pred_label
stringclasses 2
values | pred_label_prob
float64 0.5
1
| wiki_prob
float64 0.25
1
| text
stringlengths 137
972k
| source
stringlengths 39
45
|
|---|---|---|---|---|
__label__wiki
| 0.794996
| 0.794996
|
Excitation of the hydrogen subsystem in metals and alloys by ionizing radiation 2. a model of the mechanism of radiation-stimulated diffusion and of the release of hydrogen from metals
Yu I. Tyurin, I. P. Chernov, T. V. Smekalina
Division for Experimental Physics
Models of nonequilibrium-stimulaled diffusion and the release of hydrogen and its isotopes from metals by the action of ionizing radiation are considered. It is suggested that the acceleration of the release of hydrogen from metals by the action of radiation is due to the excitation of nonequilibrium vibrational states in the hydrogen subsystem of the metals and a reduction in the surface potential barrier by the desorbing molecules, It is shown, in particular, that the diffusion coefficient of deuterium in Pd is increased by a factor of 30 by the action of radiation compared with a nonirradiated sample.
Russian Physics Journal
hydrogen isotopes
vibrational states
Tyurin, Y. I., Chernov, I. P., & Smekalina, T. V. (1998). Excitation of the hydrogen subsystem in metals and alloys by ionizing radiation 2. a model of the mechanism of radiation-stimulated diffusion and of the release of hydrogen from metals. Russian Physics Journal, 41(11), 1061-1067.
Excitation of the hydrogen subsystem in metals and alloys by ionizing radiation 2. a model of the mechanism of radiation-stimulated diffusion and of the release of hydrogen from metals. / Tyurin, Yu I.; Chernov, I. P.; Smekalina, T. V.
In: Russian Physics Journal, Vol. 41, No. 11, 1998, p. 1061-1067.
Tyurin, YI, Chernov, IP & Smekalina, TV 1998, 'Excitation of the hydrogen subsystem in metals and alloys by ionizing radiation 2. a model of the mechanism of radiation-stimulated diffusion and of the release of hydrogen from metals', Russian Physics Journal, vol. 41, no. 11, pp. 1061-1067.
Tyurin YI, Chernov IP, Smekalina TV. Excitation of the hydrogen subsystem in metals and alloys by ionizing radiation 2. a model of the mechanism of radiation-stimulated diffusion and of the release of hydrogen from metals. Russian Physics Journal. 1998;41(11):1061-1067.
Tyurin, Yu I. ; Chernov, I. P. ; Smekalina, T. V. / Excitation of the hydrogen subsystem in metals and alloys by ionizing radiation 2. a model of the mechanism of radiation-stimulated diffusion and of the release of hydrogen from metals. In: Russian Physics Journal. 1998 ; Vol. 41, No. 11. pp. 1061-1067.
@article{f8ed49148c024703be46c50e7004d2fa,
title = "Excitation of the hydrogen subsystem in metals and alloys by ionizing radiation 2. a model of the mechanism of radiation-stimulated diffusion and of the release of hydrogen from metals",
abstract = "Models of nonequilibrium-stimulaled diffusion and the release of hydrogen and its isotopes from metals by the action of ionizing radiation are considered. It is suggested that the acceleration of the release of hydrogen from metals by the action of radiation is due to the excitation of nonequilibrium vibrational states in the hydrogen subsystem of the metals and a reduction in the surface potential barrier by the desorbing molecules, It is shown, in particular, that the diffusion coefficient of deuterium in Pd is increased by a factor of 30 by the action of radiation compared with a nonirradiated sample.",
author = "Tyurin, {Yu I.} and Chernov, {I. P.} and Smekalina, {T. V.}",
journal = "Russian Physics Journal",
publisher = "Consultants Bureau",
T1 - Excitation of the hydrogen subsystem in metals and alloys by ionizing radiation 2. a model of the mechanism of radiation-stimulated diffusion and of the release of hydrogen from metals
AU - Tyurin, Yu I.
AU - Chernov, I. P.
AU - Smekalina, T. V.
N2 - Models of nonequilibrium-stimulaled diffusion and the release of hydrogen and its isotopes from metals by the action of ionizing radiation are considered. It is suggested that the acceleration of the release of hydrogen from metals by the action of radiation is due to the excitation of nonequilibrium vibrational states in the hydrogen subsystem of the metals and a reduction in the surface potential barrier by the desorbing molecules, It is shown, in particular, that the diffusion coefficient of deuterium in Pd is increased by a factor of 30 by the action of radiation compared with a nonirradiated sample.
AB - Models of nonequilibrium-stimulaled diffusion and the release of hydrogen and its isotopes from metals by the action of ionizing radiation are considered. It is suggested that the acceleration of the release of hydrogen from metals by the action of radiation is due to the excitation of nonequilibrium vibrational states in the hydrogen subsystem of the metals and a reduction in the surface potential barrier by the desorbing molecules, It is shown, in particular, that the diffusion coefficient of deuterium in Pd is increased by a factor of 30 by the action of radiation compared with a nonirradiated sample.
JO - Russian Physics Journal
JF - Russian Physics Journal
|
cc/2020-05/en_middle_0102.json.gz/line1935
|
__label__wiki
| 0.611539
| 0.611539
|
Study of the properties of a Si surface layer implanted with <sup>64</sup>Zn<sup>+</sup> and <sup>16</sup>O<sup>+</sup> ions during the formation of ZnO nanoparticles under thermal annealing
V. V. Privezentsev, V. S. Kulikauskas, V. V. Zatekin, D. V. Petrov, A. Yu Trifonov, A. A. Batrakov
Research School of High-Energy Physics
The cross section of a Si surface layer implanted with <sup>64</sup>Zn<sup>+</sup> and <sup>16</sup>O<sup>+</sup> ions is visualized via high-resolution transmission electron microscopy, and its evolution as a result of thermal annealing is investigated. The profiles of impurities implanted into this layer, which are measured by means of secondary-ion mass spectrometry, as well as their changes arising from heat treatment, are analyzed. The surface morphology is examined with the help of atomic-force microscopy.
Journal of Surface Investigation
Secondary ion mass spectrometry
High resolution transmission electron microscopy
ion implantation
Privezentsev, V. V., Kulikauskas, V. S., Zatekin, V. V., Petrov, D. V., Trifonov, A. Y., & Batrakov, A. A. (2015). Study of the properties of a Si surface layer implanted with <sup>64</sup>Zn<sup>+</sup> and <sup>16</sup>O<sup>+</sup> ions during the formation of ZnO nanoparticles under thermal annealing. Journal of Surface Investigation, 9(3), 486-495. https://doi.org/10.1134/S1027451015020160
Study of the properties of a Si surface layer implanted with <sup>64</sup>Zn<sup>+</sup> and <sup>16</sup>O<sup>+</sup> ions during the formation of ZnO nanoparticles under thermal annealing. / Privezentsev, V. V.; Kulikauskas, V. S.; Zatekin, V. V.; Petrov, D. V.; Trifonov, A. Yu; Batrakov, A. A.
In: Journal of Surface Investigation, Vol. 9, No. 3, 08.05.2015, p. 486-495.
Privezentsev, VV, Kulikauskas, VS, Zatekin, VV, Petrov, DV, Trifonov, AY & Batrakov, AA 2015, 'Study of the properties of a Si surface layer implanted with <sup>64</sup>Zn<sup>+</sup> and <sup>16</sup>O<sup>+</sup> ions during the formation of ZnO nanoparticles under thermal annealing', Journal of Surface Investigation, vol. 9, no. 3, pp. 486-495. https://doi.org/10.1134/S1027451015020160
Privezentsev VV, Kulikauskas VS, Zatekin VV, Petrov DV, Trifonov AY, Batrakov AA. Study of the properties of a Si surface layer implanted with <sup>64</sup>Zn<sup>+</sup> and <sup>16</sup>O<sup>+</sup> ions during the formation of ZnO nanoparticles under thermal annealing. Journal of Surface Investigation. 2015 May 8;9(3):486-495. https://doi.org/10.1134/S1027451015020160
Privezentsev, V. V. ; Kulikauskas, V. S. ; Zatekin, V. V. ; Petrov, D. V. ; Trifonov, A. Yu ; Batrakov, A. A. / Study of the properties of a Si surface layer implanted with <sup>64</sup>Zn<sup>+</sup> and <sup>16</sup>O<sup>+</sup> ions during the formation of ZnO nanoparticles under thermal annealing. In: Journal of Surface Investigation. 2015 ; Vol. 9, No. 3. pp. 486-495.
@article{1ec18de6ef884cabb0e50cd54cc82eb4,
title = "Study of the properties of a Si surface layer implanted with 64Zn+ and 16O+ ions during the formation of ZnO nanoparticles under thermal annealing",
abstract = "The cross section of a Si surface layer implanted with 64Zn+ and 16O+ ions is visualized via high-resolution transmission electron microscopy, and its evolution as a result of thermal annealing is investigated. The profiles of impurities implanted into this layer, which are measured by means of secondary-ion mass spectrometry, as well as their changes arising from heat treatment, are analyzed. The surface morphology is examined with the help of atomic-force microscopy.",
keywords = "ion implantation, nanoparticles, silicon, zinc, zinc oxide",
author = "Privezentsev, {V. V.} and Kulikauskas, {V. S.} and Zatekin, {V. V.} and Petrov, {D. V.} and Trifonov, {A. Yu} and Batrakov, {A. A.}",
journal = "Journal of Surface Investigation",
publisher = "Maik Nauka-Interperiodica Publishing",
T1 - Study of the properties of a Si surface layer implanted with 64Zn+ and 16O+ ions during the formation of ZnO nanoparticles under thermal annealing
AU - Privezentsev, V. V.
AU - Kulikauskas, V. S.
AU - Zatekin, V. V.
AU - Petrov, D. V.
AU - Trifonov, A. Yu
AU - Batrakov, A. A.
N2 - The cross section of a Si surface layer implanted with 64Zn+ and 16O+ ions is visualized via high-resolution transmission electron microscopy, and its evolution as a result of thermal annealing is investigated. The profiles of impurities implanted into this layer, which are measured by means of secondary-ion mass spectrometry, as well as their changes arising from heat treatment, are analyzed. The surface morphology is examined with the help of atomic-force microscopy.
AB - The cross section of a Si surface layer implanted with 64Zn+ and 16O+ ions is visualized via high-resolution transmission electron microscopy, and its evolution as a result of thermal annealing is investigated. The profiles of impurities implanted into this layer, which are measured by means of secondary-ion mass spectrometry, as well as their changes arising from heat treatment, are analyzed. The surface morphology is examined with the help of atomic-force microscopy.
KW - ion implantation
KW - nanoparticles
KW - silicon
KW - zinc
KW - zinc oxide
JO - Journal of Surface Investigation
JF - Journal of Surface Investigation
|
cc/2020-05/en_middle_0102.json.gz/line1936
|
__label__cc
| 0.712503
| 0.287497
|
The Good Doctor Transcript
F.D. » Transcripts » TV Show Transcripts » G » The Good Doctor
01x15 - Heartfelt
["THIS HEART'S ON FIRE" BY WOLF PARADE PLAYING]
♪ Sometimes we rock and roll ♪
♪ Sometimes we stay at home, and it's just fine ♪
♪ This heart's on fire ♪
♪ I am my mother's hen ♪
MAN: Please walk around the other way.
