller connections established. Thus it allows "transparent operation", unless accessed specifically. The standby mode will not prevent the home telephone line 28 from going to its on hook state. But when the PETD apparatus 10 goes to its off standby mode while the caller connection is being established, it will take the home telephone line 28 to its off hook state. Given the connections of either FIG. 1 or FIG. 2, the PETD apparatus 10 can be accessed locally by the DTMF telephones 34 or 38. The user would accomplish this by simply picking up either DTMF telephone 34 or 38, and by dialling a predetermined, user definable proximate access code or a caller access code, respectively. Pressing the keys of a DTMF telephone generates DTMF signals, that will be applied to the internal telephone line segment 41. The user will thus be issuing inputs by pressing the keys of a DTMF telephone device connected to the stand alone PETD apparatus. Alternately, the PETD apparatus of the present invention can be accessed remotely by dialling the subscriber number (or just telephone number) of the home telephone line 28 from a remote telephone device 30 that is connected to RTN 26. What happens next depends on whether the ring detection switch 20 is closed or open. If the ring detection switch 20 is closed, then the PETD apparatus 10 monitors incoming calls through the ring detection circuit 50. When a predetermined number of rings has been detected, the PETD will answer the call by taking the home telephone line 28 to its off hook state. Thus any DTMF signals generated thereafter will be able to be applied to the internal telephone line segment 41. If the predetermined number of rings is not reached, it will be because either the caller hang up, or because a telephone or a telephonic device took the home telephone line 28 to its off hook state (in which case DTMF signals will be able to be applied to the internal telephone line segment 41.) If the ring detection switch 20 is open, the PETD apparatus 10 will not detect the rings. So, if no other telephonic device takes the home telephone line 28 to its off hook state, then no DTMF signals can be applied to the internal telephone line segment 41, and the call will go unanswered. If telephonic device 32 takes the home telephone line 28 to its off hook state, then PETD signals will be able to be applied to the internal telephone line segment 41. When DTMF signals appear on the internal telephone line segment 41, they will be detected by the DTMF Receiver 54, and subsequently by the microcontroller 58. The PETD 10 will then compare the DTMF signals to the two access codes. If the proximate access code has been input, then the PETD apparatus 10 will disestablish the caller connection by opening relay 48. Therefore, the connection of the PETD apparatus 10 with the home telephone line 28 to the RTN 26 will be cut off. If the caller access code has been input, then the PETD apparatus 10 will disestablish the proximate connection by opening relay 46. However, the home telephone line 28 will remain at its off hook state. In either case, the PETD apparatus 10 will then wait for further DTMF signals from the user. It is possible that a proximate user will have given the caller access code, or that a caller will have given the proximate access code. In either case, while the code will be identified as valid, the user will thus get disconnected, by being in the wrong end. The user will be in position to access the memory of the PETD apparatus 10 of the present invention by using the keypad of the DTMF telephone device she is using, whether locally or remotely. By sending instructions and data, the user is allowed to add, retrieve or delete data from the memory 60 of the PETD apparatus 10. Voice signals are generated by the speech synthesizer 66, and are of three types. The first type is a feedback of the input information entered, the second type is the response of the PETD apparatus to the information requested, and the third type is announcements, such as menus, confirmation of the transaction requested, etc. The user will hear the voice signals over the telephone he is using. As an additional feature, if the PETD apparatus 10 of the present invention has been accessed proximately, then the user can further instruct the PETD to dial automatically a retrieved telephone number and then further allow connection of the user to the desired party. Specifically, the microcontroller 58 can be caused to output (wide arrow 76) dialling information to DTMF generator 74. The DTMF generator 74 will convert the dialling information to DTMF signals which, when applied (wide arrow 78) to the internal telephone line segment 41, will cause a telephone number to be dialled through the RTN 26. Then the PETD apparatus 10 will also establish the caller connection to allow the conversation to happen. PETD--Circuit FIG. 3A shows a detailed schematic diagram of a circuit of the preferred embodiment of the PETD of the present invention. The person skilled in the art will recognize that there are many possible equivalent circuits, that would operate in substantially the same way as the circuit of FIG. 3A, to accomplish substantially the same result. Further, while many of the connections of the Integrated Circuits (ICs) used in the circuit of FIG. 3A are standard, only some details will be elaborated herein without loss of generality. A 12V D.C. power supply (not shown) is used. The ground terminal of the power supply is connected to the Vss node (line 42). A group of six 6.2V Zener diodes 79 connected between the 12V supply in a reverse bias scheme provide a Vcc node of voltage of about 12V-6.2V=5.8V. Only three of the six Zener diodes 79 are shown in FIG. 3A. The integrated circuit chips can be embodied by chips having standard part numbers. The known pin number identifications of all standard part numbers are hereby incorporated herein by reference. Pin number identifications are referred to by the designation PN, where "N" is a number identifying the pin. The microcontroller 58 is implemented by IC1 in conjunction with IC5 and IC3. IC1 is an 8 bit microprocessor, which acts as a central processor to control the operation of the PETD apparatus. IC1 can be embodied by a chip having standard part number 8031AH. A 12 MHz crystal is connected between P18 and P19 of IC1. In addition, each of P18 and P19 of IC1 are connected to node Vss via a 33 pF capacitor. Also, 10KΩ resistor is connected between node Vss and P9 of IC1, while a 10 μF capacitor is connected between node Vcc and P9 of IC1. IC5 is a 4K×8 bits erasable programmable read only memory, and is used to store the program that the microprocessor IC1 executes. IC5 can be embodied by a chip having standard part number D2732A. IC3 is an 8 bit latch used to support the interface between IC1, IC4, and IC5. IC3 can be embodied by a chip having standard part number CD74HC373, as also can IC8. The ring detection switch 20 enables the ring detection circuit 50 to detect rings. The ring detection circuit 50 is implemented by IC11 in conjunction with buffer IC12, as shown. IC11 can be embodied by a chip having standard part number 4N33. P1 of IC11 is connected to the signal line 29 through a 2.1KΩ resistor in series with a 0.1 μF capacitor. A reverse biased diode is connected between P1 and P2 of IC11. P5 of IC11 is connected to Vcc through a 12.1KΩ resistor. A capacitor of 220 μF is connected between P5 of IC11 and Vss. P4 of IC11 is connected to Vss via the ON/OFF ring detection switch 20. IC12 can be embodied by a chip having standard part number 74HC240N. The input of buffer IC12 is connected to P5 of IC11, and the output of buffer IC12 is connected to P8 of IC1. The data on the line sourcing from the output of buffer IC12 corresponds to the wide arrow 52 of FIG. 2. The DTMF receiver 54 is implemented in FIG. 3A by IC10 in conjunction with IC6, and is controlled by IC1. IC10 is an amplifier of analog input from the signal line 44. IC10 can be embodied by a chip having standard part number 386N-1. P3 of IC10 is connected to the output node of a voltage divider, which is the node connecting the top and bottom portions of the voltage divider. The top portion of the voltage divider is a 0.01 μF capacitor in series with a 270KΩ resistor, and is connected to the signal line 44. The bottom portion of the voltage divider is a 1500 pF capacitor in parallel with a 33KΩ resistor, and is connected to node Vss. The output of IC10 is input into IC6. The main chip of the DTMF receiver 54 is IC6, which converts DTMF signals to binary numbers recognized by the microcontroller 58. IC6 can be embodied by a chip having standard part number CD22202E. A 3.58 MHz crystal and a 1MΩ resistor are connected in parallel between P11 and P12 of IC6. Additionally, each of P7 and P10 of IC6 are connected to Vss. IC4 is a 32K×8 bits static random access memory and is used as the memory 60, to store telephone directory data. IC4 can be embodied by a chip having standard part number D43256AC. In the preferred embodiment of the invention each entry in the memory 60 is allocated 32 bytes. Each byte can be used to store one alphabetic letter or two numbers. One entry, for example, can store a name consisting of 22 letters and a telephone number consisting of 20 numbers. Accordingly, an embodiment of the PETD that uses the 32K byte SRAM IC4 of FIG. 3A, can store up to 900 entries of names and telephone numbers. This number can be doubled by using a 64K byte SRAM. Further, the total number of entries can be increased by reducing the number of bytes allocated to each entry. The speech synthesizer 66 is implemented by IC2 in conjunction with IC9. IC2, a phoneme speech synthesizer used in conjunction with IC1 to produce voice signals. IC2 can be embodied by a chip having standard part number 78A263A. P22 of IC2 is connected to a 1 MHz clock oscillator signal. A 4.7 μF capacitor is connected between P1 of IC2 and a voltage divider. The voltage divider consists of a 110KΩ and a 10KΩ resistors, with the 10KΩ resistor terminating at the Vss node. IC9 is an amplifier that amplifies the signal output from the speech synthesizer 66. IC9 can be embodied by a chip having standard part number 386N-1. The output of the voltage divider is connected to P3 of IC9. The output pin of IC9 is P5, and the line from it corresponds to wide arrow 70 of FIG. 2. P5 of IC9 is connected through a 10 μF capacitor to one input of the primary side P1 of an audio transformer 80. FIG. 3B shows the pin designations for audio transformer 80 of FIG. 3A. The other input of the primary side P2 of the audio transformer 80 is connected to Vss. The audio transformer 80 makes possible imposing the signal from the amplifier IC9 onto the internal telephone line segment 41. The DTMF generator 76 of FIG. 2 is implemented by IC7 of FIG. 3A. IC7 can be embodied by a chip having standard part number CD22859E. IC7 receives its input and control signals from IC1. A 3.58 MHz crystal is connected between P7 and P8 of IC7, while a 10 μF capacitor is connected between node Vcc and P6 of IC7 to reduce the power supply noise. Its output pin is P16, and the line from it corresponds to wide arrow 78 of FIG. 2. P16 is connected to Vss through a 100 Ω resistor, and it is also connected (through a 200 Ω resistor) to the same input of the primary side P1 of the audio transformer 80, as the output pin P5 of amplifier IC9. The off hook circuit 57 is implemented by relay RL2 in conjunction with a 400 Ω resistor 82. The off hook circuit 57 has been implemented in conjunction with the audio transformer 80, although that is not necessary. FIG. 3C shows the pin designations for any one of the SPTS relays used in the circuit of FIG. 3A. The input pin P2 of relay RL2 is connected to the output pin P3 of audio transformer 80. The output pin P1 of relay RL2 is connected to the signal line 44 of the home telephone line 28. One of the pins (P4) of the secondary side of audio transformer 80 is connected through the resistor 82 to a Light Emitting Diode (LED) diode 84. The anode side of the LED diode 84 is connected to Vss. The PETD apparatus 10 takes the home telephone line 28 to its off hook state by activating the off hook circuit 57. This is accomplished by merely closing relay RL2. The LED diode 84 lights up, when relay RL2 is turned on (closed). It stays lit until the user enters an "exit" instruction, or until no DTMF signal is detected by the PETD for a preselected amount of waiting time, as will be discussed below. In FIG. 3A, relay 46 is implemented by RL1, and relay 48 is implemented by RL4. Relay 84 is implemented by RL3, and is used for assisting the power requirements of telephone 34 (not shown in FIG. 3A). P1 of relay RL3 is connected to the 12V D.C. power supply, while a 100 Ω resistor is connected between P2 of relay RL3 and P1 of relay 46. The main chip IC1 in conjunction with IC8 controls the biassing circuits of all four relays RL1, RL2, RL3, and RL4 through their biassing pins P3. Each biasing circuit consists of a 1KΩ resistor, a 200 Ω resistor and an non bipolar transistor. Additionally, pins P4 of all four relays RL1, RL2, RL3, and RL4 are connected to Vcc. PETD--Software and Algorithm A computer program is assembled and stored in IC5 that embodies an algorithm. The software determines the operation of the PETD. An example of such an algorithm is embodied in the flow charts of FIGS. 4 through 10. It will be apparent to a person skilled in the art that there are a number of equivalent ways for a computer program to be assembled and stored in a chip, for a microprocessor to execute. Similarly, the ideas embodied in the flow charts can be implemented in different but equivalent ways, as is known in the art. In addition, more software features can be embodied in the algorithm, as is well known in the art. In the following description of the algorithm, the simple word "PETD" is used to denote the apparatus of the present invention, however it may have been implemented. The algorithm for accessing the PETD will now be described in connection with FIGS. 4 and 5. As seen in FIG. 4, execution starts at step 410, labeled "START", which leads to step 415, the standby mode. The home telephone line 28 is assumed to start at its on hook state. Step 415 is a step to which execution continues to, if there have been no DTMF signals detected for a predetermined amount of time, as will be seen shortly. At that time, the PETD will sample the internal telephone line segment 41 indefinitely, waiting for a DTMF input signal. The algorithm is in the loop of steps 420 and 430, if the ring detection switch 20 is open, and in the loop of steps 425, 435, 440, 445, and 455 if the ring detection switch 20 is closed. If the ring detection switch 20 is open and a DTMF signal is detected (step 430), execution proceeds to step 510 of FIG. 5, whereby the detected DTMF signal is compared to the predetermined proximate and caller access codes. Both access codes can be user programmable. If the detected signal is indeed the proximate access code, then according to step 535, the PETD will go to its active mode, and according to step 540 the PETD will disestablish the caller connection, i.e. will disconnect itself from the home telephone line 28. Then execution proceeds to the greeting step 550, that will be described below. If the ring detection switch 20 is closed, then the software maintains a counter (named IR) for counting telephone rings. According to step 425, the counter IR is cleared. Then a timer T1 is cleared and started (step 435). While a DTMF signal is not being detected (step 440) telephone rings will be expected (step 445) for a T1 duration of up to 5 seconds (step 455), and if they do not occur, execution will return to step 425. If a DTMF signal is detected at step 440, it will have been from local accessing only, and execution will continue to step 510. If a telephone ring is detected at step 445, the IR counter will be incremented by one, and another telephone ring will be waited for another T1 duration, for up to five rings. When 5 rings have been detected (step 460), then the PETD will go to its active (off standby) mode (step 465). Then the PETD will wait for another DTMF signal for a predetermined waiting period (step 470). A suitable such waiting period is 70 seconds. If no DTMF signal is detected, execution will continue back to the starting step 415. If a DTMF signal is detected, then execution will continue again to step 510. If at step 510 the DTMF signal is identified to be the caller access code, then the PETD will go to its active mode (step 520). The PETD may have already done that at step 465.! Then execution will proceed to step 530, and the PETD will disconnect any telephonic devices connected to its proximate port 18. Then execution proceeds to the greeting step 550. Choice of activity The choice of activity will now be described in reference with the flowcharts of FIGS. 5 and 6. According to the greeting step 550, the PETD gives an initial greeting and an initial menu. The initial greeting can be: "WELCOME TO YOUR PERSONAL TELEPHONE DIRECTORY." The initial menu can be: "TO RETRIEVE AN ENTRY PRESS 1, TO STORE A NEW ENTRY PRESS 2, TO RESET THE ENTIRE MEMORY PRESS 12345." This initial greeting contains the drastic option of resetting, which preferably is to be made accessible only proximately, by suitable programming. The person skilled in the art will easily discern a way to implement such a safety feature with software, exploiting that the user must have used only the proximate access code, etc. In addition, the initial menu can contain options for changing the access codes, so that they are programmable by the user. A person having ordinary