[PLAYING THROUGH HEADPHONES]
♪ And left the body in the bed all day ♪
- What happened?
- Nothing.
They're just getting the lobby ready for the big party.
[MUSIC CONTINUES THROUGH HEADPHONES]
CLAIRE: It's an annual fundraiser.
Like a carnival?
No, it's a swanky, black-tie ball.
You think a hospital lobby is swanky?
Not yet, but add some lights, a few decorations,
and, most importantly, alcohol...
It becomes a streamer- and balloon-infested hospital lobby
with a cash bar.
[SCOFFS] It's for charity.
Better to spend the money for the cause.
Actually, it's worse.
You need to spend money to make money.
I don't like parties.
Doesn't matter.
All residents will be expected to attend
and make a donation.
This is Dr. Alex Park.
He's the last of Coyle's residents
to be reassigned to our team.
Meet doctors Jared Kalu, Claire Browne, and Shaun Murphy.
Welcome back. How was Costa Rica?
Beaches were awesome. Monkeys were horrible.
Little bastards stole my new camera and a pair of...
That's even older than Dr. Melendez.
Dr. Murphy is a talented doctor who has autism,
which sometimes causes him to ask inappropriate questions.
No worries. Inappropriate questions can be very revealing.
I'm a late bloomer.
Park's being modest, which is very unlike him.
He was a cop for years before he went to med school.
Now that we all know each other,
Reznick and Browne have dibs on cases this week.
You make your picks?
- Definitely.
Is there karaoke?
And now, our all-star lineup!
Playing center, out of Moose Jaw, Saskatchewan.
Whoo!
Spirit, stop it.
They don't have time to fool around.
I'm not fooling around.
I need to document the momentous event.
Then at least get it right.
I'm from Taipei, Taiwan.
Co-o-orrection!
From Taipei, Taiwan...
which is a believe is a suburb of Moose Jaw...
Dr. Audrey Lim!
♪ Bam, bam-bam, bawr ♪
And assisting Dr. Lim are...
two docs I've never met.
I'm Dr. Shaun Murphy from Casper, Wyoming.
And...?
Dr. Morgan Reznick, Mill Valley, California.
- Whoo!
Okay, Spirit, that's enough.
All right, put your phone away, or it becomes my phone.
Well, folks, looks like the suits are shuttin' me down.
Thanks for all your support.
- Love you! Bye!
- [CELLPHONE CHIMES]
Sorry, but my friends insist I keep them up to date.
It's all right. It's a big day.
Spirit was born with ectopia cordis. She's been...
Why didn't they repair it when she was an infant?
They couldn't. Her rib cage was too small.
But after years of slow and steady growth...
It's time to put this baby where it belongs.
This is an interesting view.
I can see the aortic arch.
- MORGAN: Murphy.
- Oh, it's all right.
I'm used to people being curious.
I'm sure you're looking forward
to when there's nothing to be curious about.
Mm, what I'm really looking forward to is... crowds.
You like crowds?
I've never been in one.
I can't go to a normal school,
and my parents barely ever let me leave our house.
Well, when a small bump could stop your heart, it makes sense.
But you still have a lot of friends?
Yeah, of course.
I mean, I just can't do anything fun with them.
If you can't do anything fun,
then how did you get them to be your friend?
Well, in case you haven't noticed,
I like to talk.
- Mm, yes.
- And, uh...
We all do everything online now anyway.
The first thing I'm gonna do when I get out of here
is take all my friends to a concert.
Like, general admission, on the floor.
I don't even care who the band is,
just as long as the place is packed.
Oh, and I'm gonna hug everyone.
You've never hugged anyone?
Not even your parents?
Kissed by my parents, high-fived by my friends,
but, nope, no hugs.
It's just too risky.
Hugs make me feel trapped.
- Agh!
- Sorry.
Pain in the upper-right quadrant.
It's jaundice.
Bilirubin's off the chart.
WALLACE: That doesn't make sense.
He's been doing so well since the transplant.
Yeah, every check-up this year's been perfect.
Well, it could just be a temporary flare-up.
We'll increase his anti-rejection meds
and do a full liver exam.
We'll know more then.
You two, do the work-up.
And you find a new liver.
Shouldn't we wait for the biopsy result?
Not when I already know what it's gonna say.
He needs a new liver ASAP.
I mean, that's gonna be hard.
He's Blood Type O.
It's gonna be impossible.
He's lucky they were able to find the first one.
Well, he better get lucky again
because it's our only way to keep him alive.
We're screwed.
Barbara Boxer got ear barotrauma scuba-diving in Cozumel
and cannot fly for two weeks,
which means we don't have
a keynote speaker for our gala.
You think this is funny?
I've just never seen you anxious,
and I seriously doubt Barbara Boxer scuba-dives.
It's just an excuse.
She sent me a picture
from the hospital.
- Oh, really?
- Yeah.
Anyone can fake a photograph.
I am doing a search
to see if our esteemed senator
from the great state of California
ever once... once...
talked about scuba-diving in an interview.
It doesn't matter if it's true.
What matters is that we find a replacement.
I need you to get me
a meeting with Aiden Coulter.
- Oh, Aiden Coulter?
What? I sat next to him once
at an A's game.
And the story I remember is that you two
were talking smack that entire game,
and after he spilled his beer on you
and insisted on buying you a new jacket,
you refused him.
So he owes you.
Just get me a meeting.
I will handle everything from there.
- You're welcome.
JARED: You'll be fine.
You've had liver biopsies before.
And they've always hurt a lot.
Please, isn't there another way?
Well, the other way, Eric, would going through your neck,
and I don't think you'd like that any more.
Eric, do you know why NBA players
all wear headphones before games?
Don't look at him. Look at me.
I need you to answer me.
Why do NBA players wear headphones before games?
I guess they like music.
No, they need music.
Music helps them forget about everything else
and focus on what's important...
the game.
Who's your favorite player?
Curry.
This is the song he listens to before every game.
Because he's my favorite player, too.
I want you to close your eyes and focus on this.
Just this.
It's cold.
Yeah, now it is, but if you stay focused,
pretty soon, it'll stop feeling cold
and start to feel warm.
When that happens, I want you to nod your head,
and you'll feel some pressure and a small pinch.
What if it does...
Then close your eyes and focus.
Two minutes and he'll be good to go.
How'd you know he was a basketball fan?
His shoes.
He's not wearing any shoes.
Yeah, they're in a backpack in his room.
You searched his backpack?
Well, it's, um, less invasive than a rectal,
and most of the time more useful.
Okay, Spirit, just keep still and...
And during a few parts of the exam,
we may ask you to hold your breath,
but it'll only be a few seconds.
[WHIRRING]
You gonna buy a tux or rent one?
The fundraiser is black tie.
I have a suit.
It's new.
I bought it for my resident interviews.
It doesn't matter how new it is.
It's not a tux.
Wearing a uniform at work reassures patients.
Wearing a uniform at a party
does nothing but make you hot and uncomfortable.
This party is work.
Get a tux.
And not a crappy one from some outlet store.
Get fitted by a pro and spend a minimum of two grand.
You're gonna meet rich people who can help your career,
and they're not gonna want to help some slob in a...
I'm not a slob.
No, I am very clean
and make sure my clothes are never wrinkled.
And it's too big.
Her heart.
It's enlarged % since her last exam.
Her last exam was only six months ago.
It won't fit.
Too big.
The biopsy confirmed acute cellular rejection.
We maximized his immunosuppressives, but, uh...
I found one... a Type-O liver.
Park and I checked the registry,
and there weren't any.
I found it online.
He, uh... He already tried to make a direct donation
a few months ago,
but the patient died before the surgery.
I contacted him, which wasn't easy,
but he still wants to be a donor.
He wants to be a donor, but he's not on the registry?
I mean, there's got to be a catch.
He, uh... He can't be on the registry
because he is in prison.
For murder.
Actually, um, seven murders.
Boris Tirayan was
a Russian Mafia enforcer convicted of seven murders.
Who now wants to make amends.
He tried to be a donor a few months ago,
but the patient died before the red tape could be worked out.
But now that it has...
Are there any laws against an inmate becoming a donor?
No, but there is a ton of liability.
What if he attacks someone here?
He'll be guarded by state prison guards
on a separate level,
away from patients and all nonessential staff.
Everyone deserves the chance to turn their life around.
The guy wants to do something decent,
we should let him.
I don't think we owe a murderer anything.
But maybe he owes us something. He has a debt to society.
Which he would repay by donating his inner organs.
Isn't it a slippery slope
between a guy who wants to make amends
and turning our prison system
into a superstore for body parts?
A slippery slope that saves a child's life.
PARK: It'll never happen.
He's just trying to get a hospital,
where it'll be easier to escape.
You have no idea what his motivation is.
I know he's a lying sociopath
who doesn't care about anyone but himself.
He's been a model inmate for nine years,
tutors other prisoners in the library...
Yeah, because he's trying to get someone to trust him,
to give him an inch, and as soon as they do...
We got approval.
He's gonna stall, make excuses, and when he sees his chance,
someone's gonna get hurt.
I think it's worth taking that chance.
Anybody who doesn't agree, feel free to sit this one out.
MORGAN: When you started menstruating,
the increased estrogen caused pulmonary hypertension,
which isn't a surgical issue in itself,
but along with your atypical vascular system...
Your heart's grown too big.
LIM: We will control your blood pressure
so that you will keep growing but your heart won't,
and then, by the time you're , we'll able to...
I'm not waiting any longer.
Spirit, honey, it will be okay.
No, it won't!
I'm sick of being stuck inside all the time.
I'm sick of this!
I don't ever want to text, call, or video chat again.
Mom, I want to be touched.
I want to be shoved.
I want to be punched.
I don't even care, just...
I want this surgery now.
I need it.
I'm sorry. You can't.
We need to get rid of all the furniture and artwork.
I get removing the paintings, but the furniture?
Don't want the prison guards sitting down on the job.
He's gonna be in full restraints,
cuffed to the bed.
Well, that's our plan,
but we also need to be prepared for his plan.
Okay, we need to get rid of the window blinds, curtain rods,
jacket hooks, and make sure there's no metal rivets
or eyelets on the mattress.
Um, what's he gonna do with a metal eyelet?
Tear it off the mattress and file it down
to cut your jugular, or bend it into a handcuff key,
or shove it into an electric socket
to create a spark and start a fire.
I've seen knives made out of toilet paper, soap, and salt
that could amputate a fat guy's femur.
Not quite sure he needed the part about the guy being fat.
[BOTH LAUGH]
So... I've been thinking.
You want to go to the fundraiser together?
It's not a prom. We don't have to bring a date.
Yeah, we don't have to.
But we can, if we want.
Everyone basically knows we're seeing each other,
but still...
I think it might be a nice opportunity
to take our relationship out into the open.
Unless you don't want to.
No, it's a good idea.
Because, you know, we don't have to.
Yeah. Let's do it.
[CELLPHONES CHIME]
[KNOCKS ON DOOR]
WALLACE: It's fine. He'll be all right.
No, I won't. I don't want a murderer's liver!
It's evil!
[SIGHS] Eric, there's no such thing
as a good or bad liver.
It's just a... just an organ.
CLAIRE: Eric, this is your only choice.
If we don't do the transplant, you will die.