skill in the art will immediately discern ways of accomplishing this in view of the present description. Execution will then proceed to step 560, which can be best described as "the waiting routine", and is encountered on many occasions in the software. The software will wait again for a waiting period (which can be the same period as described above), for a DTMF signal to be detected. If no signal is detected, then execution will continue to step 415. The PETD will emulate the on hook state of the telephone, etc. The waiting routine allows continuation of the algorithm if a DTMF signal is subsequently detected. The entered DTMF signal will be compared (step 570) against the reset instruction. If there is a match, then all the telephone number data stored in the PETD memory will be erased (step 580). This activity should be performed only when the user installs the PETD or if the user desires to delete all the data stored in the PETD. After resetting, execution proceeds to step 610. This step 610 is one to which execution returns to after a PETD transaction is completed, as will be seen from the below. According to step 610, a main menu is presented to the user, which is identical to the initial menu, except the reset option is not presented. Accordingly, the main menu could be: "TO RETRIEVE AN ENTRY PRESS 1, TO STORE A NEW ENTRY PRESS 2, TO EXIT PRESS 3." After the main menu has been presented, the waiting routine is repeated (step 620). The next detected DTMF signal is considered for choice of activity, from step 630 and on. If the last detected DTMF signal (from step 570) were not the reset instruction, then execution proceeds to step 630 directly, without presenting the main menu. The last detected DTMF signal will be compared against the data storage instruction (step 630), the data retrieval instruction (step 640), and the exit instruction (step 650). The exit instruction will cause the PETD to go back to the on hook state (step 415). If the last detected DTMF signal does not match any of these proposed activities, then execution reverts back to step 610, and the main menu is presented again. The data storage activity is where telephone number data is added to the memory. The telephone number data stored in the memory will be in pairs. Each pair comprises a name and its corresponding telephone number. It is up to the user to decide how many letters to store for any specific name. Nicknames or other usual appellations (such as "DAD") can be stored in lieu of proper names. Such is possible because the entire data file will be customized by the user. The telephone number is preferably stored in a dial ready format, for reasons that will become apparent below. Every name is a string of letters. Since there more letters than numbers, a set of correspondences is must be chosen, with which to represent letters by numbers of the keypad. Thus each letter is inputted by pressing a corresponding pair of keys of the DTMF keypad in order, according to the chosen set of correspondences. There are many possible sets of correspondences of letters of the alphabet to pairs of keys of the keypad. With proper programming any one set can be used. A preferred such set of correspondences is as follows: The first key is the key that contains that letter, and the second key denotes the relative position of the letter among the letters of the first key. For example, to enter the letter "C" the user would dial the "2" key then the "3" key. The "2" key is dialed since it represents "ABC" as can be seen at any DTMF telephone keypad. The "3" key is dialed since "C" is the third letter printed on the "2" key. Since the letters "Q" and "Z" are missing from most DTMF telephone keypads, in the preferred embodiment of the invention, the letter "Q" is represented by a "7" then a "4" inputs. The letter "Z" is represented by a "9" then a "4" inputs. In addition, keys can be designated for correcting an erroneous entry. Furthermore, a specific sequence of key entries is selected as the "enter" code, to denote the end of the entries. Such an "enter" code can be by merely pressing the "*" key by itself. The set of correspondences can be implemented by proper programming, as is known in the art. The algorithm for storing telephone number data will now be described in connection with FIGS. 7 and 8. FIG. 7 describes mostly the algorithm for storing a name (two keypad entries per letter), and FIG. 8 describes mostly the algorithm for storing a telephone number (one keypad entry per number). According to step 710, the memory is searched for an unoccupied entry in the PETD database. If none is found, an "OUT OF MEMORY" announcement is made (step 715), and execution reverts to the main menu (step 610). If there is an unoccupied entry, then a new data string is started in the temporary memory (step 720). Then the user makes double keypad entries for each letter of the name. Each of the keypad entries is intertwined with the waiting routine (steps 725, 760) and checking for an "abort" code (steps 740, 770). The "abort" code can be the "#" key. In addition, the first entry is checked to see if it is the "enter" code (step 730), before accepting each of the two keypad entries (steps 750, 780) in the string. The "enter" code can be the "*" key. In addition, a check is made after making the second keypad entry (step 790), to see if the maximum allowable number of combined letters and numbers has been reached. If it has, then execution jumps to FIG. 8. A "TOO MANY LETTERS AND NUMBERS IN THE ENTRY" announcement is made (step 880), and subsequently execution reverts to the main menu (step 610). If an "abort" code has been entered, that means that the user wants to restart or abort the entry entirely. Execution proceeds then to the main menu. If an "enter" code has been inputted, that would signify the end of the name. The software then preferably adds a "NAME END" marker (step 735) that indicates the end of the name at that point of the data string. Such a "NAME END" marker can be a "space" or a "zero". Then the software is prepared to accept the input of the telephone number, as will be explained in connection with FIG. 8. Then the user makes single keypad entries for each number of the telephone number. Every keypad entry is intertwined with the waiting routine (step 810) and checking for an "enter" code (step 820) and an "abort" code (step 850), before adding the number (step 860) to the data string. Again, if an "abort" code has been entered, execution returns to the main menu (step 610). Additionally, a check is made again after every keypad entry (step 870) to see if the maximum allowable number of combined letters and numbers has been reached. If it has, then execution proceeds to step 860 described above. If an "enter" code has been inputted, that would signify the end of the telephone number. The entry is now complete. The software moves the data string from the temporary memory to the permanent memory (step 830), and then makes a "DATA SAVED" announcement (step 840). Execution then proceeds to the main menu (step 610). Data Retrieval Data retrieval is the activity whereby the user enters a request by inputing a name in order to hear the associated telephone number. Entry of the name request is performed according to a set of correspondences. It is highly preferable that the set of correspondences used for entering a name request is the same as is used for entering data, so that the operator does not have to learn two sets. In the preferred embodiment of the invention the two sets are the same. The algorithm for inputing such a name request will now be described in connection with FIG. 9. According to step 910, a new name string is started in temporary memory. Then the user makes double keypad entries for each letter of the name. Each of the keypad entries is intertwined with the waiting routine (steps 920, 940). In addition, the first entry is checked to see if it is the "enter" code (step 930), before accepting each of the two keypad entries in the string. When a keypad entry is accepted, its binary equivalent is added to the name string (steps 935, 945). When the "enter" code has been entered, execution proceeds to step 950. Step 950 is where the search happens. The name string in the temporary memory contains a name, which is compared (step 950) to all names in permanent storage that start with it. Accordingly, names that have been entered only partially will also be found. Further, if only an "enter" code has been entered, all names in the memory would have been "found" by that search at step 950. Such would be a good procedure for the periodic clearing of the memory of numbers that are no longer used. If no match to the entered name is found, the PETD apparatus will make (step 955) a "DATA NOT FOUND" announcement. Execution then will return to step 610 of present the main menu. If a name has been found, execution proceeds to step 960, wherein the name and the associated telephone number are recited. The name is also recited for the user to confirm that she retrieved the correct name by pressing the keys of the keypad. An additional feature allows this part of the process to take place faster. While the recitation is taking place (step 960), incoming DTMF signals are being monitored. If the user enters the "enter" code, the recitation will stop (step 970) before it is completed. Deletion of data, automatic dialling, and retrieval of more data. At this point of the execution, data retrieval becomes intertwined with deletion of selected data and automatic dialling, as will be seen from the following description and from FIG. 10. In other words, if the user wants to delete selected telephone number data, she must first retrieve it as described above. Automatic dialling is a feature that is made possible by including the DTMF generator. In the circuit shown, it is available only when the user has accessed the PETD proximately. However, it would be an obvious improvement to add the automatic dialing option even when the PETD is to be accessed by its caller telephone port. Such an improvement will require a minor modification to the software program that controls the operation of the PETD. The improvement will also require that the home telephone line that the PETD is connected to can support features such as conference calling or three way calling, etc. According to the next step 1010 of the execution, the software recalls if the originally entered access code was the proximate access code or the caller access code. Accordingly, the software will present a proximate processing menu (step 1015) or a caller processing menu (step 1020). Both menus would offer a "skip to the next entry" option, a "delete" option, and a default "exit" option. In addition, the proximate processing menu would offer the additional option of automatically dialling the retrieved telephone number. The proximate processing menu might thus be: "TO EXIT PRESS 0, TO CONTINUE WITH THE NEXT ENTRY PRESS 1, TO DELETE THIS ENTRY PRESS 2, TO DIAL IT PRESS 3". The caller accessing menu might be: "TO EXIT PRESS 0, TO CONTINUE WITH THE NEXT ENTRY PRESS 1, TO DELETE THIS ENTRY PRESS 2". Then the waiting routine would be repeated (step 1025), while the user is expected to enter a choice. The next detected DTMF signal will be compared to the "delete" instruction (step 1030). If it is, then execution proceeds to step 1035, and the entry will be deleted from the memory. Then a deletion announcement will be made (step 1040). A number of options can follow the deletion announcement. The preferred option is for execution to continue directly with the "next search" step (step 950 of FIG. 9), so that the user can continue a presumed scanning and deletion activity. If the next detected DTMF signal were not a "delete" instruction at step 1030, then it will be compared to the "dial" instruction (step 1055), only after it is confirmed again that the access code that was used in the first place was the proximate access code (step 1050). If it were a valid "dial" instruction, then execution will proceed to step 1060, and the telephone number will be dialled as it is contained in the database. That is why it is important that the telephone number has been stored in a dial ready format. For example, for a PETD being used in the U.S.A. and storing a telephone number in a country other than the U.S.A., the telephone number should preferably be stored with the prefix "011". Then the PETD will go to the standby mode (step 415), allowing a proximate user to continue with a call. The home telephone line 28 will not go to its on hook state, however, as it will be maintained off hook by the user. If the next detected DTMF signal were neither a "delete" instruction nor an authorized "dial" instruction, then it will be compared to the "skip to next entry" instruction (step 1065). If it were a valid "skip to next match" instruction, then execution will continue to step 950 of FIG. 9. If not, then execution will return to step 610 of FIG. 6, to present the main menu. Thus, the "exit" option of the processing menus is implemented as a default option. COPETD--General The Caller Only Personal Electronic Telephone Directory ("COPETD") is an embodiment of the present invention with fewer features than the PETD apparatus 10 described above. Specifically, the COPETD apparatus lacks a proximate port and thus does not allow proximate accessing or the above described transparent operation. Its components are therefore fewer, but are identical to the equivalent components of the PETD apparatus 10, and the remaining connections are very similar. COPETD--Components The main components of the COPETD apparatus 110 of the present invention will now be described in connection with FIG. 11. The COPETD apparatus 110 of the present invention is preferably provided in its own enclosure 112, that features a male telephone port 114, also known as the caller port 114. The COPETD apparatus 110 comprises a node pair 141, comprised by a common node 142 and a signal node 144. A node is a place of connection of electrical wires. A node can be extended (i.e. a wire can be a node) without loss of generality. Common node 142 and signal node 144 are preferably implemented by electrical wires 142 and 144. Common node 142 is a common node for the Vss of the circuit of the COPETD apparatus 110, and also a common node for any home telephone line that will be subsequently connected to the node pair 141. The caller port 114 is configured so that it is capable of establishing a caller connection of the node pair 141 with line cable 16 of FIG. 1. The preferred configuration of the caller port 114 is in the form of a common telephone plug or outlet, so that the caller connection can be made by simply plugging in. All that was described about ring detection circuits above applies also for designing a COPETD apparatus according to the present invention. Thus, the COPETD apparatus 110 might not have its own ring detection circuit, if a telephonic device is going to be also connected to the same home telephone line as the COPETD apparatus 110. It is preferred that the COPETD apparatus 110 have its own ring detection circuit 150, which would be identical to the ring detection circuit 50 described above in connection with FIG. 2. The input port of the ring detection circuit 150 is capable of connection with the line cable 16. This is accomplished as shown in FIG. 11, which is very similar to its counterpart in FIG. 2. A ring detection signal is produced at the output port that carries ringing information (i.e. number of rings) and is signified by wide arrow 152. According to the same rationale as above, the stand alone COPETD apparatus 110 optionally and preferably comprises a ring detection switch 120. The ring detection switch 120 is connected to the input port of the ring detection circuit 150 and to the signal node 144. When the ring detection switch 120 is closed (ON), then the ring detection circuit 150 is enabled, and produces a ring detection signal. When the ring detection switch 120 is open (OFF), then the ring detection circuit 150 is disabled, and produces no output. The COPETD apparatus 110 additionally comprises a DTMF receiver 154, that is identical to DTMF receiver 54 described above. The input port is connected to the node pair 141. The DTMF receiver 154 produces electronic signals at its output port in response to DTMF signals detected at its input port. The electronic signals are binary data, whose flow is shown by wide arrow 156. The COPETD apparatus 110 also comprises an off hook circuit 157 connected to the signal node 144 and to the common node 142, and identical in function to off hook circuit 57 of FIG. 2. When activated, the off hook circuit 157 connects the signal node 144 with the common node 142 over electrical resistance. That will have the effect of taking a home telephone line connected to the node pair 141 to an off hook state. The COPETD apparatus 110 further comprises a microcontroller 158. The microcontroller 158 acts as a central processor for all electronic components, and for the flow of commands and data within the circuit of the COPETD apparatus 110. The microcontroller 158 is connected to the output port of the ring detection circuit 150, and thus monitors the ring detection signal, when the ring detection switch 120 is closed. Further, the microcontroller 158 can activate and deactivate the off hook circuit 157. The microcontroller 158 is connected to the output port of the DTMF receiver 154, and can thus perceive the electronic signals that flow according to arrow 156. The microcontroller 158 is programmed in such a way that it is capable of interpreting the electronic signals as encoded instructions and encoded data. The exact implementation will be obvious to a person skilled in the art, in view of the present description. The COPETD apparatus 110 further comprises a memory 160, capable of storing telephone number data, similar to what was elaborated on above. The microcontroller 158 is connected and programmed in such a way that it is capable of retrieving, adding and deleting telephone number data from the memory 160, in accordance with the encoded instructions and the encoded data received. In particular, the microcontroller 158 stores (wide arrow 162) and retrieves (wide arrow 164) telephone number data from memory 160. The COPETD apparatus 110 also comprises a speech synthesizer 166, identical to speech synthesizer 66 that was described above in connection with FIG. 2. The input port is connected in such a way that it is capable of perceiving telephone number data that has been retrieved from the memory 160 by the microcontroller 158. Further as a result of instruction signals received, the microcontroller 158 outputs (or commands a memory element such as a latch to output) telephone number data and perhaps other information (wide arrow 168) to speech synthesizer 166. The output port of the speech synthesizer 166 is connected to the node pair 141 through an audio transformer (not shown in FIG. 11), similarly to what was described above. Accordingly, the electronic speech signals output from the speech synthesizer 166 can be applied (wide arrow 170) to the node pair 141 as voice signals. COPETD--Connections The types of possible connections of the stand alone COPETD apparatus 110 of the present invention will now be described in reference with FIG. 12. The user's home or office is served by the home telephone line 28, as in FIG. 1 above. The subscriber plugs in to a first outlet 40 of the home telephone line 28 a telephonic device 32, with a telephone 38 attached to it. Or she can plug in the telephone 38 directly to the first outlet 40. The line cable 16 is capable of connection to a second outlet 22 of the home telephone line 28. The user thus connects line cable 16 to the second outlet 22 and to the male telephone port 114. In addition to these connections, the user would also determine whether to open or close ring detection switch 120. The user makes that determination based on whether a telephonic device is also connected to the home telephone line 28. The switch should be normally closed, unless a telephonic device is connected to any outlet (e.g. 40) of the home telephone line 28 other than the second outlet 22 that the COPETD apparatus 110 is connected to. COPETD--Operation The operation of the stand alone COPETD apparatus 110 will now be described in reference with FIGS. 11 and 12. When on standby mode, the COPETD apparatus 110 will not prevent the home telephone line 28 from going to its on hook state. But when the COPETD apparatus 110 goes to its off standby (i.e. active) mode, it will take the home telephone line 28 to its off hook state. Given the connections of FIG. 12, the COPETD apparatus 110 can be accessed locally by the DTMF telephone 38. The user would accomplish this by simply picking up the DTMF telephone 38, and by dialling a predefined, user programmable access code. Alternately, the PETD apparatus of the present invention can be accessed remotely by dialling the telephone number of the home telephone line 28 from a remote telephone device 30 that is connected to RTN 26. What happens next depends on whether the ring detection switch 120 is closed or open. If the ring detection switch 120 is closed, then the COPETD apparatus 110 monitors incoming calls through the ring detection circuit 150. When a predetermined number of rings has been detected, the PETD will answer the call by taking the home telephone line 28 to its off hook state. Thus any subsequently generated DTMF signals will be able to be applied to the node pair 141. If the predetermined number of rings is not reached, it will be because either the caller hang up, or because a telephonic device took the home telephone line 28 to its off hook state (in which case DTMF signals will be able to be applied to the node pair 141). If the ring detection switch 120 is open, the COPETD apparatus 110 will not detect the rings. So, if no other telephonic device takes the home telephone line 28 to its off hook state, then no DTMF signals can be applied to the node pair 141, and the call will go unanswered. If telephonic device 32 takes the home telephone line 28 to its off hook state, then PETD signals will be able to be applied to the node pair 141. When DTMF signals appear on the node pair 141, they will be detected by the DTMF Receiver 154, and subsequently by the microcontroller 58. The PETD 10 will then compare the DTMF signals to a predetermined access code. If a proper access code has been input, then the COPETD apparatus 110 will then wait for further DTMF signals from the user. The user will be in position to access the memory of the COPETD apparatus 110 of the present invention by using the keypad of the DTMF telephone device she is using, whether locally or remotely. By sending instructions and data, the user is allowed to add, retrieve or delete data from the memory 160 of the COPETD apparatus 110. The user will hear the voice signals over the telephone she is using. COPETD--Implementation Given the present description and the circuit of FIG. 3A and the accompanying description it will be obvious to a person having reasonable skill in the art to come up with a circuit that will perform the function of the COPETD apparatus 110 as described above. Indeed, fewer chips are needed because fewer components are implemented. Similarly, given the present description and the flowcharts of FIGS. 4-10, it will be obvious to a person having reasonable skill in the art to come up with an algorithm for the COPETD apparatus 110 that functions analogously to the PETD apparatus 10. Indeed, the flowcharts would be similar but simpler, because there is no dialling, only one access code, no proximate accessing, etc. Additionally, it will again be obvious to a person having reasonable skill in the art to come up with code appropriate for implementing this algorithm. Additional Implementations The present invention is capable of other and different embodiments without departing from its spirit. Additional implementations of the present invention will be obvious to a person skilled in the art in light of the above description. For example, the stand alone PETD or COPETD apparata of the present invention could be manufactured in conjunction with a conventional telephonic device such as a telephone answering machine. Additionally, the components of the stand alone PETD or COPETD of the present invention can be implemented otherwise. For example, a personal computer could be configured to perform as a stand alone Personal Electronic Telephone Directory according to the present invention. Further, speech digitization and speech recognition techniques can be used to allow the storage of the required data with the user's voice, which will require more memory. Such techniques will also allow the sought name to be entered by the user vocally, instead of by using a telephone keypad. Another obvious improvement is the use of non-volatile memory or the use of battery back up techniques to retain the stored data in the memory, even if the power supply of the PETD is turned off or disconnected. In the above description numerous details have been set forth in order to provide a more thorough understanding of the present invention. It will be obvious, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well known features have not been described in detail in order to not obscure unnecessarily the present invention. 1. A stand alone Personal Electronic Telephone Directory ("PETD") apparatus intended for use in combination with a telephonic device, the telephonic device being capable of automatically taking a home telephone line to an off hook state if connected to it, the stand alone PETD apparatus comprising: an internal telephone line segment comprising a signal line and a common line, the internal telephone line segment having a proximate end and a caller end, the proximate end being configured so that it is capable of establishing a proximate connection of the internal telephone line segment with a proximate telephone cord connected to the telephonic device, the caller end being configured so that it is capable of establishing a caller connection of the internal telephone line segment with a line cable, the line cable being capable of connection with the home telephone line; an off hook circuit connected to the signal line and to the common line; a DTMF receiver having an input port connected to the internal telephone line segment and an output port, the DTMF receiver producing electronic signals at its output port in response to DTMF signals detected at its input port; a memory containing at least one name that has been stored by the user in advance and telephone number data associated with each name; a microcontroller connected to the off hook circuit, to the output port of the DTMF receiver, and to the memory, the microcontroller being capable of perceiving electronic signals at the output port of the DTMF receiver and interpreting the electronic signals as encoded data, the encoded data including a name request, the microcontroller being further capable of comparing the requested name to stored names and retrieving from the memory telephone number data corresponding to a stored name similar to the requested name; and a speech synthesizer having an output port connected to the internal telephone line segment. 2. The stand alone PETD apparatus of claim 1 additionally comprising a DTMF generator having an output port connected to the internal telephone line segment. 3. The stand alone PETD apparatus of claim 1 further comprising a ring detection circuit having an output port connected to the microcontroller and an input port capable of connection with the line cable. 5. The stand alone PETD apparatus of claim 3 further comprising a switch connected to the input port of the ring detection circuit and to the line cable in such a way that the ring detection circuit is connected with the line cable when the switch is in an ON state and the ring detection circuit is disconnected from the line cable when the switch is in an OFF state. 7. A stand alone Personal Electronic Telephone Directory ("PETD") apparatus comprising: an internal telephone line segment comprising a signal line and a common line, the internal telephone line segment having a proximate end and a caller end, the proximate end being configured so that it is capable of establishing a proximate connection of the internal telephone line segment with a proximate telephone cord, the caller end being configured so that it is capable of establishing a caller connection of the internal telephone line segment with a line cable, the line cable being capable of connection with a home telephone line; a ring detection circuit having an input port and an output port, the input port being capable of connection with the line cable; a microcontroller connected to the off hook circuit, to the output port of the DTMF receiver, to the output port of the ring detection circuit, and to the memory, the microcontroller being capable of perceiving electronic signals at the output port of the DTMF receiver and interpreting the electronic signals as encoded data, the encoded data including a requested name, the microcontroller being further capable of comparing the requested name to stored names and retrieving from the memory telephone number data corresponding to a stored name similar to the requested name; and 10. The stand alone PETD apparatus of claim 9 additionally comprising a DTMF generator having an output port connected to the internal telephone line segment. 11. A stand alone Personal Electronic Telephone Directory ("PETD") apparatus intended for use in combination with a telephonic device, the telephonic device being directly connected to a first outlet of a home telephone line, the telephonic device being capable of automatically taking the home telephone line to an off hook state, the stand alone PETD apparatus comprising: a node pair comprising a signal node and a common node, the node pair being configured so that it is capable of establishing a caller connection of the node pair with a line cable, the line cable being capable of connection to a second outlet of the home telephone line; an off hook circuit connected to the signal node and to the common node; a DTMF receiver having an input port connected to the node pair and an output port, the DTMF receiver producing electronic signals at its output port in response to DTMF signals detected at its input port; a microcontroller connected to the off hook circuit, to the output port of the DTMF receiver, and to the memory, the microcontroller being capable of perceiving electronic signals at the output port of the DTMF receiver and interpreting the electronic signals as encoded data, the encoded data including a requested name, the microcontroller being further capable of comparing the requested name to stored names and retrieving from the memory telephone number data corresponding to a stored name similar to the requested name; and a speech synthesizer having an output port connected to the node pair. 12. The stand alone PETD apparatus of claim 11 further comprising a ring detection circuit having an output port connected to the microcontroller and an input port capable of connection with the line cable. 13. The stand alone PETD apparatus of claim 12 further comprising a switch connected to the input port of the ring detection circuit and to the line cable in such a way that the ring detection circuit is connected with the line cable when the switch is in an ON state and the ring detection circuit is disconnected from the line cable when the switch is in an OFF state. 14. A stand alone Personal Electronic Telephone Directory ("PETD") apparatus comprising: a node pair comprising a signal node and a common node, the node pair being configured so that it is capable of establishing a caller connection of the node pair with a line cable, the line cable being capable of connection with a home telephone line; US08/570,320 1995-12-11 1995-12-11 Personal electronic telephone directory apparatus with remote accessibility Expired - Fee Related US5727046A (en) US08/570,320 US5727046A (en) 1995-12-11 1995-12-11 Personal electronic telephone directory apparatus with remote accessibility US08/570,320 Expired - Fee Related US5727046A (en) 1995-12-11 1995-12-11 Personal electronic telephone directory apparatus with remote accessibility US6000031A (en) * 1997-05-01 1999-12-07 At&T Corp Method and system for collecting and authenticating updates to a network-based directory service US6269337B1 (en) * 1998-07-24 2001-07-31 At&T Corp Method and apparatus to provide enhanced directory assistance information in a communication network US20020078013A1 (en) * 2000-06-02 2002-06-20 Michael Josenhans Method for searching for data in at least two databases, and database system having at least two databases US6483905B1 (en) * 1996-08-13 2002-11-19 Lextron Systems, Inc. Electronic document answering machine US6603839B1 (en) 2000-09-13 2003-08-05 International Business Machines Corporation Automatic transfer of electronic directory entries from directory assistance service to a directory within an electronic communication device US6718017B1 (en) 1999-04-09 2004-04-06 Convergys Customer Management Group, Inc. System and method for creating and controlling interactive voice response applications US6728348B2 (en) * 2000-11-30 2004-04-27 Comverse, Inc. System for storing voice recognizable identifiers using a limited input device such as a telephone key pad US20050001743A1 (en) * 2003-07-02 2005-01-06 Haemerle Richard R. Information retrieval and display device and system US7039177B1 (en) 2000-09-13 2006-05-02 International Business Machines Corp. Automatic update of a directory entry within a directory of an electronic communication device by electronic notification US20070121817A1 (en) * 2005-11-30 2007-05-31 Yigang Cai Confirmation on interactive voice response messages FR3020228A1 (en) * 2014-04-22 2015-10-23 Softathome Method for accessing a shared directory in an internet gateway US4117542A (en) * 1977-07-07 1978-09-26 Judah Klausner Electronic pocket directory US4304968A (en) * 1979-09-24 1981-12-08 Klausner Industries Telephone electronic answering device US4608460A (en) * 1984-09-17 1986-08-26 Itt Corporation Comprehensive automatic directory assistance apparatus and method thereof US4633041A (en) * 1984-04-09 1986-12-30 At&T Information Systems Inc. Station set directory assistance arrangement US4782509A (en) * 1984-08-27 1988-11-01 Cognitronics Corporation Apparatus and method for obtaining information in a wide-area telephone system with multiple local exchanges and multiple information storage sites US4800582A (en) * 1986-08-08 1989-01-24 Dictaphone Corporation Method and apparatus for creating and storing telephone directory listings US4924496A (en) * 1988-05-12 1990-05-08 Romek Figa D/B/A Abraham & Sons Automatic incoming telephone call originating number and party display system US5204894A (en) * 1990-11-09 1993-04-20 Bell Atlantic Network Services, Inc. Personal electronic directory US5230023A (en) * 1990-01-30 1993-07-20 Nec Corporation Method and system for controlling an external machine by a voice command US5339354A (en) * 1991-03-19 1994-08-16 Becker James F Shared line telephone answering device US5369685A (en) * 1991-03-07 1994-11-29 Sprint