ERIC: I don't want him to be a part of me,
inside me forever, all right?
I don't care what you or anybody else says, okay?
It's my body, and I don't want it!
That's ridiculous.
Personality traits aren't transferred in an organ transplant.
It's also irrelevant.
Children don't consent to surgeries...
their parents do.
But if he doesn't cooperate with the anti-rejection regimen,
we could be wasting a liver that could save someone else's life.
PARK: No one's getting saved by Tirayan.
I found a Type-A donor. It's not a perfect match, but...
His body's already rejected a perfect match.
There's no way it can tolerate an incompatible blood type.
No, the only way to save Eric
is to do the transplant with Tirayan's liver.
That is it.
We have no other option.
Let the O.R. know we're gonna need more restraints.
Dr. Clinton Ford out of Alberta
developed an experimental resorbable material.
It would allow us to expand her rib cage
and create room to fit her heart inside.
LIM: An artificial sternum.
That would actually grow along with the patient.
The surgery isn't reversible.
If it doesn't work,
we can't just move her heart back to where it was.
It would allow her to have a life.
She has a life, and she'll be healthy
as long as she stays out of crowds,
doesn't hug anyone,
or do anything where she might fall.
I get you're autistic, but I know even you realize
when a patient cries and throws her phone against the wall,
they're not happy with their current health.
There's no reason to make this personal.
There is if his medical judgment is biased.
I saw she was upset.
You saw it, but you didn't understand it.
You're very competitive.
Are you trying to make Dr. Lim think I'm biased,
or are you trying to undermine my confidence?
I'm actually trying to help you and the patient.
She wants to be able to rub elbows,
and you need to learn how to trade elbows.
The resorbable plate is experimental and risky.
But my medical judgment is that it's worth it.
Make sure she agrees and then get her prepped.
I'm not famous, I don't know anything about medicine,
and giving the keynote speech at your fundraiser
is a steep price to pay for a beer-stained jacket.
You grew up in San Jose.
You went to San Jose State
despite being accepted by both Princeton and MIT,
and you headquartered your company here,
despite huge tax breaks offered by Chicago and Minneapolis.
And it was his favorite jacket.
Well, when I offered to have it cleaned,
he said not to bother because he didn't even like the jacket.
- He was being polite.
- Polite?
I take it you've never been to a game with him.
You did some homework, but not enough.
I love this city, but I have giving speeches.
So don't give a speech.
Tell us a story.
Like the one you told at the wrap party
at the Youth Dance company's fall musical...
the one where you got lost at the Paris catacombs.
I stand corrected.
Your success is inspiring, Aiden,
as well as your loyalty to this city.
And the fact that you're young, apparently very funny...
Actually, I was in as soon as Aaron told me
what you wanted to meet about.
But I was curious what your attack strategy would be.
So, how was it?
It was very effective.
Now, don't worry.
He's been a model inmate for nine years
and tutors the other prisoners in the library.
Coke nail come in handy up at Pelican Bay?
I make jewelry.
Helps me pick up the beads.
Is there a history of cancer or liver disease in your family?
I went through this a couple of months ago.
You have my file.
We need to do our own exam.
CLAIRE: And there's nothing about your family
in previous records.
Are they still alive?
They're dead to me.
Quit stalling, or we'll send you back right now.
I haven't spoken to anyone in my family since I was years old.
Last I know, uh, both my parents were healthy enough
to kick the crap out of me on a daily basis.
Why do you want to do this?
Maybe I just like, uh, cute nurses and bad Jell-o.
- Why do you care?
- We don't.
As long as you do what you're told.
I'm very good at following orders.
Councilman Burns must be very happy with his facelift.
He just bought another table for the fundraiser.
I aim to please, but you already knew that.
And I need to get into surgery, so stop being so coy.
You and Isabel always seem very happy,
able to manage both your professional and personal lives.
I'm flattered you think so, but still a bit coy.
When I met with Aiden Coulter about being our keynote,
I thought there was a spark.
Okay, so now we're getting somewhere.
Surgery can wait a few minutes.
Is it... unprofessional of me to explore it?
He's not a hospital employee,
but potentially a significant donor and...
younger.
Quite a bit.
I don't know, maybe I'm just imagining something
that doesn't even exist.
Oh, I doubt that.
You're an attractive, smart, interesting woman.
I'm sure there was a spark.
But you can't date a donor like Coulter.
There's no actual policy against it.
I'm not talking policy, I'm talking optics.
The last thing you want is someone thinking
you'd use s*x to get a big donation.
It's a double standard, I know,
but it's the world we live in.
I said no! I don't want it!
I thought you gave him something to calm him.
We did, but he's too agitated.
I'm gonna start him on IV midazolam now.
Eric... Eric, remember what Dr. Park said earlier about focusing?
I know you can do that.
How about we get those earbuds you had earlier?
No! Leave me alone!
Eric! Stop it.
Look at me!
Do not move.
SHAUN: You wear very stylish clothes.
Um, thank you.
I assume you mean when I'm not in surgery.
Yes. Do you think people believe you're a better doctor
because of that?
Some people.
Others probably just think I'm a show-off or arrogant, gay.
I don't care. I do it for myself.
You look good, you feel good.
Does it help you make friends?
Feeling good about yourself helps with everything.
Do you know where I can buy a stylish tuxedo?
I can pay $ , .
Dr. Reznick says
if I want people who matter to help my career,
I need to wear a tuxedo that costs $ , to the fundraiser.
Have you talked to Glassman about this?
No. I make my own decisions now.
Murphy, people who matter will help your career
because they're impressed with your talent
and potential as a surgeon.
And I could send you to my tailor,
where you'll definitely spend two grand.
But my advice would be just rent one.
Make sure you get fitted by the manager,
and for a couple-hundred bucks, you'll be fine.
I'm gonna need you to count backwards from .
, , ...
MELENDEZ: Looks like you were wrong.
PARK: I said he'll do anything to convince us to trust him,
to let our guard down.
His eyes, they're swelling up.
So is his tongue. He's having an allergic reaction.
Stop the anaesthesia.
Give me . MGs epinephrine I.M. now.
[MONITOR BEEPING RAPIDLY]
- Epi's in.
- He's hypoxic.
- We need to intubate.
- Getting a . tube.
[COUGHING]
[BREATHES SHAKILY]
You had a severe allergic reaction to the anaesthesia.
We had to intubate you and give you steroids.
You didn't do it?
JARED: We can't operate on you
if you can't breathe under anaesthesia.
You did everything you could.
The patient's parents wanted you to know
they're extremely grateful for everything you did.
Or tried to do.
You can try again.
I'm sorry, we can't.
No, you try again.
Okay? Try again?
[RESTRAINTS CLINK]
You try again.
PRISON GUARD: Calm down!
Try again! Try again!
PRISON GUARD # : He said calm down! Now!
[BREATHING HEAVILY]
Same old, same old, yeah?
That's the way it's always been for me.
Nothing I ever...
He's still on the top of the UNOS list,
and we're gonna be calling and rechecking
every registry and database all night.
How long do we have?
Without a new liver, maybe a day.
So, what'd you get... Hugo Boss? Armani?
SHAUN: Dr. Andrews said I should just rent one.
And you're gonna listen to him?
He's the Chief of Surgery. And he knows about clothes.
If Andrews had a son, you think he'd let him
go to an important event in a cheap rental tux?
He said people who matter
judge people based on their talent.
Yeah, that's what he tells someone else's kid.
To his own, or someone he actually respects, he tells the truth.
Cut here.
Do you respect me?
You're smart, able to memorize a ton of information, but...
Suction the mediastinum.
You've certainly put a lot of thought
into what someone you claim not to respect wears to a party.
Just because I don't respect him doesn't mean I don't like him.
Everyone's uncomfortable in fancy clothes
and hates kissing up to bigwigs at a fundraiser.
But they do it. They don't cower at home alone.
You use your autism as a crutch.
Okay, I think if you liked him any more, he'd have a black eye.
Make sure we're clear on that side
and the aorta isn't kinked.
The aorta isn't kinked.
Now for the moment of truth.
Position the plate.
What'd you do?
I don't feel nothing.
No, don't touch him.
If he can't control his bladder...
He can control himself just fine.
Nice try, but the vacation's over.
Stand up.
Re-check his cuffs first.
You're getting changed, and we're going.
Just take him like he is.
I'm not gonna get stuck in the van
for the next three hours with him like that.
Watch his hands! Watch his hands!
Put the gun down now!
You shoot me, he dies.
Now, no one is shooting anyone.
Everyone stay calm.
Give him space.
You did something good, Boris.
Don't ruin it now.
I did nothing, yeah?
I accomplished nothing!
Whatever happens next is completely in your control.
You have power, but it's not unlimited.
You're not gonna escape,
you're not just walking out of here.
But there are things, concessions,
that could make your life better.
So let's just take our time and talk.
There's no rush.
What do you want, Boris?
I don't want anyone to help me.
Whatever you call it, these life-saving measures.
I... No.
Do not do it.
Don't listen to her. It's your choice.
You do what you want.
Boris, no!
[RESTRAINTS RATTLE, THUD]
Let's go! Let's go! Move! Move!
Melendez is en route.
All right, ready? Let's go.
Page urology and cardio-thoracic stat.
He's dead and he has a donor card.
We're gonna take everything he can donate.
["EVERYDAY" BY NVDES PLAYING]
♪ Our love was hard to maintain, so we broke it ♪
♪ Mmm ♪
♪ But your smile reminds me that I cannot lose all of you ♪
♪ So can we can we laugh about being crazy? ♪
Your speech was perfect.
And hilarious.
Oh, you're very welcome.
And I appreciate the opportunity to help change my rep.
You have a rep?
All work and no play.
Something I'm working on changing.
Your rep or your lifestyle?
I need less stress and more fun.
Would you like to play golf sometime?
On a real course with actual grass.
I'd love to.
All right, let's go.
♪ Like it's true ♪
♪ So can we laugh about being crazy? ♪
We need to get Eric prepped right away.
- What's happening?
- Did you find a new liver donor?
Actually, it's... it's the same one.
The circumstances have changed.
This is incredible.
No, I don't want it.
Eric, when the donor found out
that he couldn't do the surgery to help you,
he became incredibly sad
because he wanted you to live more than he wanted to live.
He ended his life so that you could have his liver.
He... He knew he'd done some bad things,
and I think that this was the only way he knew
how to make amends.
I think we should try and help him.
Do you think you can do that...
help someone do something good?
Everything looks good.
Remember to take deep breaths
so you don't develop any lung complications,
and, obviously, avoid lifting anything too heavy
for the next few weeks.
What, honey?
I want a hug.
["SMOOTH SAILIN'" BY LEON BRIDGES PLAYING]
♪ Over the horizon,
she's smooth sailin' ♪
♪ These concrete seas ♪
- JESSICA: Wow.
- ♪ Now she's headed ♪
You look like a million bucks.
No, it cost $ , .
Well, it was worth every penny.
Good investment.
Glad to see you're treating yourself.
You deserve it.
How much did your dress cost?
And just so you know, that's not the best question
for an event like this.
I don't know. It just isn't.
Can I buy you a drink?
I don't like tequila anymore.
It makes me vomit.
Well, okay. They have other choices.
A glass of wine or a soda?
Uh, that's a partner at a firm
that did some pro bono work for us last month,
so I have to go thank him.