Communications Company L.P. Voice-activated telephone directory and call placement system US5406618A (en) * 1992-10-05 1995-04-11 Phonemate, Inc. Voice activated, handsfree telephone answering device US5432844A (en) * 1992-06-26 1995-07-11 Phonemate, Inc. Shared line answering system with enhanced extension device features US5436963A (en) * 1992-12-30 1995-07-25 International Business Machines Corporation Telephone answering method and apparatus US5452340A (en) * 1993-04-01 1995-09-19 Us West Advanced Technologies, Inc. Method of voice activated telephone dialing US5454035A (en) * 1990-05-16 1995-09-26 Sharp Kabushiki Kaisha Electronic apparatus US5454029A (en) * 1991-10-01 1995-09-26 Rohm Co., Ltd. Directory answering machine US5483581A (en) * 1989-01-23 1996-01-09 Intellicall, Inc. Method and apparatus for performing an automated collect call US5483586A (en) * 1994-07-18 1996-01-09 Sussman; Lester Electronic on-line subscriber telephone directory US6973167B2 (en) 1996-08-13 2005-12-06 Lextron System, Inc. Electronic document answering machine US20040091087A1 (en) * 1996-08-13 2004-05-13 Dan Kikinis Electronic document answering machine US8666044B2 (en) 1996-08-13 2014-03-04 Yuzalla Investments Llc Electronic document answering machine US6466910B1 (en) * 1998-07-24 2002-10-15 At&T Corp. Method and apparatus to provide enhanced directory assistance information in a communication network US6934703B2 (en) * 2000-06-02 2005-08-23 Nokia Mobile Phones Ltd. Method for searching for data in at least two databases, and database system having at least two databases WO2015162018A1 (en) 2014-04-22 2015-10-29 Softathome Method for accessing a shared directory in an internet gateway EP0634071B1 (en) 2001-01-10 Telephone answering device linking displayed data with recorded audio message US7027569B2 (en) 2006-04-11 Telephone call screening system and method and caller registration system and method for use therewith JP3987127B2 (en) 2007-10-03 Intelligent telephone service accessible via network CA2209282C (en) 2000-11-07 Method for called party control of telecommunications network services JP4142185B2 (en) 2008-08-27 Communication method on communication network US6829332B2 (en) 2004-12-07 Personal dial tone service with personalized call waiting CA1166777A (en) 1984-05-01 Home telephone exchange CA2162931C (en) 1999-08-31 Personal communication using intelligent terminals US6335962B1 (en) 2002-01-01 Apparatus and method for grouping and prioritizing voice messages for convenient playback CA1296414C (en) 1992-02-25 Inter-exchange carrier access selection feature for a pbx user US6038305A (en) 2000-03-14 Personal dial tone service with personalized caller ID RU2120701C1 (en) 1998-10-20 Method which provides users with possibility of real-time update of call route choosing functions JP3098442B2 (en) 2000-10-16 Phone system US6404874B1 (en) 2002-06-11 Telecommute server CA2279234C (en) 2004-01-27 Telephone directory apparatus and method US5452347A (en) 1995-09-19 Dual-line telephone bridging device that gives remote telephones access to communications features US7352848B2 (en) 2008-04-01 Personal address updates using directory assistance data US5689547A (en) 1997-11-18 Network directory methods and systems for a cellular radiotelephone US6999570B2 (en) 2006-02-14 Methods, systems and articles for ordering a telecommunication service US5950165A (en) 1999-09-07 Automated visiting of multiple web sites CA2206648C (en) 2004-05-18 Method and apparatus for remotely programming a cellular telephone terminal serving as a portable information storage and retrieval device US7564960B2 (en) 2009-07-21 Methods, systems and computer program products for dynamic caller ID messaging US8520826B2 (en) 2013-08-27 System and method for real-time blocking of a telephone call US4593157A (en) 1986-06-03 Directory interface and dialer US5668862A (en) 1997-09-16 Method and apparatus for providing user controlled call management services
cc/2020-05/en_middle_0016.json.gz/line4949
__label__wiki
0.720681
0.720681
Justia Patents US Patent Application for MODELING WIRELESS SIGNAL STRENGTH WITHIN A DEFINED ENVIRONMENT Patent Application (Application #20190380044) MODELING WIRELESS SIGNAL STRENGTH WITHIN A DEFINED ENVIRONMENT Jun 6, 2018 - BAYLOR UNIVERSITY A disclosed system quantifies the power distribution of a wireless signal within a constrained environment using non-sequential ray tracing. For each ray, one or more ray-reflecting surface is prescreened to identify collision-eligible surfaces and identify a collision surface from the collision-eligible surfaces, wherein the collision surface is the first ray-reflecting surface that a ray collides with. A power distribution component, indicating the position and power of a ray at a particular elevation within the environment, is added to a cumulative power distribution. If a reflected ray corresponding to each collision is calculated and satisfies ray eligibility conditions, a collision surface may be determined for the reflected ray. Collision surfaces may be identified by evaluating a target function for a number of ray positions, where the target function evaluates to zero when displacement between the ray and the ray-reflecting surface is zero. Latest BAYLOR UNIVERSITY Patents: Photocatalytic filtration system and method of reducing hazardous gases METASURFACE ON OPTICAL FIBER AND RELATED METHOD Programmable Medical Wire System and Method Reducing the proliferation of carcinoma cells by administration of a poly-oxygenated metal hydroxide REFERENCE TO APPENDIX BACKGROUND OF THE INVENTION Field of the Invention Disclosed subject matter pertains to wireless communication and, more particularly, modeling of wireless signal power distributions within specific environments. Many commercial airlines offer in-flight wireless access networks, including some form of IEEE 802.11 (WiFi) network, that permit passengers to access Internet content in flight. However, ever increasing passenger demand for uninterrupted internet access via connections capable of supporting data intensive applications including, as non-limiting examples, high definition video and audio signals remains largely unaddressed. Demand is also increasing for high performance, in-flight mobile communication services capable of supporting, as a non-limiting example, an in-flight call, made by a passenger while in the passenger's seat using the passenger's mobile device, to a landline or mobile phone on the ground. Currently, cellular communication during flight is often restricted or prohibited for safety reasons because electromagnetic interference (EMI) associated with the cellular communication signals transmitted by most mobile devices can interfere with electronic devices on an aircraft. However, because it is extremely easy to activate a cellular phone, whether intentionally or accidently, and extremely difficult for a crew member to detect, mobile phones can be a source of flight safety concern. Whether to identify the source of a particular cellular communication signal or to provide broadband wireless access to hundreds of closely spaced mobile devices, an understanding of the power distribution of electromagnetic signals within an enclosed, densely populated environment characterized by a large number of discontinuities, including chairs, overhead cabinets, etc., is needed. Subject matter included herein discloses a method and system for determining wireless signal power distribution within an enclosed environment such as the interior of an aircraft cabin. Embodiments may employ a non-sequential ray tracing technique to model signal power distribution within an aircraft cabin equipped with a leaky antenna array. Disclosed methods and systems may model wireless signal coverage inside the aircraft cabin, taking into consideration various parameters such as the dimensions and materials of the aircraft cabin itself as well as the chairs, overhead storage bins, and other structures within the cabin. Embodiments may also model the power distribution attributable to wireless communication signals transmitted by the mobile devices of one or more passengers to monitor electromagnetic interference or to model the signal power distribution for wireless signals transmitted from the leaky antenna array. Although disclosed subject matter emphasizes an aircraft cabin environment, disclosed methods and systems are applicable to other enclosed or specialized environments including, as non-limiting examples, tunnels, buildings, ships, and trains. Although descriptions of disclosed systems and methods may include references to WiFi signals or networks, WiFi is a non-limiting example of a wireless signal for which a power distribution within an enclosed environment such as an aircraft cabin is modeled. Accordingly, disclosed subject matter encompasses modeling of the power distributions for other wireless signals including, as a non-limiting example, cellular communication signals including, without limitation, global system for mobile communication (GSM) signals and the like. Currently, the use of cellular communication devices is frequently restricted or entirely prohibited on board an aircraft, primarily due to electromagnetic interference (EMI) concerns. However, developing technologies for suppressing or containing GSM-induced EMI may pave the way for in-flight cellular communication services and such services may employ a leaky feeder antenna to provide reliable connectivity. Thus, disclosed systems and methods for characterizing the signal power distribution associated with a particular antenna within a particular enclosed environment may be beneficially employed to implement and optimize onboard wireless network systems enabling airborne passengers to use their mobile devices to text or call people on the ground or otherwise communicate from within the enclosed environment. In this respect, disclosed systems and methods might be employed not only to characterize and optimize the desired GSM signal, but also to characterize and minimize any associated EMI signals. Disclosed methods include methods performed by a central processing unit (CPU) executing executable instructions stored in a suitable memory devices or storage device. Disclosed embodiments include embodiments incorporating methods and operations that improve performance with little or no loss of accuracy. Disclosed methods and systems quantify a power distribution for a wireless communication signal within a constrained environment that includes a leaky antenna array with a plurality of antenna slots. For each slot, operations referred to herein as surface selection operations are performed on each propagation ray of a ray tracing model that includes a plurality of propagation rays representing the radiation pattern of each antenna slot. In at least one embodiment, the surface selection operations performed for each propagation ray include screening ray-reflecting surfaces to identify collision-eligible surfaces and collision-ineligible surfaces. The collision-eligible surfaces are then processed to identify a collision surface for the ray. A reflected ray resulting from the propagation ray colliding with the collision surface is identified. If the reflected ray meets one or more criteria including, as a non-limiting example, sufficient power intensity, the surface selection operations are performed on the reflected ray to identify a collision surface for the reflected ray and to identify a subsequent reflected ray where each subsequent reflected has less lower power than its predecessor. This process continues until the power of a reflected ray is below a threshold value or until some other one or more criteria are not met. A signal power component is determined for each propagated and reflected ray where the signal power component may indicate a power and position of the ray as the ray intersects with a particular plane, such as a passenger level plane, within the enclosed environment. The accumulation of the signal distribution components from each the rays and reflected rays represents the signal power distribution. In accordance with disclosed subject matter, a system and method for quantifying a power distribution of a wireless communication signal within a constrained environment includes performing particular operations for each of one or more antenna slots of a leaky antenna disposed within a constrained environment. Performing the particular operations may include performing surface selection operations for each propagation ray in a ray tracing model of each antenna slot wherein the ray tracing model includes a plurality of propagation rays. The surface selection operations may include screening one or more ray-reflecting surfaces with respect the propagation ray to identify collision-ineligible surfaces and collision-eligible surfaces. A collision surface may then be determined from the collision-eligible surfaces, wherein the collision surface comprises a first ray-reflecting surface with which the propagation ray collides. A power distribution component corresponding to the propagation ray may be added to a cumulative power distribution. The power distribution component may indicate the position and power of the propagation ray as the ray intersects the passenger level plane or some other plane of interest. One or more parameters of a reflected ray resulting from the propagation ray colliding with the collision surface may then be calculated or otherwise determined. The reflected ray parameters may include, as non-limiting examples, a power parameter and directional parameter. To illustrate, the power of a reflected ray may be determined based, at least in part, on the power of the propagation ray, the propagation ray's angle of incidence with respect to the collision surface, and an attenuation factor assigned to the collision surface. If the parameters of the reflected ray satisfy each of one or more ray eligibility criteria, the reflected ray is treated as a new propagation ray and processed in the same manner as its predecessor, i.e., the propagation ray whose collision with the collision surface resulted in the reflected ray, to determine a power distribution component and a collision surface for the reflected ray. This process may be repeated until, eventually, a reflected ray has insufficient power or fails to satisfy one or more of the ray eligibility criteria. Screening a ray-reflecting surface may include identifying the ray-reflecting surface as either a collision-eligible surface or a collision-ineligible surface based on an original position of the propagation ray, a velocity vector or another indicator of a direction of motion of the propagation ray, and a surface displacement indicative of a position of the ray-reflecting surface relative to the original position of the propagation ray. Identifying a ray-reflecting surface as either a collision-eligible or a collision-ineligible surface may include comparing one or more coordinates of a velocity vector for the propagation ray to a corresponding one or more coordinates of the displacement vector for the ray-reflecting surface. In at least one embodiment, if sign consistency is detected between each of the one or more coordinates of the velocity vector and its corresponding one or more coordinates of the displacement vector, the ray-reflecting surface is identified as collision-eligible surface. In alternative embodiments, identifying ray-reflecting surfaces may include defining an eligible surfaces volume based on an initial position of the propagation ray and an enclosing volume wherein the enclosing volume is of a size sufficient to enclose the enclosed environment. The eligible surfaces volume may comprises a cuboid wherein a diagonal of the cuboid extends from the initial position of the propagation ray to an intersection point, wherein the intersection point is the point at which the propagation ray intersects the enclosing volume. Identifying the collision surface may include identifying the collision surface using a target function that determines a target function value indicative of a displacement between a propagation ray and a ray-reflecting surface. The target function may evaluate to zero when displacement between the propagation ray and the ray-reflecting surface is zero and the target function value may increase monotonically with increasing displacement. In an exemplary embodiment, a ray-reflecting surface corresponds to a triangle ABC defined by points A, B, and C, the position of the propagation ray comprises a point O, and the target function receives A, B, C, and 0 as inputs. In at least one embodiment, the target function evaluates to (S1+S2+S3)−S0 wherein S0 represents an area of triangle ABC, S1 represents an area of a triangle OAB defined by points O, A, and B, S2 represents an area of a triangle OBC defined by points O, B, and C, and S3 represents an area of a triangle OCA defined by points O, C, and A. Exemplary operations for identifying the collision surface may include calculating initial slopes of target function plots for each collision-eligible surface, where each target function plot comprises a plot of target function values versus propagation ray positions. Ray-reflecting surfaces associated with positive value initial slopes may be identified as collision-ineligible surfaces and discarded from further processing. For each collision-eligible surface remaining after said identifying, each target function plot may be extrapolated in accordance with its initial slope to identify a projected distance value for each collision-eligible surface. The collision-eligible surfaces may be ordered in accordance with the projected distance values, e.g., surface associated with lowest projected distance value is processed first or otherwise prioritized. Processing a collision-eligible surface may include calculating a minimum target function value for the collision-eligible surface and, responsive to detecting a minimum target function value greater than zero, identifying the surface as a collision-ineligible surface and discarding the surface from further consideration with respect to the current propagation ray. Responsive to detecting a minimum target function value of zero, the ray-reflecting surface may be identified as the collision surface for the corresponding propagation ray. Drawings are not to scale unless stated so. Embodiments of methods, systems, and/or articles of manufacture disclosed herein are described with reference to the following figures, in which like reference numerals indicate like elements unless indicated otherwise and in which a hyphenated form of reference numeral indicates an instance of the corresponding element, which may also be referenced generically or collectively with an un-hyphenated form of the reference numeral. e.g., “ . . . a first widget 11-1 and a second widget 11-1 . . . wherein each widget 11 includes . . . and wherein widgets 11 further include . . . .” FIG. 1 illustrates a side view of an aircraft cabin including a leaky antenna array; FIG. 2 illustrates a top view of the aircraft cabin of FIG. 1; FIG. 3 illustrates a section of a leaky antenna including a leaky antenna slot; FIG. 4 illustrates a far field radiation pattern associated with the leaky antenna of FIG. 3; FIG. 5 illustrates a ray tracing model of the radiation pattern of FIG. 4; FIG. 6 illustrates a flow diagram of a ray tracing method for modeling the power distribution of a wireless signal; FIG. 7 is a graphical representation of a propagation ray propagating towards a triangle ABC, which represents a portion of a ray-reflecting surface; FIG. 8 is a graphical representation of the propagation ray of FIG. 7 as it collides with the ray-reflecting surface; FIG. 9 illustrates a flow diagram of method for identifying a collision surface; FIG. 10 illustrates target function values plotted for each of a small number of. collision-eligible ray-reflecting surfaces; FIG. 11 illustrates fully-enumerated target function plots for the collision-eligible ray-reflecting surfaces of FIG. 10; FIG. 12 illustrates a first ray-filtering option in which all surfaces are treated as collision-eligible surfaces; FIG. 13 illustrates a second ray-filtering option in which some surfaces are filtered; FIG. 14 illustrates a third ray-filtering option in which more surfaces are filtered than in FIG. 13; FIG. 15 illustrates a fourth ray-filtering option, in which more surfaces are filtered than in FIG. 14; FIG. 16 illustrates a flow diagram of a method for implementing the fourth ray-filtering option embodiment illustrated in FIG. 15; and FIG. 17 illustrates elements of a general purpose computer programmed to perform disclosed operations. The figures referenced above and the written description of specific structures and functions below are not presented to limit the scope of what the Applicant has invented or the scope of the appended claims. Rather, the figures and written description are provided to teach any person skilled in the art to make and use the inventions for which patent protection is sought. Those skilled in the art will appreciate that not all features of a commercial embodiment of the inventions are described or shown for the sake of clarity and understanding. Persons of skill in this art will also appreciate that the development of an actual commercial embodiment incorporating aspects of the present disclosure will require numerous implementation-specific decisions to achieve the developer's ultimate goal for the commercial embodiment. Such implementation-specific decisions may include, and likely are not limited to, compliance with system-related, business-related, government-related and other constraints, which may vary by specific implementation location and vary from time to time. While a developer's efforts might be complex and time-consuming in an absolute sense, such efforts would be, nevertheless, a routine undertaking for those of ordinary skill in this art having benefit of this disclosure. It must be understood that the inventions disclosed and taught herein are susceptible to numerous and various modifications and alternative forms. The use of a singular term, such as, but not limited to, “a,” is not intended as limiting of the number of items. Further, the various methods and embodiments of the system can be included in combination with each other to produce variations of the disclosed methods and embodiments. Discussion of singular elements can include plural elements and vice-versa. References to at least one item or to one or more items may refer to one item or to multiple items. Also, various aspects of the embodiments could be used in conjunction with each other to accomplish any disclosed objectives, advantages, or benefits. Unless the context requires otherwise, the term “comprise” or variations such as “comprises” or “comprising,” should be understood to imply the inclusion of at least the stated element or step or group of elements or steps or equivalents thereof, and not the exclusion of a greater numerical quantity or any other element or step or group of elements or steps or equivalents thereof. The device or system may be used in a number of directions and orientations. The order of steps can occur in a variety of sequences unless otherwise specifically limited. The various steps described herein can be combined with other steps, interlineated with the stated steps, and/or split into multiple steps. Similarly, elements have been described functionally and can be embodied as separate components or can be combined into components having multiple functions. FIG. 1 is a side view and FIG. 2 is a top view of a leaky antenna array 101 deployed within an aircraft cabin 100. The leaky antenna array 101 illustrated in FIG. 1 and FIG. 2 is disposed substantially along or within a substantially horizontal plane disposed above a passenger level elevation 106. The vertical displacement 108 between the elevation of leaky attention array 101 and the passenger level elevation 106 may be, as one example, 1.85 meters. In other embodiments, vertical displacement 108 may be greater than or less than this displacement. The passenger level elevation 106 may represent the height or elevation above a base elevation or floor 104 at which a mobile device of a passenger is most likely disposed when the passenger is seated. By way of a non-limiting example, the passenger level elevation 106 may lie within a range of elevations between a first elevation corresponding to the elevation of the seating surface of a passenger seat and a second elevation corresponding to an elevation of an upper end of a seat back that defines an operational regime for a typical passenger or other user of wireless signals. The leaky antenna array 101 illustrated in FIG. 2 includes leaky antenna section 102 and leaky antenna section 103, wherein each leaky antenna section 102 includes one or more segments of varying lengths. As illustrated in FIG. 2, leaky antenna section 102-1 is disposed in a first section 107-1 of aircraft cabin 100, leaky antenna section 103-1 is disposed in second section 107-2 of aircraft cabin 100, leaky antenna section 102-2 is disposed in third section 107-3 of aircraft cabin 100, and leaky antenna section 103-2 is disposed in fourth section 107-4, where sections 107 of aircraft cabin 100 may be defined by walls and/or other structures. Leaky antenna array 101, also sometimes referred to as a leaky feeder or leaky feeder antenna, is a communication system device suitable for use within enclosed environments including tunnels, mines, aircraft, and the like. A leaky antenna may include a coaxial cable in which slots or slots have been incorporated into the outer conductor along the length of the cable. The slots allow electromagnetic signals to leak into and out of the cable. Line amplifiers may be employed at regular intervals within the cable to maintain signals at functional levels. The leaky antenna array 101 illustrated in FIG. 2 includes a first leaky antenna 102 and a second leaky antenna 103. A first section 102-1 of leaky antenna 102 is disposed in a right rearward section 107-1 of aircraft cabin 100, a second section 102-2 of leaky antenna 102 is disposed in a right forward section 107-3 of aircraft cabin 100, a first section 103-1 of leaky antenna 103 is disposed in a left rearward forward section 107-3 of leaky antenna array 101, and a second section 103-2 of leaky antenna 103 is disposed in a left forward section 107-4 of aircraft cabin 100. Although FIG. 2 illustrates a leaky antenna array 101 that includes two leaky antennas (102, 103), each of which includes two or more straight line segments, other embodiments may include more or fewer leaky antennas and each leaky antenna may include more or fewer straight line segments. In still other embodiments, the leaky antenna array 101 may include a leaky antenna with one or more curved sections (not depicted in FIG. 1 or FIG. 2). FIG. 3 illustrates an exemplary section of a leaky antenna 110 suitable for use as a leaky antenna section 102 in the leaky antenna array 101 illustrated in FIG. 1 and FIG. 2. The leaky antenna 110 illustrated in FIG. 3 comprises a co-axial cable including co-centric conductors, each of which is comprised of an electrically conductive element, compound, or material. The co-centric conductors of the illustrated leaky antenna 110 include an inner conductor 111 and an outer conductor 112. Outer conductor 112 defines or includes a leaky antenna slot 114 that permits electromagnetic signals to enter and exit leaky antenna 110. Although FIG. 3 illustrates a short span of leaky antenna 110 that includes just a single leaky antenna slot 114, leaky antenna slots 114 may be disposed at various positions along leaky antenna 110. The leaky antenna 110 may be treated, in at least some embodiments, as an ideal or near-ideal Lambert surface for purposes of modeling its characteristic radiation pattern. The power or intensity of radiation from an ideal Lambert source is directly proportional to the cosine of the angle between the direction of the outgoing light and the surface normal. Treating the leaky antenna 110 of FIG. 3 as a Lambert source is reasonable because the electromagnetic waves originate predominantly from one side of the leaky antenna 110 in the configuration of leaky antenna array 101 illustrated in FIG. 1 and FIG. 2. Nevertheless, in at least some embodiments, far field electromagnetic behavior can be used to approximate the radiation pattern associated with leaky antenna 110. The power of far field radiation varies inversely with the square of the distance from the antenna or other object of interest. Thus, for example, if the far field power is P at a distance of 1 unit from an antenna or other object of interest the power at a distance of 2 units is ¼×P. FIG. 4 illustrates a graphical representation of an exemplary far field intensity pattern 120 corresponding to at least one embodiment of the leaky antenna 110 illustrated in FIG. 4. Disclosed embodiments may use ray tracing to determine wireless signal power distribution in an enclosed environment such as the environment within aircraft cabin 100 (FIG. 1). As its name suggests, ray tracing models electromagnetic wave propagation as a plurality of propagation rays where each propagation ray is perpendicular to the wave front of propagation and points in the direction of energy flow. Ray tracing models are most accurate when the object-to-wavelength ratio, i.e., a ratio of the smallest dimension of ray-reflecting objects located within the applicable environment relative to the wavelength of the applicable wireless signal is an order of magnitude or more. Using GSM communication as an example, the carrier signal frequency of 1.88 GHz corresponds to a wavelength of approximately 0.1 m, which is roughly the diameter of a golf hole. For this signal, ray tracing may be used with a high degree of accuracy for environments, such as an aircraft cabin, in which all or most of the physical dimensions of interest are 1 meter or greater. Ray tracing algorithms include sequential and non-sequential algorithms. A sequential ray tracing algorithm traces rays through a pre-defined sequence of surfaces while travelling from the object surface to the image surface. Sequential ray-tracing may yield insight into curvatures, ideal glass types, and number of lens elements required in an optical system. However, for a complex system such as the system represented by the surfaces within an aircraft cabin, analysis of the wireless signals inside an airplane, the order in which rays scatter and interact with objects depends on the relative direction and location of the ray. Accordingly, a non-sequential ray tracing algorithm may be preferred to determine wireless signal power distribution within an aircraft cabin or within other geometrically large and complex environments. FIG. 5 illustrates an exemplary ray tracing model 130, including a plurality of propagation rays 131, corresponding to and generated based on the far field intensity pattern 120 illustrated in FIG. 4. In at least one embodiment, ray tracing model 130 includes N propagation rays 131 wherein the direction of each propagation array 131 is chosen by random selection. Other embodiments, may employ a different technique for converting a radiation pattern to a ray tracing model. The value of N, the number of propagation rays 131, necessary to accurately represent the corresponding radiation pattern and accurately predict the resulting signal power distribution varies depending upon the application. Generally, the value of N should be the smallest value that produces accurate results. This value of N, which may be referred to herein as Nmin, may be determined empirically by observing changes in predicted power distributions for different values of N. In at least one embodiment, Nmin may be defined as the least value of N for which a 10% increase in N results in less than 1% change in predicted power distribution. Other embodiments may employ more relaxed or more stringent conditions for convergence. Ray tracing model 130 may be represented as a data structure that includes an entry associated with each propagation ray 131. Each entry in such a data structure may include sufficient fields to fully describe each propagation ray 131. These fields may include, as non-limiting examples, three or more fields uniquely defining an orientation for each propagation ray 131, one or more fields for indicating a magnitude of each propagation ray 131. In at least some embodiments, the data structure may be simplified by an assumption that all propagation rays 131 in ray tracing model 10 originate from the same point of origin, in which case the orientation and magnitude may be conveyed by a single set of three parameters corresponding to three dimensions, whether specified using a Cartesian coordinate system, a polar coordinate system, or another suitable system. In at least some embodiments, the data structure corresponding to the ray tracing model 130 illustrated in FIG. 5 is provided from a manufacturer or distributor of the leaky antenna 110. In other embodiments, the data structure for ray tracing model 130 may be derived from the far field intensity pattern 120 illustrated in FIG. 4. The accuracy of alternative models of electromagnetic propagation, including the finite element method (FEM) or finite-difference time-domain (FDTD) method in which antenna signals are treated as electromagnetic waves, depends on the mesh size being much smaller than the applicable wavelength. Such methods often require a comparatively large amount of computer memory and computational time to compute, which make them unrealistic to model wireless signals in an airplane. In contrast, ray tracing models require much less computer resources and achieves reliable results in a relatively short period of time. Rays from different slots along leaky antenna array 101 undergo reflection and refraction as they impinge on surfaces of the cabin and structures within the aircraft cabin. In at least one embodiment, refracted rays are ignored without substantial loss of accuracy because the applicable surfaces, i.e., the surfaces of the aircraft shell and aircraft furniture have high attenuation and very low refraction. In at least one embodiment, rays are maintained and propagated until either of two ray termination criteria has been satisfied. The two ray termination criteria may include a propagation length criteria and a power level criteria. The propagation length criteria may be configured to terminate a ray after the ray and its ancestors have an accumulated propagation distance exceeding a particular propagation distance, e.g., 60 M or longer. The power level criteria may terminate any reflected ray with a power intensity that is 10% or less of the initial intensity of the original ray. The final result is a data structure that maps or otherwise indicates power levels at different positions within the passenger level elevation 106 inside aircraft cabin 100, which represents an estimate of the wireless communication signal power available to passengers for their personal mobile devices. FIG. 6 illustrates a flow diagram of an exemplary method 150 for determining, modeling, or estimating a signal power distribution (SPD) for a communication signal within an enclosed environment, such as the aircraft cabin 100 