Okay. Bye.
♪ I won't wear you down ♪
♪ No, honey, I won't ♪
♪ Wear you down ♪
♪ She's smooth ♪
- [CHUCKLES]
- ♪ Smooth sailin' ♪
♪ Smooth sailin' ♪
♪ Smooooth, darling ♪
There you are.
And nicely done.
You got the look.
Now you got to put it to use.
There's work to do.
Mingle.
I see you, Dr. Chen.
She runs the Rivington Fellowship at the Mayo Clinic.
I wonder who brought her here.
You still think people can't change?
He didn't.
He's an assassin who murdered people for money.
Today was just one more cold-blooded killing.
You helped him sacrifice his life
so that he could save someone else.
I am not a fan of what you did,
even if it did prove...
He didn't sacrifice anything.
He died a long time ago.
His crew is probably gone.
In prison, he was a nobody.
And now? He lives on as a hero
to Eric's family, to the press, to you.
Jaundice is improving.
Edema's resolving, too.
His vitals look good.
It's been a great night.
Three other lives were saved, as well.
Does his parents know what he did?
I want to send them a card.
I know they're gonna be sad, but...
I want to tell them I'll take good care of their son's liver.
I think that's a great idea.
["GOOD TIME" BY EARL ST. CLAIR PLAYING]
This is impressive.
It's kind of like prom, but without the acne.
And with a DJ that played the MGM Grand last week.
Would you do me the honor?
♪ On the floor ♪
♪ I bet you think you look cool ♪
I brought my A-game.
♪ They don't play no more slow cuts ♪
♪ Everything is turned up ♪
- ♪ Look cool ♪
- ♪ Unh ♪
♪ I'm not the one to rain on parades ♪
♪ But you in the club in some shades ♪
♪ What is goin' on now, a day
♪ Now a day
[MUFFLED] ♪ This is why I stay in the house ♪
♪ I'm better off parked on the couch ♪
[MUFFLED CONVERSATIONS, LAUGHTER]
[MUFFLED MUSIC CONTINUES]
- Take a picture.
- Ooh, you look great!
[WOMAN LAUGHS]
[INDISTINCT CONVERSATIONS CONTINUE]
♪ When I go out, go out
♪ Put on my Sunday best and show out ♪
♪ Show out
♪ I just wanna have a good time ♪
♪ Good time, good time
♪ Good time, good time ♪
♪ Oh, yeah ♪
The first little while is the hardest,
and then you move on.
You never did.
Well, that's true.
Doesn't mean you don't have to.
Well, what are you gonna do?
Are you gonna sit around and mope?
At least try.
How do I do that?
- I don't know.
If I knew, I would have done it.
Let's dance.
Okay. That would be lovely.
♪ This is why I stay in the house ♪
SPIRIT: Don't be shy. You can't hurt me.
Look! I have a bionic sternum!
Ooh, you smell good, Jenny.
What is that... strawberry?
Strawberry mango. It comes with a lip gloss.
I got it at the mall.
We can go together!
[LAUGHS] It's a plan!
Let's all go!
WOMAN: You know what, let's take a selfie.
[YOUNG WOMEN ALL EXCLAIMING "YES!"]
That's a great idea. Bring it in.
Bring it in, guys! Closer!
- Peace sign!
- Cheese!
- [GIGGLING]
- [CELLPHONE CAMERA CLICKS]
- Yay!
- That was so funny.
♪ This ghost of mine, I hope that it follows you ♪
["TOUCH" BY SHURA PLAYING]
- ♪ There's a love between us still ♪
- Remember this?
Should I?
You really don't remember?
[SCOFFS]
It's the song that played
during our first overnight at the hospital.
♪ I wanna touch you, but I'm too late ♪
We had our first kiss to this song.
♪ I wanna touch you, but there's history ♪
It's been a long day.
Jared, it doesn't mean anything.
♪ There's a love between us still ♪
I love you, Claire.
You never loved me.
Now, I thought that maybe someday that would change, but...
it won't.
♪ But I know I'm out of my mind ♪
Bye, Claire.
♪ But something's changed, and I don't know why ♪
♪ Never felt so close, but now I know it's over ♪
♪ And all I wanna do is go home with you ♪
["SURROUND ME" BY LÉON PLAYING]
♪ The lights go down ♪
♪ I want you around me ♪
♪ Oh, oh, oh ♪
♪ Ohh-oh ♪
♪ Don't overthink it ♪
♪ Just finish up your drink ♪
♪ And surround me ♪
DR. LEVY: I have applications for fellows,
not one of them has a clue how to write an...
I'm Dr. Shaun Murphy.
I'm a resident here.
♪ Surround me ♪
I'm Dr. Jake Levy, surgical oncology.
Toby Yang, pathology.
May Curtis, ortho.
Apparently I was wrong.
I told Dr. Murphy he'd be fine renting a tuxedo.
Clearly, he chose not to listen.
[CHUCKLES] I'm sorry.
Don't be. You look fantastic.
What is it... Armani?
Yes, it cost...
No, whatever you paid for it, it was worth it.
How's the golf game, Jake?
- Oh, same as always.
- Mm.
I know how that is.
You play golf, Murphy?
I have, but I don't like it.
None... None of us do.
You know what they say... "Golf is a good walk spoiled."
♪ So don't let me go ♪
♪ No, don't let me go ♪
The Good Doctor DVDs
The Good Doctor Instant Video
The Good Doctor Collectables
|
cc/2020-05/en_middle_0102.json.gz/line1940
|
__label__cc
| 0.585765
| 0.414235
|
Get a TransferWise Mastercard® New
Adjusting to life as an Italian in the UK
###The UK is now the top destination for Italians working abroad. There are over 130,000 working here and another 10,000 studying.
The UK has great career opportunities, some amazing scenery to explore - and let's just not talk about the weather.
There are a few things the Brits do differently that you need to know. So, when (not) in Rome…
####Your Italian is wrong
Don’t expect Brits to speak Italian – except when ordering food. Then it’s painful to listen. The worst part is that you now have to mispronounce Italian words too.
From now on:
Bruschetta has a ‘sh’ sound.
Panini is singular.
The g in gnocchi is no longer silent.
Espresso inexplicably has an X in it.
Get this wrong and Brits will actually correct your pronunciation of Italian words.
####Don't acclimatise
Britain can be cold and wet. You were prepared for that. You brought your biggest umbrella, warmest coat and biggest scarf.
You probably weren’t prepared to see Brits half-naked at the same time. When the sun is out, Brits get their tops off in the park. When they’re having a night out, anything goes.
Warmly dressed Italian student Amelia Porée at Brighton University is still trying to make sense of it all:
“Brits look out their windows at the weather then dress for a totally different climate. They like talking about the weather, but don’t seem to actually feel it.”
####The Unwritten Rules
Brits don’t often show their displeasure.
In fact, bump into someone and they’ll apologise. But there are things Brits really don’t like, which can seem normal to Italians.
Never talk about money or how much you earn. Don’t visit someone at home unexpectedly. Don’t stand on the left of an escalator. Don’t make conversation on public transport.
Break any of these rules and there’s a real risk someone might tut at you.
The most important rule is to never push in line. Queueing is the UK’s national pastime.
####Understand the British bathroom
The first thing you’ll notice stepping into a British bathroom is the carpet.
To an Italian, carpets and bathrooms go together like Crocs and… well, anything.
In contrast, one perfectly sensible bathroom feature is nowhere to be seen. Try explaining a bidet to a Brit and watch them recoil in horror.
Then you go to wash your hands and find two taps. One is freezing. One will burn you. Take your pick. The Brits are great at engineering, yet combining hot and cold in one tap is beyond them.
####Opening a bank account
While it used to be a tedious process to open a bank account in the UK, nowadays you just need to present a proof of identity and proof of address.
Several banks allow you to open an account before you even arrive in the U.K.
Check out this guide on how to open a bank account in the UK for more.
####That’s fantastic
Don’t be surprised if, when telling your boss that you will be back from lunch in a half hour, she proclaims “OK fantastic!”
No, your newfound speedy eating habits are not a stellar accomplishment in her eyes. Rather Brits are accustomed to saying “Great!” or “Fantastic!” as a means of confirmation.
However, the seemingly positive phrase “That’s interesting” can be a subtle way of saying, “I’m not fully convinced” in Brit-speak.
####Finding a flat
Especially in a city like London, finding a decently priced room can feel a bit like trying to locate the Loch Ness Monster.
But not all hope is lost. Gumtree is a comprehensive -- and free -- starting point. Yet, although they require a subscription, Easy Roomate and SpareRoom can yield quicker results, expats tell us.
And looking to buy or rent your own place? Try Rightmove.co.uk.
####Don't get overcharged sending money to Italy
You've bagged a great job in the UK, but you still have bills or a mortgage to pay at home.
Using the banks or PayPal to send money can cost you up to 5%. That's expensive.
TransferWise is up to 8x cheaper compared to using traditional banks and brokers. Simple.
Download the App for iOS & Android.
วิธีการที่จะช่วยให้คุณส่งเงินจากอังกฤษกลับไปยังประเทศไทยได้ง่ายมากขึ้น
**คุณยังคงใช้ธนาคารหรือนายหน้า ในการส่งเงินไปยังประเทศไทยอยู่รึเปล่า? TransferWise เป็นอีกหนึ่งตัวเลือก ที่จะช่วยให้คุณส่งเงินปอนด์...
The wise way to send money from the UK to Thailand
คุณยังคงใช้ธนาคารหรือนายหน้า ในการส่งเงินไปยังประเทศไทยอยู่รึเปล่า? TransferWise เป็นอีกหนึ่งตัวเลือก ที่จะช่วยให้คุณส่งเงินปอนด์...
The wise way to pay an international invoice in the UK
If you’re a small business in the UK that operates overseas, TransferWise could save you a lot of time and money when you pay invoices in foreign currencies,...
The wise way to get paid as a freelancer in the UK
If you’re a freelancer living in the UK with clients overseas, TransferWise could save you a lot of money when you get paid, compared to your bank or...
The wise way to send money from Spain to India
Still using a bank or a broker to send money to India? There’s now a smarter, cheaper way.If you send euros to India, TransferWise could save you a lot of...
The wise way to send money between Spain and the UK
Still using a bank or a broker to send money to the UK? There’s now a smarter, cheaper way.If you send euros to the UK, TransferWise could save you a lot of...
|
cc/2020-05/en_middle_0102.json.gz/line1941
|
__label__wiki
| 0.808585
| 0.808585
|
Sign up for our free email newsletters
What might be lurking in Trump's tax returns
Jeff Spross
Illustrated | Chip Somodevilla/Getty Images
Our free email newsletters
10 things you need to know today
Today's best articles
Today's top cartoons
The good news newsletter
The week's best photojournalism
Daily business briefing
Daily gossip newsletter
Parenting newsletter
House Democrats have officially demanded six years of President Trump's tax returns.
While it isn't legally obligatory, it's a long-established norm that presidential nominees release their tax returns for public perusal. Trump is the first to adamantly refuse since the days of President Nixon. And now Democrats have legally-enforceable investigative and subpoena powers, thanks to their new majority in the House. This means we may soon get a glimpse of Trump's tax returns.
So what might we find?
It goes without saying that he acts like a man with something to hide. But what, in the fevered brain of Donald J. Trump, qualifies as something worth hiding?