illustrated in FIG. 1, that includes a leaky antenna array such as the leaky antenna array 101 illustrated in FIG. 1. The method 150 illustrated in FIG. 6 includes flow diagram elements corresponding to various operations and such operations may be performed by a general purpose computer programmed with a computer program comprising a plurality of computer executable programming instructions. The general purpose computer may include a CPU or another suitable type of general purpose or application specific processor and one or more computer storage devices accessible to the CPU. The computer storage devices may include a volatile or non-volatile storage device or memory device in which all or some of the programming instructions may be stored. A general purpose computer suitable for performing method 150 is illustrated in FIG. 18 and described in the corresponding text. Generally, the method 150 illustrated in FIG. 6 performs operations that may include collision surface selection operations and reflected-ray operations for each propagation ray in an applicable ray tracing model and for each slot in a leaky antenna array. The collision surface selection operations may determine the first ray-reflecting surface that a propagation ray will collide with as well as the point and angle of the collision. The reflected ray operations identify a reflected ray resulting from each ray-to-surface collision and determine whether the intensity of the reflected ray is sufficient to include in the SPD determination. One or more configurations settings associated with method 150 may include one or more attenuation parameters that determine, in conjunction with one or more intensity criteria, whether a reflected ray is to be further processed or discarded. Eventually, the intensity of a reflected ray will be insufficient to satisfy the applicable intensity criteria and the ray reflected will be discarded before loading the next ray from the ray tracing model. A power value is determined for each propagation ray and for each reflected ray of sufficient intensity. The individual power values are summed or otherwise grouped, combined, or accumulated to produce the SPD. In some embodiments, each power level value represents a power level at a particular elevation within the enclosed environment. As a non-limiting example, at least one embodiment produces a passenger level SPD, i.e., an SPD based on the power value calculated for each ray as it passes through the passenger level 106 (FIG. 1). In some embodiments, method 150 is simplified by constraining an elevation parameter to a single value or to a comparatively small number of values representing some fraction of the total elevation of the aircraft cabin 100. As suggested previously, for example, the SPD at passenger level elevation 106 may be thought of as the most useful SPD within the aircraft cabin 100 illustrated in FIG. 1. Accordingly, one or more embodiments of method 150 may generate a planar SPD representing the power intensity levels at a plurality of points, each of which lies within a plane disposed at the passenger level elevation 106 illustrated in FIG. 1. Other embodiments may generate SPDs covering the entire interior aircraft cabin 100 while still other embodiments may generate intermediate SPDs covering less than the entire aircraft cabin 100 but more than the SPD at a single elevation. The flow diagram blocks of the method 150 illustrated in FIG. 6, correspond to various operations described herein and include a data retrieval block (block 152) corresponding to operations for retrieving certain data described below, an initialization block (block 154) corresponding to operations for configuring the system performing method 150, a slot selection block (block 156) corresponding to operations for selecting a leaky antenna slot, a ray processing block (block 161) corresponding to operations for processing propagation rays associated with the leaky antenna slot as described below, and a remaining slots block (block 176) corresponding to an operation for determining whether any leaky antenna slots remain. The ray processing block 161 illustrated in FIG. 6 may be performed for each propagation ray in a ray tracing model of the applicable leaky antenna slot. The illustrated ray processing block 161 includes a ray launching block (block 160) corresponding to operations for selecting one of the propagation rays of the applicable ray tracing model, a surface filtering block (block 162) corresponding to operations for identifying surfaces that are collision-ineligible with respect to the propagation ray being processed, a surface identification block (block 164) for identifying the current propagation ray's collision surface, a power and angle determination block (block 170) for determining a power and angle of a reflected ray resulting the propagation ray's collision with the collision surface, a reflected ray criteria block (block 172) for distinguishing between reflected rays that should be further processed and reflected rays that require no further processing, and a remaining rays block (block 174) for determining whether each propagation ray in the ray tracing model have been processed. The method 150 illustrated in FIG. 6 loads, retrieves, obtains, or otherwise accesses (block 152) one or more data structures. In at least one embodiment, the first data structure is an environment geometry file corresponding to and indicative of the physical geometry of the applicable environment. In the case of an enclosed environment corresponding to the aircraft cabin 100 of FIG. 1, the environment geometry file is indicative of the physical geometry of aircraft cabin 100. A second data structure that may be input as part of block 152 illustrated in FIG. 6 is a ray source file, which is a data structure corresponding to the ray tracing model 130 illustrated in FIG. 5. A third data structure input, which may be referred to herein as a material data structure, is indicative of the location, size, and material or composition of the physical structures within the interior of the applicable environment. After loading the applicable data structures in block 152, the method 150 illustrated in FIG. 6 initializes (block 154) one or more system parameters pertaining to the particular computing system performing method 150. A leaky antenna slot may then be selected (block 156) from a plurality of leaky antenna slots defined for a particular leaky antenna array 101. Each leaky antenna slot may be defined by its latitudinal and longitudinal coordinates as seen from the top view of FIG. 2, as well as its height or elevation within aircraft cabin 100. A leaky antenna data structure that includes the position information for each leaky antenna slot may be loaded as a fourth input in block 152. Once a leaky antenna slot is identified, the method 150 illustrated in FIG. 6 executes a ray processing loop 161 for each propagation ray 131 (FIG. 5) in ray tracing model 130 (FIG. 4). The ray processing loop 161 illustrated in FIG. 6 includes operations 160, 162, 164, 170, 172, and 174 as described herein. The environment geometry file and the material file may include data defining hundreds or thousands of surfaces within aircraft cabin 100. The block 162 illustrated in FIG. 6 comprises a surface filtering operation to reduce the number of surfaces used in the determination of a collision surface, i.e., the first surface that a propagation ray collides with. Aspects of particular operations encompassed by surface filtering block 162 are discussed in more detail with respect to FIG. 12 through FIG. 16. After filtering at least some surfaces in surface filtering block 162, the method 150 illustrated in FIG. 6 performs a surface selection block 164 to identify the surface with which the propagation ray under consideration first collides. This surface may be referred to herein as the first collision surface or, more simply, the collision surface associated with the propagation ray. Operations for identifying each propagation ray's collision surface are described in more detail below with respect to FIG. 9. Once the collision surface for a ray has been identified, an angle and power may be determined (blocks 170) for the reflected ray produced by the collision of the original ray and the collision surface. The direction of the reflected ray can be determined by reflection law, and the reflection coefficient can be calculated according to Fresnel's equation. One or more attenuation factors may be stipulated and used to determine an intensity associated with the reflected ray. The method 150 illustrated in FIG. 6 may employ one or more intensity criteria and/or minimum intensity thresholds. If the intensity of a reflected ray is less than the minimum intensity threshold, as determined in block 172, the reflected ray is effectively discarded and method 150 as illustrated in FIG. 6 proceeds to block 174. However, if the intensity of the reflected ray is sufficient to satisfy any one or more intensity thresholds or criteria, the method 150 illustrated in FIG. 6 performs operations 162, 164, and 170 for the reflected ray. When the intensity of a reflected ray fails to satisfy any intensity criteria, method 150 determines (block 174) whether every propagation ray in the ray tracing model has been processed for the current antenna slot. If any propagation rays associated with the present antenna slot have not been processed, method 150 performs operations 160 through 172 for the next propagation ray. If every propagation ray has been processed for the current antenna slot, processing of the current antenna slot is complete and method 150 proceeds to block 176 to determine whether any other antenna slots remain. If method 150 determines in block 176 that all antenna slots have been processed, method 150 terminates. Otherwise, method 150 performs operations 156 through 174 for the next antenna slot. As stated above, surface selection block 164 finds the collision surface for a particular ray, i.e., the first surface with which a particular ray collides as the ray propagates forward over time. In at least one embodiment, identification of the collision surface associated with a particular propagation ray is facilitated by employing a target function F, as described herein, that generates a value indicative of the displacement between a propagation ray and a surface. Referring to FIG. 7 and FIG. 8, a propagation ray 131 and an exemplary surface 201 are depicted at two points in time to illustrate the target function F. Each surface in the environment geometry file and the material file corresponds to a triangle defined by three points in space. An exemplary surface 201, most clearly shown in FIG. 7, corresponds to a triangle of area S0 defined by points A, B, and C and consisting of line segments L1, between points A and B, L2 between points B and C, and L3, between points C and A. In FIG. 7, the origin point O of propagation ray 131 is displaced from and propagating towards surface 201 while, in FIG. 8, origin point O of propagation ray 131 has reached and collided with surface 201. In FIG. 7, the origin point O of propagation ray 131, forms a first triangular surface 202-1 with points A and B, a second triangular surface 202-2, with points B and C, and a third triangular surface 202-3, with points A and C. In at least one embodiment, the target function F(A,B,C,O) is defined as: F(A,B,C,O)=(S1+S2+S3)−S0 where S1 is the area of triangle OAB, S2 is the area of triangle OBC, S3 is the area of triangle OCA, and S0 is the area of triangle ABC. FIG. 8 suggests that the target function F(A,B,C,O) evaluates to zero when 0 lies in the surface 201 corresponding to triangle ABC, i.e., S1+S2+S3=S0 if and only if the distance between point O and surface 201 is zero. In terms of the target function F, the collision surface for a propagation ray is the first surface that produces a target function value of zero as the ray propagates. Accordingly, one embodiment of surface selection block 164 (FIG. 6) finds the first surface whose target function F evaluates to zero as the propagation ray 131 propagates forward. FIG. 9 illustrates a flow diagram of an exemplary surface selection block 164 for determining the collision surface of a propagation ray 131 (FIG. 5) or the collision surface of a reflected ray. The flow diagram blocks illustrated in FIG. 9, correspond to various operations described herein and include an initial slope block (block 301) for determining an initial slope of a target function plot for a collision-eligible surface, a filtering block (block 302) for discarding certain surfaces based on their initial slopes, an estimation block (block 304) for estimating a collision distance for a particular surface, a prioritizing block (block 306) corresponding to operations for sorting or otherwise processing collision-eligible surfaces, a simulation loop block (block 307) for determining a target function minimum for the current surface, and an identification block (block 320) for identifying the collision surface for the present propagation ray. The simulation loop block 307 illustrated in FIG. 9 includes a selection block (block 310) for selecting the collision-eligible surface with the shortest estimate collision distance, a minimum target function value block (block 312) for calculating the minimum target function value of the current propagation ray with respect to the current collision-eligible surface, a decision block (block 314) for determining whether the minimum target function value is zero (0), and a discard block (block 318) for discarding surfaces that yield minimum target function values greater than 0. The surface selection block 164 illustrated in FIG. 9 begins by calculating (block 301) initial slopes of target function plots associated with each collision-eligible surface, i.e., each surface that remains after the prescreening of surfaces performed in surface filtering block 162 (FIG. 6). FIG. 10 illustrates target function plots 351 for each of five collision-eligible surfaces, while in actual practice, the number of collision-eligible surfaces is likely to be significantly larger. Each target function plot 351 graphs the target function value F(A,B,C,O) of a propagation ray vs a distance parameter D representing the distance the propagation ray has traveled from its original position. An initial slope of each target function plot 351 is determined by calculating the target function difference, which corresponds to the difference between the propagation ray's initial target function value 353, i.e., the propagation ray's target function value at D=0, and the propagation ray's delta target function value 355, i.e., the propagation ray's target function value at D=dx, where dx is a small value. In one exemplary embodiment, a value equal to 10% of the applicable wavelength is used for dx. Other embodiments may, however, use larger or smaller values. The slope of the line connecting each initial target function value 353 and its corresponding delta target function value 355 represents the initial target function slope. Returning to FIG. 9, each collision-eligible surface whose target function plot exhibits a positive initial slope is discarded (block 302) because a positive slope indicates that the corresponding propagation ray is moving away from the applicable surface. Referring to the exemplary set of target function plots 351 in FIG. 10, the surface associated with target function plot 351-1 can be eliminated as a collision surface candidate because the initial slope of target function plot 351-1 is positive, i.e., the distance between the ray and the surface associated with target function plot 351-1 increases as the ray propagated away from its original position. The surface selection block 164 illustrated in FIG. 9 includes calculating (block 304) a distance, referred to herein as the collision distance estimate DO, where DO represents the value of D at which a linear extrapolation of the target function plot 351 intersects the D axis of plot 350, i.e., the distance at which the target function value reaches zero along the linear extrapolation of the line between the initial target function value 353 and the corresponding delta target function value 355. The collision surface candidates, i.e., all collision-eligible surfaces remaining after discarding surfaces in block 302, are then prioritized or sorted (block 306) according to their collision distance estimates DO. The surface selection block 164 illustrated in FIG. 9 then begins to execute a loop 307 in which the collision surface candidate having the lowest collision distance estimate DO is selected (block 310) for ray propagation simulation. Ray propagation simulation for the selected surface is then performed by calculating a target function value for incremental positions of the applicable ray to identify (block 312) a minimum target function value, Fmin, for the selected surface. Because the target function value decreases monotonically as a propagation ray approaches a particular surface and increases monotonically once the propagation ray collides with or passes by the particular surface, Fmin is the last target function value calculated before an increase in target function value is detected. Thus, if a sequence of incremental distances for a propagation ray is denoted as D(1), D(2), . . . , D(n−1), D(n), . . . , then: Fmin=F(A,B,C,D(x)) where F(A,B,C,D(x−1))>F(A,B,C,D(x))<F(A,B,C,D(x+1)) Once Fmin is identified, the surface selection block 164 illustrated in FIG. 9 determines (block 314) whether Fmin equals zero is made. If the Fmin for a selected surface is zero, the selected surface is identified as the collision surface (block 320). Conversely, if Fmin is positive, the propagating ray did not collide with the selected surface and the selected surface may be discarded (block 318) as a collision surface candidate. FIG. 11 illustrates fully enumerated target function plots 361-1 through 361-5. Each fully enumerated target function plot 361 corresponds to one of five collision-eligible surfaces and indicates the applicable surface's target function value for each incremental distance of the applicable ray. Comparing FIG. 10 and FIG. 11, it can be seen that the surface identified as the most likely collision surface based on the initial target function slopes, i.e., the surface associated with target function plot 351-5 in FIG. 10, was not the actual collision surface. Instead, as illustrated in FIG. 11, the surface associated with fully enumerated target function plot 361-4 is identified as the collision surface. Specifically, although the surface associated with fully enumerated target function plot 361-5 was the first surface evaluated as the collision surface based on the initial slope of target function plot 351-5 (FIG. 10) and the estimated collision distance DO (FIG. 10), the propagation ray passed by, rather than collided with, this surface, as evidenced by its positive value of Fmin 367-5. The surface associated with fully enumerated target function plot 361-4 was subsequent identified as the actual collision surface when the Fmin value (367-4) for target function plot 361-4 was found to be zero. FIG. 12 through FIG. 15 illustrate four different embodiments of surface filtering block 162 (FIG. 6) for reducing the number of collision-eligible surfaces prior to performing surface selection block 164 (FIG. 6 and FIG. 9). Although each embodiment is illustrated in two-dimensional space for the sake of clarity and simplicity, disclosed methods may filter collision-ineligible surfaces in three dimensions. In addition, although FIG. 12 through FIG. 15 illustrate each embodiment in graphical form using Cartesian coordinates, other embodiments may employ different coordinate systems. In FIG. 12 through FIG. 15, (x0, y0, z0) is the original position of a propagation ray. FIG. 12 illustrates an example in which no filtering of surfaces 201 is performed and all surfaces 201 are considered collision-eligible surfaces that must be processed via surface selection block 164 (FIG. 6, FIG. 9). FIG. 13 and FIG. 14 illustrate surface filtering examples in which a surface 201 is identified as either a collision-eligible surface or a collision-ineligible surface with respect to the propagation ray based on the propagation ray's velocity vector 371 and a displacement vector (not illustrated explicitly), where the displacement vector indicates the position of the applicable surface 201 relative to the propagation ray's initial position (x0, y0, z0). In at least one embodiment, a surface 201 is identified as a collision-eligible surface if the coordinates of the displacement vector and the coordinates of velocity vector 371 have the same sign. If, as an example, the velocity vector 371 for a particular propagation ray has a positive y-coordinate value, any surface 201 positioned wherein the displacement vector has a negative y-coordinate value is a collision-ineligible surface because the propagation ray is moving away from the surface in the y-direction. This example is illustrated in FIG. 13, wherein the propagation ray has an initial position (x0, y0, z0) and a velocity vector 371 with a positive y-coordinate value. The positive y-coordinate value of velocity vector 371 renders all surfaces positioned in a “negative y direction” with respect to initial position (x0, y0, z0), collision-ineligible. Collision-ineligible surfaces 373 are illustrated in FIG. 13 with dashed lines. The filtering of surfaces described in the preceding example can be expanded to filter surfaces based on any two of the three coordinates or based on all three coordinates. FIG. 14 illustrates an example of y-z filtering, i.e., filtering based on a combination of the y-coordinate and the z-coordinate. The velocity vector 371 has a positive value y-coordinate and a positive value z-coordinate. Therefore, any surface positioned wherein its displacement vector has a negative value y-coordinate or a negative value z-coordinate is collision-ineligible. Collision ineligible surfaces 375 are illustrated in FIG. 14 with dashed lines. The coordinates of the three points defining each surface have maximum and minimum values in the x, y, and z planes and the filtering illustrated in FIG. 13 and FIG. 14 may be based on displacement vectors that reflect these maximum and/or minimum values, depending upon the value of the velocity vector coordinates. Using the example of FIG. 13 to illustrate, the y-coordinate is the coordinate of interest for filtering purposes and the velocity vector 371 has a positive value y-coordinate. To filter only those surfaces that have zero probability of being the collision surface, the displacement vector may be defined in accordance with the surface's maximum y-coordinate value (ymax). If the ymax displacement vector has a negative value y-coordinate, then the entire surface is negatively positioned in the y-direction with respect to the propagation ray's initial position (x0, y0, z0) and, because the propagation ray is moving in a positive y direction, the propagation ray cannot collide with the surface and the surface can therefore be designated as collision-ineligible. By analogy, displacement vectors defined based on the maximum x-coordinate value, xmax, the maximum y-coordinate value, ymax, and the maximum z-coordinate value, zmax, may be used in the filtering of FIG. 14. FIG. 15 illustrates surface filtering in accordance with a filtering method 400 depicted in the flow diagram of FIG. 16. The flow diagram blocks illustrated in FIG. 16, correspond to various operations described herein and include a loading block (block 401) for loading all collision eligible surfaces, a construction block (block 402) for constructing a first virtual box, a block (block 404) for determining a point at which a vector associated with the propagation ray intersects the first virtual block, a construction block (block 406) for constructing a second virtual block, and a block (block 408) for identifying surfaces within the second virtual block as collision-eligible surfaces. The filtering method 400 illustrated in FIG. 16 includes loading all surfaces (block 401) and constructing (block 402) a first virtual box 381 of a size that is just sufficient to enclose all surfaces or slightly bigger. In at least one embodiment, first virtual box 381 is a parallelepiped defined by the xmin, xmax, ymin, ymax, zmin, and zmax planes where xmin is the minimum x-coordinate value of all surfaces, xmax is the maximum x-coordinate value of all surfaces, and so forth. The propagation ray's velocity vector 371 is then linearly extrapolated, starting from the propagation ray's initial position at (x0, y0, z0), to calculate or otherwise determine (block 404) an intersection point (x1, y1, z1) where velocity vector 371 intersects first virtual box 381. A second virtual box 383 is then constructed (block 406) using the propagation ray's original position (x0, y0, z0) and the intersection point (x1, y1, z1) as opposing corners of the second virtual box. Surfaces 201 may then be identified (block 408) as collision-eligible or collision-ineligible based on their respective positions relative to second virtual box 383. Surfaces 201 that are entirely exterior to second virtual box 383 may be identified as collision-ineligible surfaces. Table 1 below indicates exemplary times for processing a leaky antenna array using each of the four surface-filtering options illustrated in FIG. 12 through FIG. 15, where Option 1 refers to the surface-filtering embodiment of FIG. 12, Option 2 refers to the surface-filtering embodiment of FIG. 13, Option 3 refers to the surface-filtering embodiment of FIG. 14, and Option 4 refers to the surface-filtering embodiment of FIG. 15. A ray tracing model that included 12,000 propagation rays per antenna slot was used for each of the four filter surfacing options. While all four options identified the same set of collision surfaces and produced substantially the same signal power distributions, the time required to process the antenna array differed significantly among the four options. For the case of 6720 surfaces, Option 2 required less than 50% of the time required to process the antenna array via Option 1, while Option 3 required just 35% of the processing time required by Option 2, and Option 4 required just over 20% of the processing time required by Option 3. TABLE 1 No. of Surfaces Option 1 Option 2 Option 3 Option 4 6720 (includes furniture) 280 mins 120 mins 42 mins 9 mins 3210 (no furniture) 72 mins 48 mins 20 mins 6 mins FIG. 17 illustrates a computer or computer system suitable for performing the operations for determining a signal power distribution described herein. The computer system 450 illustrated in FIG. 17 includes a CPU 451 coupled to a flash storage device 452 to store, for example, basic I/O system (BIOS) code or the like. The CPU 451 is further illustrated coupled to memory 455. Memory 455 may include CPU-executable program instructions, that, when executed by CPU 451, cause system 450 to perform one or more of the operations disclosed herein including operations disclosed with respect to the flow diagrams of FIG. 6, FIG. 9, and FIG. 16. CPU 451 is further illustrated coupled to one or more I/O devices 460-1 and 460-2 through a chipset device identified as I/O Hub 457. I/O devices 460 may include, as examples, wireless and/or wireline network interface devices enabling system 450 to communicate with other systems via the Internet or one or more private networks. The invention has been described in the context of advantageous and other embodiments and not every embodiment of the invention has been described. Obvious modifications and alterations to the described embodiments are available to those of ordinary skill in the art. The disclosed and undisclosed embodiments are not intended to limit or restrict the scope or applicability of the invention conceived of by the Applicant, but rather, in conformity with the patent laws, Applicant intends to protect fully all such modifications and improvements that come within the scope or range of equivalents of the following claims. 1. A method of quantifying a power distribution for a wireless communication signal within a constrained environment, wherein the method comprises: performing first operations for each of one or more antenna slots of a leaky antenna disposed within a constrained environment, wherein the first operations include: performing surface selection operations for each propagation ray in a ray tracing model of each antenna slot, wherein the ray tracing model includes a plurality of propagation rays, wherein the surface selection operations include: screening one or more ray-reflecting surfaces with respect the propagation ray to identify collision-ineligible surfaces and collision-eligible surfaces; identifying a collision surface from the collision-eligible surfaces, wherein the collision surface comprises a first ray-reflecting surface with which the propagation ray collides; adding a power distribution component corresponding to the propagation ray to a power distribution data structure; calculating a reflected ray resulting from the propagation ray colliding with the collision surface; and responsive to determining that the reflected ray satisfies each of one or more ray eligibility conditions, performing the collision surface operations for the reflected ray. 2. The method of claim 1, wherein screening a ray-reflecting surface includes identifying the ray-reflecting surface as either a collision-eligible surface or a collision-ineligible surface based on: an original position of the propagation ray; a direction of motion of the propagation ray; and a surface displacement indicative of a position of the ray-reflecting surface relative to the original position of the propagation ray. 3. The method of claim 2, identifying a ray-reflecting surface as either a collision-eligible or a collision-ineligible surface includes comparing one or more coordinates of a velocity vector for the propagation ray to a corresponding one or more coordinates of the displacement vector for the ray-reflecting surface. responsive to detecting, based on said comparing, sign consistency between each of the one or more coordinates of the velocity vector and its corresponding one or more coordinates of the displacement vector, identifying the ray-reflecting surface as a collision-eligible surface. 5. The method of claim 1, wherein screening includes defining an eligible surfaces volume based on an initial position of the propagation ray and an enclosing volume wherein the enclosing volume is of a size sufficient to enclose the enclosed environment. 6. The method of claim 5, wherein the eligible surfaces volume comprises a cuboid and wherein a diagonal of the cuboid extends from the initial position of the propagation ray to an intersection point, wherein the intersection point comprises a point at an intersection of the propagation ray and the enclosing volume. 7. The method of claim 1, wherein identifying the collision surface comprises identifying the collision surface using a target function, wherein the target function determines a target function value indicative of a displacement between a position of the propagation ray and a ray-reflecting surface. 8. The method of claim 7, wherein the target function value is zero when displacement between the propagation ray and the ray-reflecting surface is zero and wherein the target function value increases monotonically with increasing displacement. 9. The method of claim 8, wherein: the ray-reflecting surface corresponds to a triangle ABC defined by points A, B, and C; the position of the propagation ray comprises a point O; and the target function evaluates to (S1+S2+S3)−S0 wherein: S0 represents an area of triangle ABC S1 represents an area of a triangle OAB defined by points O, A, and B; S2 represents an area of a triangle OBC defined by points O, B, and C; and S3 represents an area of a triangle OCA defined by points O, C, and A. 10. The method of claim 9, wherein identifying the collision surface includes: calculating initial slopes of target function plots for each collision-eligible surface, wherein each target function plot comprises a plot of target function values versus propagation ray positions; identifying ray-reflecting surfaces associated with positive value initial slopes as collision-ineligible surfaces; for each collision-eligible surface remaining after said identifying: extrapolating each target function plot in accordance with its initial slope to identify a projected distance value for each collision-eligible surface; ordering the collision-eligible surfaces in accordance with the projected distance values; processing the collision-eligible surfaces in accordance with the ordering, wherein processing a collision-eligible surface includes: calculating a minimum target function value for the collision-eligible surface; responsive to detecting a minimum target function value greater than zero, identifying the surface as a collision-ineligible surface; and responsive to detecting a minimum target function value of zero, identifying the surface as the collision surface. a central processing unit; a non-transitory computer readable memory including processor executable program instructions that, when executed cause the CPU to perform operations comprising: performing first operations for each of one or more leaky antenna slots disposed in a leaky antenna array disposed within a constrained environment, wherein the first operations include: performing first operations for each of one or more antenna slots of a leaky antenna disposed within a constrained environment, wherein the first operations include: performing surface selection operations for each propagation ray in a ray tracing model of each antenna slot, wherein the ray tracing model includes a plurality of propagation rays, wherein the surface selection operations include: screening one or more ray-reflecting surfaces with respect the propagation ray to identify collision-ineligible surfaces and collision-eligible surfaces; identifying a collision surface from the collision-eligible surfaces, wherein the collision surface comprises a first ray-reflecting surface with which the propagation ray collides; adding a power distribution component corresponding to the propagation ray to a cumulative power distribution; calculating a reflected ray resulting from the propagation ray colliding with the collision surface; and responsive to determining that the reflected ray satisfies each of one or more ray eligibility conditions, performing the collision surface operations for the reflected ray. 12. The system of claim 11, wherein screening a ray-reflecting surface includes identifying the ray-reflecting surface as either a collision-eligible surface or a collision-ineligible surface based on: 13. The system of claim 12, wherein the operations include: identifying a ray-reflecting surface as either a collision-eligible or a collision-ineligible surface includes comparing one or more coordinates of a velocity vector for the propagation ray to a corresponding one or more coordinates of the displacement vector for the ray-reflecting surface. 15. The system of claim 11, wherein screening includes defining an eligible surfaces volume based on an initial position of the propagation ray and an enclosing volume wherein the enclosing volume is of a size just sufficient to enclose the enclosed environment. 16. The system of claim 15, wherein the eligible surfaces volume comprises a cuboid and wherein a diagonal of the cuboid extends from the initial position of the propagation ray to an intersection point, wherein the intersection point comprises a point at an intersection of the propagation ray and the enclosing volume. 17. The system of claim 11, wherein identifying the collision surface comprises identifying the collision surface using a target function, wherein the target function determines a target function value indicative of a displacement between a position of the propagation ray and a ray-reflecting surface. 18. The system of claim 17, wherein the target function value is zero when displacement between the propagation ray and the ray-reflecting surface is zero and wherein the target function value increases monotonically with increasing displacement. 19. The system of claim 18, wherein: 20. The system of claim 19, wherein identifying the collision surface includes: Filed: Jun 6, 2018 Publication Date: Dec 12, 2019 Applicant: BAYLOR UNIVERSITY (Waco, TX) Inventors: Jonathan HU (Woodway, TX), Liang DONG (Woodway, TX), Yang LI (Waco, TX) International Classification: H04W 16/22 (20060101); H04B 17/391 (20060101);