As Ryan Lizza wrote in The New Yorker, "Trump's full tax returns ... would reveal how much he donates to charity, what tax rate he pays, whether he pays federal taxes at all, and whether he receives income from foreign sources that could create conflicts of interest. They would shed light on whether his net worth is as high as he claims."
Trump is vain and egotistical. He likes to try to wow people with his fortune. And we know he's gone to extraordinary lengths to inflate — and straight-up lie about — the scale of his wealth. A former Forbes reporter said that, in the 1980s, Trump impersonated an aid on a phone call to claim riches he didn't have in order to get himself on the Forbes 400 list — the magazine's annual ranking of the wealthiest Americans. Perhaps Trump doesn't want to release his tax returns simply because his fortune is actually unimpressive when compared to those of other tycoons.
We also know, thanks to a major 2018 report in The New York Times, that Trump inherited around $413 million from his father, despite insisting his parents did not help him build his fortune. A thorough review of his tax returns could punch some holes in the "Donald Trump: Self-Made Billionaire" mythos.
Then there's the matter of tax evasion. That same Times report also revealed a massive and long-running effort by the whole Trump family to evade taxes through corporate shell companies and the like. Another story that dug up his 1995 tax returns showed Trump deducted a near-billion dollar loss, potentially allowing him to pay nothing in taxes for almost the next 20 years.
This sort of white-collar tax evasion by the wealthy is more a matter of manipulating the tax code than of outright lawbreaking. And Trump certainly hasn't been coy about his willingness to work tax law to his advantage. "That makes me smart," he declared on the campaign trail. But perhaps Trump knows voters might not be so nonchalant if the full extent of his tax evasion is made public.
The last possibility is that Trump's tax records would provide investigators with substantial evidence of outright fraud.
Late last year, ProPublica co-published an investigation with WNYC into the Trump Organization's international deals. They found many of the projects bore evidence of deception. Writing in The New Yorker, Adam Davidson summed up how the business realm of real estate can be fertile ground for various schemes: You can inflate both the money you yourself have poured into the project, as well as the number of buyers you already have ready to go for the units. That exaggerates the market value of the project, leading other investors to pile on. When the project goes belly up, you walk away unscathed because you were paid upfront and throughout the project. The other investors are left holding the bag. "The Trumps repeatedly lied about these two factors," Davidson wrote, "telling potential investors that far more units had been sold than really were and saying that they had invested much of their own money in the projects."
The final mystery, though, is why other people continued doing business with Trump, long after it was clear his endeavors tended to fail miserably. Time and again, Trump has been saved by injections of fresh money from eager investors, and especially from major banks to which he was deeply indebted.
The late 1990s were around the time when Trump shifted his business model from direct real estate development to essentially providing a brand name that could be placed on everything from buildings to books to TV shows to steaks to private universities. Once Trump's value lay in his brand and his self-promotion, rather than any actual real estate, his creditors may have felt they had to salvage him to keep the money flowing in.
That's one explanation. But as Davidson observed, another explanation for why Trump's partners kept coming back is that they weren't in the real-estate business to actually succeed at real estate: "Perhaps, the evidence suggests, some of Trump's partners are in the money-laundering and financial-fraud industries."
We should be careful here, especially in light of how Special Counsel Robert Mueller's investigation recently ended. If Occam's razor is any guide, it's possible that ego and cravenness alone are sufficient to explain Trump's refusal to release his tax returns. But the case is definitely borderline. If there is criminality, it's less likely to come in the form of a grand conspiracy to steal an election than it is to be found in the everyday swindles of a jumped-up used car salesman.
Try 1 Month of The Week
More from Jeff Spross
How Trump's hatred of international cooperation weakened the China deal
The paradox of Trump's trillion-dollar deficit
6 rules for a new global trade order
5 scathingly funny cartoons about the Bernie Sanders-Elizabeth Warren feud
The Week Staff
Fox News' Chris Wallace says Lindsey Graham's view on impeachment witnesses 'directly contradicts' his 1999 position
Summer Meza
Giuliani says he'd 'love' to testify in Senate impeachment trial
|
cc/2020-05/en_middle_0102.json.gz/line1944
|
__label__cc
| 0.710595
| 0.289405
|
The Murals of Coit Tower
Posted by DHH under San Francisco, USA
Department Store by Frede Vidor
In January 2008, the Coit Memorial Tower was listed on the National Register of Historic Places, not for the building’s Art Deco design, but for its 27 murals that grace the rotunda and inner stairwell of the structure.
When the Coit Tower was completed in 1933, its interior consisted of 3,000 ft2 of blank wall space. In early 1934, the building was chosen by the Public Works of Art Project (one of several federal agencies that put people to work during the Depression), to support professional artists.
Twenty-six Bay Area artists were hired to create the artwork. Together, they created a unified theme of Aspects of Life in California. The American art scene at the time was divided into two distinct schools: Regionalism which glorified rural America, and Social Realism, which offered a more critical and urban view of society.
The Coit Tower murals remain a definitive representation of the art of the Great Depression.
— Abbreviated text based on the information board inside the Coit Tower building
Coit Tower Murals
California by Maxine Albro
Library by Bernard Zakheim
After Diego Rivera’s Man at the Crossroads mural was destroyed by its Rockefeller Center patrons for the inclusion of an image of Lenin, the Coit Tower muralists protested, picketing the tower. Sympathy for Rivera led some artists to incorporate leftist ideas and composition elements in their works. Bernard Zakheim’s Library depicts fellow artist John Langley Howard crumpling a newspaper in his left hand as he reaches for a shelved copy of Karl Marx’s Das Kapital with his right. — Wikipedia
Man at the Crossroads by Diego Rivera
A photograph of the original unfinished mural, before its destruction, was taken by Lucienne Bloch, one of Diego Rivera’s assistants. — From: Man at the Crossroads by Diego Rivera
Industries of California by Ralph Stackpole
Ralph Stackpole’s Industries of California was composed along the same lines as an early study of the destroyed Man at the Crossroads. — Wikipedia
News Gathering by Suzanne Schueur
City Life by Victor Anautoff
California Industrial Scenes by John Langley Howard
John Langley Howard’s mural depicts an ethnically diverse Labor March as well as showing a destitute family panning for gold while a rich family observes. — Wikipedia
The History of Coit Tower
This 10-minute video describes the history of the Coit Tower and the exemplary dedication of the volunteers of the Pioneer Park Project to, among other things, restore the murals.
A view of the Coit Tower from Treasure Island
(photograph by Dr Karl Axel Sträng)
(Click on the images to enlarge them).
|
cc/2020-05/en_middle_0102.json.gz/line1955
|
__label__wiki
| 0.775254
| 0.775254
|
Producer Gary Goddard Accused of Sexual Misconduct by Eight Former Child Actors
by Staff 2
Hollywood writer-producer Gary Goddard has been accused of sexual misconduct by eight former child actors he reportedly mentored in the 1970s, while he was in his 20s.
According to a Wednesday report in the Los Angeles Times, the 65-year-old Masters of the Universe director allegedly molested and sexually harassed several young boys near his hometown of Santa Barbara while he was working on local youth theater productions.
The eight former child actors — all from the same youth theater group — include Emmy-winning actor Anthony Edwards, who previously detailed his alleged abuse at the hands of Goddard in a November essay.
“This is a man who’s attracted to little boys, and attracted in the sickest way,” Edwards, now 55, told the Times. “This is not love, this is not friendship what he was doing. It is a horror because it is manipulating young hearts and minds.” – READ MORE
Matt Damon Skips Film Premiere amid Backlash over Sexual Harassment Comments
Trump administration finds success in bringing home Americans detained abroad
Staff 2 December 21, 2017
EXCLUSIVE: Barr & DOJ Covering Up Massive NEW Hillary Clinton Scandal That Will Rock D.C.
Politics, Video
VEEPSTAKES: Cory Booker Says Dems Shouldn’t Have Two White Men on Ticket Anymore (VIDEO)
Chuck Schumer Says Bolton Should Be Subpoenaed in Senate Impeachment Trial (VIDEO)
Iranian National Arrested Near Mar-a-Lago with Machete, Knives Came to U.S. as Refugee
VA Democrat’s Bill Would Make Owning Legally Bought Suppressors a Felony
|
cc/2020-05/en_middle_0102.json.gz/line1957
|
__label__wiki
| 0.602664
| 0.602664
|
FBI — Incidents and Offenses
Home • Hate Crime • 2014 • Topic Pages • Incidents and Offenses
The Uniform Crime Reporting Program collects data about both single-bias and multiple-bias hate crimes. For each offense type reported, law enforcement must indicate at least one bias motivation. A single-bias incident is defined as an incident in which one or more offense types are motivated by the same bias. As of 2013, a multiple-bias incident is defined as an incident in which one or more offense types are motivated by two or more biases.
Important note about rape
In 2013, the FBI UCR Program initiated the collection of rape data under a revised definition and removed the term “forcible” from the offense name. The UCR Program now defines rape as follows:
Rape (revised definition): Penetration, no matter how slight, of the vagina or anus with any body part or object, or oral penetration by a sex organ of another person, without the consent of the victim. (This includes the offenses of rape, sodomy, and sexual assault with an object as converted from data submitted via the National Incident-Based Reporting System [NIBRS].)
Rape (legacy definition): The carnal knowledge of a female forcibly and against her will.
The offenses of fondling, incest, and statutory rape are included in the crimes against persons, other category.
The revised and legacy rape totals are provided in Tables 2, 3, 4, 7, and 11 of Hate Crime Statistics, 2014. (See the Methodology for more information about this program change as well as others.)
In 2014, 15,494 law enforcement agencies participated in the Hate Crime Statistics Program. Of these agencies, 1,666 reported 5,479 hate crime incidents involving 6,418 offenses.
There were 5,462 single-bias incidents that involved 6,385 offenses, 6,681 victims, and 5,176 known offenders.
The 17 multiple-bias incidents reported in 2014 involved 33 offenses, 46 victims, and 16 offenders. (See Tables 1 and 12.)
Single-bias incidents
Analysis of the 5,462 single-bias incidents reported in 2014 revealed that:
47.0 percent were racially motivated.
18.6 percent resulted from sexual-orientation bias.
18.6 percent were motivated by religious bias.
11.9 percent stemmed from ethnicity bias.
1.8 percent were motivated by gender-identity bias.
1.5 percent were prompted by disability bias.
0.6 percent (33 incidents) resulted from gender bias. (Based on Table 1.)
Offenses by bias motivation within incidents
Of the 6,385 single-bias hate crime offenses reported in the above incidents:
48.3 percent stemmed from racial bias.
18.4 percent were motivated by sexual-orientation bias.
17.1 percent resulted from religious bias.
12.4 percent were prompted by ethnicity bias.
1.7 percent stemmed from gender-identity bias.
1.5 percent resulted from bias against disabilities.
0.6 percent (40 offenses) were prompted by gender bias. (Based on Table 1.)
Racial bias
In 2014, law enforcement agencies reported that 3,081 single-bias hate crime offenses were racially motivated. Of these offenses:
63.5 percent were motivated by anti-Black or African American bias.
22.8 percent stemmed from anti-White bias.
5.5 percent resulted from anti-Asian bias.
4.6 percent were motivated by anti-American Indian or Alaska Native bias.
3.6 percent were a result of bias against groups of individuals consisting of more than one race (anti-multiple races, group).