cc/2020-05/en_middle_0016.json.gz/line4950
__label__wiki
0.558956
0.558956
GOVERNOR MACQUARIE’S CAMPAIGN DESK Home → History → GOVERNOR MACQUARIE’S CAMPAIGN DESK One of the most personal and evocative relics held by the Historic Houses Trust of New South Wales is a campaign desk once owned by Governor Lachlan Macquarie. Governor Lachlan Macquarie Lachlan Macquarie and his wife Elizabeth disembarked from HMS Dromedary at Sydney Cove on 31 December 1809. They were accompanied by some of their most cherished possessions, including the London made desk. It was possibly a betrothal gift from Elizabeth Campbell, who Macquarie married on 3 November 1807. Measuring 25cm x 51cm x 25.5cm the desk is made of mahogany, with corners and edges protected by decorative brass mounts. The lid carries a brass plaque engraved with Macquarie’s name, military regiment, and the year 1805. The interior is lined with cedar and fitted with a green baize writing slope and a concealed document compartment. There is also a pen tray, ink bottle, and a pair of detachable brass candlesticks. Closer image of the desk and its fittings. The open campaign desk Macquarie had originally used the desk while serving as a British army officer in India. However, it would also have proved invaluable during his inspection tours of Sydney’s outlying settlements, his journeys to Van Diemen’s Land, and his historic ‘royal progress’ across the Blue Mountains in 1815. Lachlan Macquarie left New South Wales in 1822, retiring to his estate on Scotland’s Isle of Mull. Naturally, the desk went with him, but in 2002 it was acquired by the Historic Houses Trust of New South Wales, with funds provided by the Macquarie Bank Foundation. Appropriately, its permanent home is in the Museum of Sydney, located on the site of the colony’s first Government House. The story of the desk and its return to Australia is intriguing. THE STORY OF THE PORTER FAMILY In the document compartment of the desk are two newspapers. The earliest is an issue of a publication called John Bull dated 18 July 1824, recording Macquarie’s death in London on 1 July of that year, and describing his impressive funeral procession. It is moving to think that it may have been placed in the desk by his grieving widow, Elizabeth. The second newspaper is an issue of The Ayrshire Times. Dated 22 May 1860, it is addressed to Mr Robert Porter at Glenforsa, the Macquarie family estate on Mull. Robert Porter was appointed farm manager at Glenforsa in 1852 by the late governor’s daughter-in-law, Isabella Macquarie. In 1858 the widowed Isabella left Mull, leasing the farm to Mr Porter, who also purchased the farm’s livestock and equipment. Mrs Macquarie’s solicitor William Sproat had an extremely difficult job extracting payment from the new tenant. During a research visit to Scotland I had the privilege of reading his letter books, in which he commented; ‘It is my opinion that Porter has not the money at present to pay up the balance due…he told me that he was disappointed in getting the sum of ₤250 from his two sisters in law who, after promising it, changed their minds and went off to America.’ Mrs Macquarie also suspected Porter of secreting seven sheep in order to avoid paying for them. Not surprisingly their relationship became quite acrimonious. Immersed in solicitor William Spot’s letter books. In mid 1861, Isabella Macquarie relinquished her life tenancy of Glenforsa and an aggrieved Robert Porter was forced to leave as well. When Porter moved his family to the north of Mull he again owed money to Mrs Macquarie. It appears he also ‘spirited away’ some of his landlady’s belongings, including Lachlan Macquarie’s campaign desk, two significant artworks associated with New South Wales, four ‘picture’s’ by the Governor’s wife, native artefacts, and various items of silver. After spending several years in Edinburgh, Isabella Macquarie made her home in the south of England. She died there in 1884 without ever realising that the Macquarie family relics had been removed by Mr Porter. Perhaps she presumed they were among items stored at the home of another solicitor, Thomas Sprot, as her will stated, ‘All the things belonging to me so long left in charge of Mr Sprot (Writer) Tobermory Mull Argyleshire I leave to him with the exception of any part of them my sister Augusta may select’. Significantly, the will’s inventory described the stored items at Sprot’s premises as, ‘Pictures and other effects’. Hmm…perhaps a few less pictures and effects than there should have been! Robert Porter fell on increasingly hard times after leaving the Macquarie estate and in 1870 he and his large family became squatters in an empty schoolhouse in the Mull village of Mornish. When an unmarried teacher arrived, an enterprising Mrs Porter suggested they stay put and provide the young man with full board. No doubt the use of a fully equipped portable desk would have been an added inducement, but in the event the teacher was housed elsewhere until the Porters could be induced to leave. Robert Porter and family, circa 1880 The family subsequently moved to the mainland town of Oban, where Robert Porter died intestate in 1890. At some point, possession of the Macquarie campaign desk passed to his son, Allan Muir Porter. The remaining relics were inherited by Robert’s youngest daughter Agnes (third from left, back row in above photo) on the death of her mother. Shortly after marrying Joseph Flockhart in 1903, Agnes emigrated to New York. In 1914 she offered the relics to Sydney’s Mitchell Library. Sadly, only one item was acquired; an unsigned oil portrait of an Aborigine dated circa 1820.1. The portrait purchased by the Mitchell Library. The fate of the remaining items, including a 1793 water colour of Sydney Harbour, is unknown. The campaign desk remained in Allan Muir Porter’s family until being sold to the Historic Houses Trust in 2002 by one of his descendants. Despite overwhelming evidence to the contrary, some members of the Porter family refuse to believe that their ancestor misappropriated the relics. After gently broaching the subject on my behalf, a relative by marriage was quickly put in his place and told that it would have been, ‘…’unimaginable!” as our family at that stage were very much one of the upstanding and honourable families of the area.’ In the spring of 2008, I was invited to lunch at the home of Alan Muir Porter’s elderly grand-daughter, Muriel Beckenridge. Muriel was living in a beautiful home at Oban; a converted coach-house overlooking the sound of Mull. According to Muriel, the story within the family was that Isabella Macquarie had presented the desk to Robert Porter as a retirement gift when he left Glenforsa. Neither Muriel nor her sister Edie had any knowledge of the other Macquarie relics taken to the United States by their great-aunt Agnes. As a child, Edie spent several years living with her Porter grandparents in the Scottish town of Helensburgh. She said the campaign desk was always proudly displayed on the sideboard. It was not to be touched, and she had never been allowed to see what was inside. After hearing the whole story, both Edie and Muriel accepted that the desk was not a retirement gift. Nevertheless, invoking the old maxim of possession being nine tenths of the law, Edie in particular was adamant that it should have remained within the Porter family. My attempt to soften the blow by explaining how much Australians appreciated its return to New South Wales cut no ice with her whatsoever. After 140 years in the Porter family’s possession the desk arrived back in Sydney in perfect condition, complete with evocative remnants of sealing wax and coins dating from the reign of George III. Perhaps the purchase price of $19,500 could be viewed as the family’s ‘caretaker’s fee’; by my reckoning a very reasonable $140 per annum. Letter books of Sproat & Cameron, Solicitors, Argyll & Bute Council Archives, Lochgilphead Will of Isabella Macquarie, Edinburgh Sheriff’s Court Ref; SC70/4/210 Inventory – Ref; SC70/1/238 Personal conversations and written communications: Muriel Beckenridge, James Usmar and Hamish Porter. More on Isabella Macquarie and her husband Lachlan Macquarie Jnr can be found in my article Bitter Legacy. On July 23, 2016 / History / 9 Comments Tags: Agnes Flockhart, Alan Muir Porter, Campaign desks, Glenforsa, Governor Macquarie, Governor Macquarie's campaign desk, Historic Houses Trust, History of New South Wales, Isabbella Macquarie, Isle of Mull, Mitchell Library, Museum of Sydney, Oban, Robert Porter, Thomas Sprot, William Sproat THE FRIENDS OF ELIZABETH MACQUARIE - PART III LOST AT POZIERES Lorraine Wootton This is another of your intriguing Macquarie stories, Pauline. Thank you so much for sharing it…..Lorraine Thanks Lorraine. My next one is about his niece. Michelle Nichols Wonderful and well-researched story. I have shared on several facebook pages I manage Hawkesbury Family History Group and Claim a Convict. Thanks so much for your generous comments Michelle, and for sharing the story. I have been researching the Macquarie family for many years. If you type Macquarie into the search box on my home page a lot of articles will come up. Wouldn’t you like to come and speak about Macquarie matters on Sun 13 Nov, Pauline – as I’ve outlined in messages to your ‘contact’ button? Perhaps you could reply to me direct to my email address. PS the only complaint I have about your site is the maths problems it sets – I much prefer words to numbers and it doesn’t give much time to work them out! 😉 Well I would, Lorraine, and thanks so much for asking. However, we have already booked our visit in September, to finish the research on my current book. There is no time limit on the website re the anti-spam sum that I’m aware of. I have to do them too, when I log on and I was never too good at maths either. lol. Messages left via the Contact button come through on my email, but I don’t think I’ve received any from you. I will email you, anyway. I didn’t think you could have received my two previous messages Pauline, so please do email me so that I can forward all details of the offer to you directly. There must be a glitch somewhere. I do keep getting ‘timed out’ and have to repeat the process. OK, will do. P Time limit is exhausted. Please reload CAPTCHA. + seven = 8
cc/2020-05/en_middle_0016.json.gz/line4953
__label__cc
0.671921
0.328079
Posts Tagged ‘WACA’ Episode 210: Sam Castro on getting from Me Too in Hollywood to Smashing Patriarchy in our Movement and Creating System Change Posted: July 13, 2018 in Uncategorized Tags: animals, call in culture, environment, feminism, FoE, gender, gendered violence, male feminists, male privilege, me too, patriarchy, Sam Castro, sexism, sexual assault, sexual harassment, Students of Sustainability, transformative justice, Veganism, WACA Sam Castro. This episode features a talk from activist Sam Castro on challenging sexism within progressive movements and creating system change. This talk was recorded at the 2018 Students of Sustainability conference in Melbourne. Sam is an activist with Friends of the Earth and WACA, and has been on our podcast all the way back on episode 65, discussing direct action. Some of the points that came up in Sam’s workshop that we have covered on previous episodes are call in versus call out culture and Men of Colour being more likely to be called out for sexism. We also covered the #MeToo movement on episode 191. If you’d like to join in discussions on this topic and others, we encourage you to join us at the upcoming forum ‘Community as Activism: Building Community within the Animal Liberation Movement and Beyond’ by the Institute for Critical Animal Studies (ICAS) Oceania. This free event will feature sessions on transformative justice and #MeToo, as well as intersectionality in practice and building community. It will be held on Saturday 4 August, 1-5pm at Library at the Dock (107 Victoria Harbour Promenade, Docklands) – in Melbourne. Join us at our #CommunityAsActivism discussion forum! Workshops on #intersectionality, transformative justice particularly in light of #MeToo, and building community. Saturday 4 August, 1-5pm at Library at the Dock, Melbourne. https://t.co/I3IeU2BcEE — ICAS Oceania (@icasoceania) July 6, 2018 This episode also features a little bit of Adam Cardilini’s talk on the environmental impact of animal agriculture. This is from the workshop ‘Achieving Environmental Liberation Through Animal Liberation’ which Adam ran with Nick, also at the Students of Sustainability conference. You can listen to both of our talks from this workshop here and view Adam’s PowerPoint here and below. We also covered the environmental impact of animal agriculture on episode 171. Please spread the word about our show, for example by sharing our episodes on Facebook and Twitter, so they reach more people. Our most recent episode is always our pinned post at the top. Thanks 🙂 Diet Cig ‘Maid of the Mist’, Sam Castro ‘How do we get from Me Too in Hollywood to smashing patriarchy in our movement and creating system change?’, Adam Cardilini ‘Achieving Environmental Liberation Through Animal Liberation’, First Aid Kit ‘You Are the Problem Here’. Episode 65: Direct Action Gets the Goods Posted: August 19, 2014 in Uncategorized Tags: Activism, anarchism, anti-war activism, BDS movement, direct action, economics, Elbit systems, Gaza, Israel, israel palestine conflict, Joe Hockey, palestine, protest, South Africa, WACA Image from @akaWACA: https://twitter.com/akaWACA/status/500054368222056448/photo/1 Listen to this episode and subscribe to our podcast on iTunes. You can also listen to this episode on Stitcher, Cyber Ears or download it on MediaFire (35MB). There has been widespread opposition to Israel’s bombing of Gaza and Occupation of Palestine. This has included direct action in the UK (which we covered on episode 64), which has now spread to Australia and the US too. We’re joined by Sam Castro from the Whistle blowers, Activists and Citizens Alliance (WACA), who discusses the direct action they carried out with a bunch of other groups in Melbourne against Elbit systems, a company profiting from the bombing of Gaza. This is the action pictured in the image above and you can find more photos from the action here. Sam also discusses the importance of direct action and gives advice to others looking to take direct action. We encourage people to check out WACA’s site waca.net.au, like them on Facebook and follow them on Twitter. Before we get into the interview, we discuss our new blog progressivepostings.wordpress.com, feedback on Nick’s article on Israel/Palestine, disputing the “can’t we all just get along?!”/“Kum Ba Yah” approach to Israel/Palestine, information from Jewish Voice for Peace, and links between Israel and South Africa, including an article from 1989 arguing that South Africa shouldn’t be singled out. We also introduce the new segment ‘Taking the “o no” out of ec-o-no-mics’, including government information revealing the Abbott government’s budget hits the poor the hardest, Joe Hockey’s apology, and the book Battlers and Billionaires by Andrew Leigh. Shout outs to Stic’s album The Workout as well as to the Melbourne Street Medic Collective for promoting our show at the Melbourne Anarchist Bookfair! Check out our 57th episode to hear Coggo from the Melbourne Street Medic Collective discuss their World Record Breaking protest, which they carried out with WACA and other groups. This episode is brought to you by “Cashed Up Kathryn”. You can hear Kathryn’s great talk on social work and animals on Team Earthling podcast. Thanks a lot to Kathryn for becoming a member of our show – you can become a member and sponsor an episode too! WACA ‘Elbit Systems You Can’t Hide!’, Pink Floyd ‘Another Brick in the Wall’, Peep Show ‘Series 2, Episode 2’, South Park ‘Kumbayah’, Interview with Sam Castro from WACA – part 1, NOFX ‘The Marxist Brothers‘, CNNNN ‘Series 1, Episode 1’, The Guardian ‘Joe Hockey Sorry’, Interview with Sam Castro from WACA – part 2, Rage Against the Machine ‘Killing in the Name of’. You can listen to a short (9 minute) version of this episode, which features a shortened version of our interview with Sam Castro, here: Direct Action for Palestine in Australia! You can subscribe to these short versions of our episodes through Omny.
cc/2020-05/en_middle_0016.json.gz/line4957