0.1 percent (4 offenses) were motivated by bias of anti-Native Hawaiian or Other Pacific Islander. (Based on Table 1.)
Sexual-orientation bias
In 2014, law enforcement agencies reported 1,178 hate crime offenses based on sexual orientation bias. Of these offenses:
58.0 percent were classified as anti-gay (male) bias.
23.6 percent were prompted by an anti-lesbian, gay, bisexual, or transgender (mixed group) bias.
14.3 percent were classified as anti-lesbian bias.
2.6 percent were classified as anti-bisexual bias.
1.5 percent were the result of an anti-heterosexual bias. (Based on Table 1.)
Hate crimes motivated by religious bias accounted for 1,092 offenses reported by law enforcement. A breakdown of the bias motivation of religious-biased offenses showed:
16.3 percent were anti-Islamic (Muslim).
11.0 percent were anti-other (unspecified) religion. (Based on Table 1.)
Ethnicity bias
Of the single-bias incidents, 790 offenses were committed based on the offenders’ biases toward the perceived ethnicity of the victims. Of these offenses:
52.4 percent were anti-Not Hispanic or Latino bias. (Based on Table 1.)
47.6 percent were anti-Hispanic or Latino bias.
Note, the term anti-not Hispanic or Latino does not imply the victim was targeted because he/she was not of Hispanic origin, but it refers to other or unspecified ethnic biases that are not Hispanic or Latino.
Gender-identity bias
Of the single-bias incidents, 109 offenses were a result of gender-identity bias. Of these:
69 were anti-transgender.
40 were anti-gender nonconforming. (Based on Table 1.)
Disability bias
There were 95 reported hate crime offenses committed based on disability bias. Of these:
69 offenses were classified as anti-mental disability.
26 offenses were reported as anti-physical disability. (See Table 1.)
There were 40 offenses of gender bias reported in 2014. Of these:
28 were anti-female.
12 were anti-male. (Based on Table 1.)
By offense types
Of the 6,418 reported hate crime offenses in 2014:
27.2 percent were intimidation.
26.4 percent were destruction/damage/vandalism.
23.6 percent were simple assault.
12.0 percent were aggravated assault.
The remaining offenses included additional crimes against persons and property. (Based on Table 2.)
Among the 6,418 hate crime offenses reported:
63.1 percent were crimes against persons.
36.1 percent were crimes against property.
The remaining offenses were crimes against society. (Based on Table 2.) (See Data Collection in Methodology.)
Crimes against persons
Law enforcement reported 4,048 hate crime offenses as crimes against persons. By offense type:
0.3 percent consisted of 4 murders and 9 rapes (all 9 rapes were submitted under the UCR Program’s revised definition of rape). (See Methodology for more details about changes in the definition of rape in the UCR Program.)
0.1 percent involved the offense category other, which is collected only in the NIBRS. (Based on Table 2.)
The majority of the 2,317 hate crime offenses that were crimes against property (73.1 percent) were acts of destruction/damage/vandalism.
The remaining 26.9 percent of crimes against property consisted of robbery, burglary, larceny-theft, motor vehicle theft, arson, and other crimes. (Based on Table 2.)
Crimes against society
There were 53 offenses defined as crimes against society (e.g., drug or narcotic offenses or prostitution). (See Table 2.)
By victim type
When considering the type of victims among the reported 6,418 hate crime offenses:
82.4 percent were directed at individuals.
4.8 percent were against businesses or financial institutions.
2.4 percent were against religious organizations.
2.3 percent were against government.
0.8 percent were against society/public.
The remaining 7.4 percent were directed at other/unknown/multiple victim types. (Based on Table 6.)
Hate Crime Statistics Act
Variables Affecting Crime
Tables by Title
About UCR
FBI UCR Contacts
State UCR Contacts
Roll over table numbers for table titles.
Participation Table
|
cc/2020-05/en_middle_0102.json.gz/line1966
|
__label__wiki
| 0.979065
| 0.979065
|
Home Entertainment Lauryn Hill Drops First New Solo Song in Five Years: Listen –...
Lauryn Hill Drops First New Solo Song in Five Years: Listen – XXLMAG.COM
Ms. Lauryn Hill is back with brand new music.
On Friday (Nov. 15), the former Fugees crooner dropped her first solo song in five years. The song “Guarding the Gates” starts off with a graceful guitar riff followed by sweet, soulful vocals from the veteran singer.
“All that you could be is a spectacle, following after every single miracle/Watch them marvel at, all the joy you have/But they’re too important to have all the joy you have, what a tragedy, you can laugh at me,” Hill sings on the record.
As we reported last month, “Guarding the Gates” stems from the official soundtrack for the upcoming film Queen & Slim. The song is the first solo record Hill has released since she dropped her 2014 song “Black Rage,” which she dedicated to the people of Ferguson, Mo. who protested after Michael Brown was shot and killed by a police officer.
In the years following “Black Rage,” Hill has managed to remain relevant after prominent rappers sampled her iconic lyrics in songs like Drake’s “Nice for What” and Cardi B’s “Be Honest.” Recently, the New Jersey native appeared alongside Pusha-T in his 2019 single “Coming Home,” which will appear on his upcoming album.
Hill has also kept her fans at bay by touring around the world. Last year, the singer embarked on The Miseducation of Lauryn Hill 20th Anniversary Tour. In the beginning, the tour included Nas and singer Santigold. However, Hill’s tour experienced a slew of issues and both opening artists were suddenly dropped from the line-up without notice.
Listen to Lauryn Hill’s new song “Guarding the Gates” below.
See the 25 Longest-Charting Hip-Hop Albums in Billboard 200 History
Previous articleSwitch to vaping ‘helps smokers’ hearts’ – BBC News
Next articleKanye West’s Appearance at Joel Osteen’s Lakewood Church Brings Out the Scalpers – TMZ
Coldplay pause touring until they can offer ‘environmentally beneficial’ concerts – The Guardian
Apple abruptly cancels premiere of Samuel L. Jackson movie ‘The Banker’ – CNN
Channing Tatum and Jenna Dewan Declared Single Almost 2 Months After Her Pregnancy Reveal – Yahoo Entertainment
Felicity Huffman sentenced in college admissions bribery scandal – Boston.com
|
cc/2020-05/en_middle_0102.json.gz/line1968
|
__label__wiki
| 0.661558
| 0.661558
|
THE BABA POLITICS: Utpal Kumar- An incisive article from The Pioneer
This article from the Pioneer is one of the best articles that I have seen; it is precise, objective and thought provoking. I hope you will enjoy it as much as I did.
Gaurang G. Vaishnav
AGENDA | Sunday, June 12, 2011 | Email | Print | | Back
June 13, 2011 11:21:30 AM
The vengeance with which the UPA has gone after Baba Ramdev shows its Emergency-like streak. However, it must understand that Ramdev and Anna Hazare are legitimate representatives of a society disgusted with corruption in high places. The authorities can suppress their voices, but the vacuum it will create will be filled by more violent and assertive forces, warns Utpal Kumar
Indiais on the brink of a ‘revolution’. In fact, two revolutions. One unleashed by an ‘austere’ man in a white cap not many would prefer to wear today. And, the other by a saffron-clad yoga guru, who doesn’t believe sannyasis can’t indulge in politics. One is a Gandhian who can sit cross-legged for hours, and is the darling of the metropolitan literati and chatterati. The other teaches indigenous ways to keep oneself healthy and has an unassailable hold over the masses of what is romantically called ‘Middle India’. The two complement each other. But that’s not the way the political establishment and the mainstream English media see it.
This disconnect was evident on a train from Bihar toDelhia day after the midnight drama was enacted at Ramlila Maidan. “How can police beat up people, most of them women and children, who have come from faraway places to participate in a satyagraha? They were not at all violent, were they? Imagine their plight in an unknown city in the middle of the night,” said a co-passenger, aDelhiUniversitystudent whose father worked on a farmland inBihar. “This Government can allow a Hurriyat hardliner led by a pro-Maoist writer-cum-activist to script a separatist agenda in the Capital, but it can’t endure a peaceful protest against growing corruption in the country,” he added.
Soon, others joined the debate. One was an Army jawan, another a salesman, and yet another a bank employee — all truly representatives of what Mahatma Gandhi called the realIndia. The number increased, but the sentiment remained more or less the same: That the UPA has acted in a most undemocratic manner to quell the protest; that the Government wouldn’t have dared to come down highhandedly had the protesters been fromDelhi’s upper classes, as was the case with Anna Hazare’s agitation at Jantar Mantar not very long ago.
InDelhi, however, one witnessed an altogether different political discourse, with focus not much on the issue of corruption and the Government’s crackdown on innocent people, but on whether the Baba was at all the right person to hold any such agitation. The central-peripheral divide never looked sharper. The media, too, wasn’t spared: While the English news channels — either cut-off from the realities of sub-urban India or owing to their compulsions to cater to their elite and upper middle class audience for whom the Baba and his followers were just another “funny characters” — toed the Government line, focussing on the alleged misdeeds of Ramdev and his colleagues. It seemed they blindly followed Congress leader Digvijay Singh’s Baba’s-a-thug line. In the process, they forgot to ask a few tough questions: How could the Government suddenly stumble upon so much evidence against the yoga guru? Does it mean that it keeps such evidences as an arm-twisting tool against its opponents for more opportune times? If so, doesn’t it implicate the Government for being hypocritical on the issue of corruption? If the UPA was so sure about the Baba’s ill practices, why did it dispatch four ministers to receive him at theDelhiairport? And, if it was so uneasy about his saffron links, why did it entertain him for hours at a five-star hotel inDelhi?
The Hindi news channels, in contrast, showcased a slightly more realistic picture of how the country was reacting to the Government’s midnight crackdown at Ramlila Maidan. Perhaps, because their TRPs are determined by the masses in small towns and villages!
ANNA VERSUS RAMDEV
Hazare may have inspired a large section of the metropolitan population into expressing concern over the culture of corruption, but the burgeoning small towns and villages remained mostly untouched by the Anna phenomenon. That is where Ramdev’s role comes into play, as any fight against corruption can’t succeed without the support of Middle India.
Ironically, those who welcomed Hazare’s call to clean the system are today circumspect about Ramdev. Not very long ago, it was a field day for celebrities — from Aamir Khan to Kabir Bedi — to show their solidarity with the Gandhian movement at Jantar Mantar. On Ramdev, however, the response has been plain disdainful. Salman Khan quipped, “Why is he going on a hunger strike? Isn’t he a yogi teaching yoga?” As for Shah Rukh Khan, he discovered “an agenda” in the Baba’s agitation!
The literati’s love for Hazare is both understandable and enigmatic. It’s understandable because this class detests everything mass-oriented and accepts anything coming from the media. And, Hazare is largely a media construct. If a magazine report is to be believed, about 15 years ago, when Hazare went on a fast to protest against corruption in the then Maharashtra Government, a group of reporters from the vernacular press virtually became his publicity agents. Facts were twisted, and numbers inflated to provide legitimacy to his movement. A week into the fast, when these fellow reporters told Hazare that they couldn’t sustain the movement any longer, the Gandhian wilfully relented to call it off on a Sunday. Here, again, there was a problem: On the proposed day, local elections were to be held in the State, an event that would obviously hog all the limelight. Hazare right away shifted his programme to Monday!
It’s enigmatic because there’s more about Hazare that should disorient the educated, elite class. Going by the way he runs a village in Maharashtra, he cannot be called ‘democratic’ by any means: He prefers the hands of a thief to be chopped off; he wants anyone found drinking to be tied to a pole and publicly flogged; he believes in rigid implementation of family planning, including forced vasectomies; and, he advocates the corrupt be hanged to death!
Maybe Hazare is acceptable because he doesn’t seem to threaten the status quoist upper middle class dreams. He just wants cosmetic changes at the top — bring the Lok Pal Bill and all’s well! It must be understood that while the upper middle class has the right to be disgusted with corruption, it is also a major beneficiary of the malaise. After all, despite it raising this issue, it is primarily this class that gets the maximum benefits from the bribes MNCs pay to politicians to create a hurdle-free economic milieu. Bribes, in a way, are needed for ‘swift’ economic development in the country where governance isn’t truly efficient. It is a way of buying efficiency, as a bureaucrat working in the Finance Ministry said.
Today’sBiharis the best example of this trend. People in the State complain that with development, bureaucratic corruption has touched new heights. “Pahle jo kaam pachas rupaye mein hota tha, ab 5,000 mein bhi nahin hota (Earlier a work could be done in Rs 50, but today even Rs 5,000 is not enough),” said a schoolteacher in a northeastern district of Bihar. Yet, people seem content as the State has never witnessed such unprecedented flow of money. “Everyone is getting richer here. Lifestyle has improved. So, people doesn’t mind paying bribes to get their work done in the State,” said a Patna-based businessman. Some, including a Patna Women’s College professor, however, believe the Nitish Government should curb this malaise before it actually gets institutionalised.
The upper middle class, therefore, isn’t quite the victim of corruption as it pretends to be. Instead, it is the beneficiary of the system, however corrupt it may be. The real victims are the ones that have been left out or are on the fringes of the emerging economy. The Baba represents this section of Indian society. And, it’s for this reason that his movement needs to be welcomed, and not derided.
What’s further bolstering Ramdev’s case is that unlike other gurus, he is not “foreign-imported”, as one of his ardent followers says. He first strengthened his network in the country, and it was only in 2006 that he made his first trip abroad. No wonder, his worldview is rural-oriented, and he wants technical courses to be taught in the mother language. It’s, therefore, hardly a surprise that his politico-economic ideas became an instant hit among rural Indians, left behind in the race for economic prosperity by the English-speaking elite. What helped him strike a chord was a daily TV show being aired on the Aastha channel since 2005.
BLAME THE GOVERNMENT
Ramdev is as much the product of skewed globalisation as he is of the failure of our political leadership to deliver. After all, today we face the possibility of a political movement led by a yoga guru simply because our political leadership has failed us. Had Suresh Kalmadi been forced to resign when the Commonwealth shames first surfaced, the scandal would have died a natural death! Had A Raja been removed from his office the moment bad press appeared against him, the 2G scandal would have lost much of its sting! Nothing of the sort happened, hence the full-throated demand for a ‘systemic change’. Hence the emergence of a Baba and a Gandhian!
Well into its second term, the UPA seems both rudderless and directionless. So is Manmohan Singh. This was a man who gave his Government “six on 10” in a report card in 2005, one year after he became Prime Minister. People then thought he was being modest. Six years down the line, post several mind-boggling financial irregularities, Singh is neither modest, nor he pretends to be the one; he arbitrarily gives his Government “seven out of 10”. He puts the entire blame on coalition politics. For him, the DMK should be solely blamed for the 2G scam! And, Sharad Pawar’s NCP should be responsible for food inflation!
Such excuses would have worked well during the UPA-I regime when the Congress had 145 seats, but not in 2009, when the party is just 66 seats short of an absolute majority of 272. No ruling party has been so ‘secure’ in the Lok Sabha since 1991. But then the humility of 2005 has given way to the arrogance of 2011. And, it was this arrogance that was seen at Ramlila Maidan early this month.
The vengeance with which the Government is going after the Baba shows its Emergency-like streak. The powers-that-be must understand that Ramdev and Hazare are two sides of the same coin. Inventing cases of corruption against those who are asking tough questions would make people cynical and force them to take recourse to more extreme measures. Look what’s happening inWest Asia! Who would have imagined six months ago that the Arab world would be in such a state of turmoil, as it is now? Hazare and Ramdev are for the good of the Government: They are its safety valve.
COMMENTS BOARD ::
Truth about India’s flaky economy.
By K P Ganesh on 6/12/2011 8:40:42 PM
I wish readers of this article to google for DEBATE ON GATT a wonderful speech given way back in 1994 by Sri. S Gurumurthy on how India’s quest for globalization has resulted in this kind of catastrophic effect, marginalizing the so called middle India who are working thrice as hard to keep India afloat, compared to their urban dwelling brothers and sisters.
UPA folly
By Ramesh on 6/12/2011 3:57:47 PM
UPA is waiting for a West Asia-like situation to happen in this country.
literarti and Hazare
By SM Singh on 6/12/2011 3:32:10 PM
Really loved this line of yours: “The literati’s love for Hazare is both understandable and enigmatic. It’s understandable because this class detests everything mass-oriented and accepts anything coming from the media. And, Hazare is largely a media construct.” Great piece.
By Raj on 6/12/2011 12:14:49 PM
Good that swamiji today ended his fast. However, this has exposed how insensitive the rulers are.
By abhinav kumar on 6/12/2011 10:57:46 AM
A true and an excellent peice of an article!!! well done u have presented the true picture.
THE BABA POLITICS
By Hare Ram on 6/12/2011 9:21:59 AM
Very well written. This is a first positive article ever read on media about Baba. Seems like all other medias joined Congress. I don’t care how much money Baba made but all the issues he raised are legitimate. I don’t think he cheated any one.
More leaders needed
By Rahul on 6/12/2011 8:15:32 AM
Lessons from the freedom movement is (particularly after Gandhiji’s 1915 India arrival), do not allow the rulers to highlight only one or two netas with whom they are comfortable with and undermine other Leaders of the movement. Bapu and hon J Nehru were the two netas overshadowing others during the transfer of power in 1947 and the bloody partition of the Country. A similar pattern of Hazare undermining all other leaders of the anti corruption movement must be prevented from developing.
A Million Revolutions In a Wounded Civilization
By Maheswar inKathmanduon 6/12/2011 7:14:26 AM
V S Naipaul astutely foresaw the million revolutions bubbling, all overIndia, having first viewed it as a wounded civilization. All these revolts and wounds are now surfacing as the voice of the ‘real’India, the vast new middle class that barely earn $2-4 per day, who are vulnerable to the downswings of globalization, its inequities and immoralities. They want modernity with their traditional identities in place; not be caricatures of the West as are the upper middle classes.
The truth few in India Know.
By sadia on 6/12/2011 4:12:22 AM
Indialost its independent status the day an illiterate but KGB trained honey trap appeared in Rajiv’s life. Then she lined up a job for being an interpreter of RAW with Italian secret service. She had already converted Rajiv from Muslim to Roberto to marry her.She brought Italian Mafia in form of Quotrocchi. Rajiv already had started receving money from Soviet government in swiss Bank. When Rajiv threatened to divorce her Quotrocchi met Prabhakaran to sort problem out.
By panchali on 6/12/2011 12:59:36 AM
Very well commented. I totally agree with you that the UPA’s mistreatment of Baba Ramdev is going to backfire on the Government big time. I also liked you Anna versus Baba comparision. But the best was the safety valve theory.
Thank God for this article
By Soumya Dutta on 6/12/2011 12:45:25 AM
I was losing belief completely and truly in the Indian print media when the involuntary death of MF Hussain was being given greater preference to the well meaning and fully voluntary fast undertaken by Ramdev. It is a shame that the media derides the yoga guru who has today undertaken a fast to cleanse the system of its 60 years-old evil by petty journalism. Having said and that and then having read this article, I firmly believe not everything has been lost.
http://www.dailypioneer.com/DisplayContent.aspx?ContentID=345167&URLName=THE-BABA-POLITICS
Posted in Baba Ramdev's Arrest, Congress (Bharat), Congress Hooligans, Corruption, Corruption-Bharat, Injustice to Hindus, Sonia Gandhi
Tags: 2G, Aamir Khan, agitation, Anna, arrogance, Baba, Bihar, bribe, Corruption, directionless, disdainful, DMK, elite, emergency, extreme, Gandhian, Hazare, Hurriyat, India, innocent, leadership, Manmohan Singh, Middle India, movement, NCP, political establishment, Raja, Ramdev, ramlila, revolution, rudderless, Salman Khan, satyagraha, separatist agenda, Shahrukh Khan, Suresh Kalamadi, Thug, undemocratic, UPA, upper middle class, vengeance
|
cc/2020-05/en_middle_0102.json.gz/line1981
|
__label__wiki
| 0.524886
| 0.524886
|
A week in Islamic Spain: 2 Córdoba
October 9, 2019 by vickyunwin 2 Comments
The Mezquita from the Roman Bridge
We leave Seville quite late (after our trip to the Alcazar) for Córdoba. On the way we detour to the most extraordinary site, the Madinat Al-Zahra (the shining city) built from 940 AD by the first Caliph of el-Andalus, Abd al Rahman III. Very little remains as, after the fall of the Umayyad Caliphate, the city was ransacked for its stone and marble. It was not excavated until 1911, and now only one-tenth of the site has been revealed. The museum showcases the extraordinary opulence of this period, with carved marble columns, gold ornaments and jewellery, bronzes and ceramic vessels.
It is well over 30 degrees and by the time we reach Córdoba I am done in! Our hotel, the Casas de la Juderia is cool and welcoming, set around several courtyards in traditional style, it even has a roof-top pool, cold and refreshing.
another day another beer!
Inside the hotel
Outside the hotel
Traditional courtyard in the hotel
Another traditional courtyard in the hotel
We take a stroll around the Jewish quarter and around the Mezquita where we perceive no queues! Córdoba is much quieter than Seville although the two or three main tourist drags are lined with gaudy shops selling flamenco aprons and other useless knick-knacks. We walk through the throngs (more Chinese gangs) to dinner in the old town, mown down by a fun run en route. As ever the portions are enormous and I am beginning to tire of tapas, and all that fried food. For the record, orange and salted cod salad is disgusting (I was in search of something fresh!)
Terrified of having to queue again, we set the alarm for 7 am in order to be first in line for the opening of the Alcazar at 8.15. We arrive in darkness; the cleaners glance askance at us as we sit to wait in the cold dawn. By 8 am only one other person has arrived, a chatty Frenchman who is walking round Andalusia. We are the first inside. I am not surprised there is no queue as the building itself is disappointing internally; it was used as a prison during the inquisition and still has that feel. But the Mezquita and the gardens shimmer softly in the glow of the rising sun.
The Alcazar gardens
View from the Alcazar towards the Mezquita at dawn
As our tour is not until the next day, we visit various local points of interest. The synagogue, as I said in the last blog, is one of only three remaining in Spain. It has fine Mujedar-style (although Islamic this style was used by Jews and Christians alike, so is a hybrid of cultures as we see much later in Alhambra) stucco work dating from its founding in 1315, which was only recently uncovered as the synagogue had been converted into a church after the expulsions. This is a theme of many of the buildings here – all built on foundations of another, be it a Visigoth basilica, Roman temple, mosque or synagogue.
Interior of the Casa Andalusi, a museum to a way of life
In the synagogue the inscriptions that remain are of psalms and scriptures
The Sephardi house opposite gives a potted history of the Sephardi community in Córdoba and celebrates the life of its most famous son Maimonides, erudite scholar and doctor, who eventually fled to Morocco and Egypt. It is still searingly hot but, after a stroll across the Roman bridge with its marvellous views of the Mezquita, we stagger out to the Botanical Gardens, which are disappointing and far! The reward is a swim, and a fine dinner at Regadera with not a tapa in sight, and some inventive modern cooking.
reflections of the Mesquite
Never seen a pomegranate hedge before – Botanical gardens
More lettuces than flowers in teh Botanical gardens
Even more lettuces!
Daniel in the lion’s den – a roman carving in the fine museum
Seabass ceviche in carrot gazpacho
Asparagus said with Iberico ham
All about the lemon with a sugar bomb!
Tempura hake with a paprika foam
Before that, we decide to have a preview of the Mezquita prior to our tour. At 5 pm we have no difficulty getting tickets and astonishingly it is almost empty, save a few Chinese posing for selfies, and we are able to take unhindered photographs.
Amazingly empty, view down towards the entrance to the first mosque with the original stucco work, columns and arches built in brick and limestone
The hybrid styles of Moslem and Christina architecture begin
Area closed off by Charles V to build his wretched organ
The enormous arched interior, built from scavenged Roman columns (the first mosque was built in a year by Caliph Abd al-Rahman III – he of the Madinat al-Zahra fame, quite a prolific chap – in the 10thcentury) with brick and stone arches, is monumental in scale and quite wondrous. It was built over a Visigoth basilica, whose remains can also be seen underneath the floor, and might explain why the mosque does not face east towards Mecca, but south. The clever architect gave a further feeling of spaciousness by alternating red with grey marble columns. We are grateful the next day for our guide’s explanations of all we have seen. And feel the money is well spent.
See the red and grey alternating pillars
Hybrid styles again
The Tower which was minaret
I suppose one could be charitable and say, thank goodness Charles V didn’t do the normal raze and rebuild, but simply inserted an intricately carved baroque marble cupola, altar and mahogany choir stalls within the mosque’s fabric – though it is said that, when he saw that he had been tricked by his confessor and bishop, Charles was furious, ‘there is only one mosque and thousands of cathedrals!’ Essentially it is a cathedral built within a mosque, even the minaret is encased in a gothic tower.
The cupola
The hideous Cuban mahogany altar piece commissioned by Charles V
The Mujedar style full flow…
Another intricate baroque ceiling
Baroque ceiling in the cathedral – Charles V
One end of the first Church built in the Mesquite
The other end – including a RoseWindow so beloved of the Baroque era
To my mind it’s an abomination, but it makes for a spectacular interior! The mihrab of the third addition to the mosque is breathtaking, as is its roof, the Islamic parts knocking spots of the pompous Christian additions. The Mezquita must be one of the wonders of the world – certainly one of mine.
Fitness monitor: Day 1 : 14.7 kms (reflecting the slog to the Botanical Gardens), Day 2 only 8.8 (half the day spent in the car)
The roof of the Mihrab
The fabulous guided Mihrab encrusted with thousands of jewels
Categories: Food, Travel | Tags: Abd al Rahman III, Alcazar, andalusia, Charles V, cordoba, el-Andalus, Islamic architecture, Madinat Al-Zahra, Maimonides, Mesquite, Regdera, Sephardi Jews | Permalink.
Author: vickyunwin
I am a writer and traveller. Our darling daughter Louise died on 2 March 2011, aged 21 (www.louisecattell.com) and I started writing as therapy. We never know how long we have on this earth, so I live for every day...in November 2013 I was diagnosed and operated on for a malignant soft tissue sarcoma in the calf, followed by 6.5 weeks of radiotherapy, so am embarking on a different kind of journey which you can follow here. I also have another site www.healthylivingwithcancer.co with my blueprint for health and well-being.
2 thoughts on “A week in Islamic Spain: 2 Córdoba”
ourcrossings
Wow, Cordoba looks and sounds like an amazing place to explore and photograph, would love to visit one day 😀
vickyunwin
You must go!
A week in Islamic Spain 3: Granada & Alhambra
The Tea Horse Road to Shangri La 3: languishing in Lijiang
|
cc/2020-05/en_middle_0102.json.gz/line1982
|
__label__cc
| 0.715212
| 0.284788
|
Half Past
By Victoria Helen Stone
Publisher: Lake Union Publishing
At forty-five, Hannah Smith is at a crossroads. That’s her spin on it. The reality is she’s divorced, jobless, and moving back to her family home in Iowa to keep an eye on her mother, who’s slipping into dementia. Her return stirs up the same unnerving sense of disconnect Hannah has felt since childhood—always the odd girl out, the loner outshone by her two older sisters. Hannah knew the feelings of hurt would come back. But she never expected fear. Because when her mother looks into her eyes and whispers, “You’re not my daughter,” Hannah is beginning to believe it’s not just the rambling of a confused woman.
It’s the truth.
Now Hannah’s following the trail of a family mystery to the dark coast of Big Sur, where years ago a lie was born—and buried. As frightened as she is to unearth it, Hannah knows this is the last chance she has before her past—and all its terrible secrets are lost forever.
“A captivating, suspenseful tale of love and lies, mystery and self-discovery, Half Past kept me flipping the pages through the final, startling twist.” —A. J. Banner, #1 Amazon and USA Today bestselling author of The Good Neighbor and The Twilight Wife
|
cc/2020-05/en_middle_0102.json.gz/line1983
|
__label__cc
| 0.515339
| 0.484661
|
BILL O’GORMAN’S MOWING SERVICE.
From the Collection of Glen Eira Historical Society 965 Glen Huntly Rd Caulfield South Victoria
This file contains: A blank invoice for BILL O’GORMAN’S MOWING SERVICE, undated. The invoice includes the address and contact details of the business, including the ABN number, as well as a list of services offered.
business and finance, businesses, commerce, commercial equipment, gardening services, bill o’gormans mowing service, occupations, lawn care, garbage collection, pruning, tree removal, receipts, financial documents, o’gorman, bill, people associated with recreation, east bentleigh, moylan street, 51
2 May 2014 at 12:23PM
Recent additions by Glen Eira Historical Society View 1372 other items
Anzac Day and Rememberance Day
Glen Eira Historical Society, Caulfield South
This file contains 53 photo’s of the original photographs of Anzac Day and Remembrance Day Memorial Civic Services from years 1982, 1983, 1984, 1985 and 1986. Some of the photo’s identify location as Caulfield Park other photo’s include persons of interest i.e. Mayor and Mayoress of Caulfield, Members of Parliamemt and also RSL Presidents
This file contains 2 items., Item 1 Photocopy of order of Service for City of Caulfield. Civic Memorial Service held on 25 April (AnzacDay) year unknown, at Caulfield Park with Mayor of Caulfield presiding., Item 2 Original Order of Service program for ANZAC Memorial Civic Service on Sunday 16/04/2000
Petrov, Vladimir and Evdokia
Three items concerning Vladimir and Evdokia Petrov, Russian spies who defected to Australia in 1954 and who lived in East Bentleigh as Sven Gustav Allyson and Maria Anna Allyson., Two copies of an article in The Melbourne Weekly Bayside, May 12-18, 2004. Includes a photo of the couple and their East Bentleigh house., A print out from a real estate website showing a photo of the house at 96 Parkmore Road Bentleigh East with handwritten notes, Handwritten note regarding Sands and McDougall, Directory of Victoria 1960 which lists S.G. Allyson living at 96 Parkmore Road, Bentleigh East
Robertson, Alexander William
Two items., Photocopied typed pages from the National Trust of Australia, includes fourty-two poor copies of family photographs and a summary of information about Alexander William Robertson and LABASSA. 2 Manor Grove, Caulfield, by C. Kelloway, dated 03/02/1981., One handwritten page of references relating to Alexander William Robertson, life and business connections, undated, author unknown
Southwick, David
This file contains one item, A newsletter on the activities of David Southwick MP for Caulfield dated Autumn 2011
One copy of a thirty-two page colour book, published by the Friends of Labassa and The National Trust in 2004. The book details the history of Labassa as a place for social gatherings and entertaining of Melbourne society of the late nineteenth century, and its letter use as flats and a boarding house. Extensively illustrated with colour photographs, architectural sketches and plans, the book LABASSA: A GRAND VICTORIAN MANSION details Labassa’s architectural significance
Ormond Baseball Club
This file contains seven items., A stencilled letter from the Ormond Baseball club addressed to a member extending an invitation to a Reunion Smoke Night at the pavilion at Ormond Park, dated 28/07/2961, An article from the Caulfield/Port Phillip Leader on the division two standings where Ormond Glenhuntly Baseball Club was ranked twelve out of fourteen teams, 21/12/2010, An article from the Caulfield/Port Phillip Leader stating that Ormond Glenhuntly Baseball Club are one of three teams who are battling not to finish in last place, dated 11/01/2011, An article from the Caulfield/Port Phillip Leader in which Ormond Glenhuntly Baseball Club are ranked thirteen out of fourteen teams on the ladder, dated 11/01/2011, An article from the Caulfield/Port Phillip Leader in which Ormond Glenhuntly Baseball Club are said to be performing poorly, dated 15/02/2011, An article from the Caulfield/Port Phillip Leader in which Ormond Glenhuntly Baseball Club are ranked twelve out of fourteen teams on the ladder, dated 06/03/2012, A two-page extract from the pamphlet Community Snapshot produced by the Bendigo Bank on the records set by Ormond Glenhuntly Baseball Club in the 2012-13 season, dated May 2013
Ormond Tennis Club
This file contains three items., A note handwritten by Bob Flavell on the formation and development of the Ormond Tennis Club, date unknown., A letter to Dr. Solomon, by Bob Flavell, regarding his own notes written on the Ormond Tennis Club, dated 06/02/1988, An article from the GLEN EIRA NEWS on the Ormond Tennis Club’s participation in the Go Tennis program, established to provide people with a disability the opportunity to play tennis, dated 11/2011
Murrumbeena Cricket Club
David Hardham MURRUMBEENA CRICKET CLUB HISTORY (1890-2005), thirty-four pages printed from computer of the history of the Club, with photographs and accounts of major players and figures, dated January 2005., David Hardham, MURRUMBEENA CRICKET CLUB HISTORY, fifteen pages printed from computer of the history of the Club, dated October 2002. No photographs. Also includes a computer disc, submitted by David Hardham, with the text of the 2002 history, and photograph of THE PETER ROBERTSON OVAL sign, Large and small black and white photocopies of photograph of THE PETER ROBERTSON OVAL sign, with persons standing underneath, no date but possibly from late 1930s, Collection of EPHEMERA TO ADD TO MURRUMBEENA CRICKET CLUB’S FILE, THEIR CENTENARY CELEBRATIONS, 21/11/2010. Includes invitation to attend dinner, with information about payment options and sales of club memorabilia., Murrumbeena Cricket Club, Inc Annual Report, Season 2002-2003, foutry-eight page pamphlet with historical lists of office bearers, and results of matches in 2002-2003. Includes lists of RECORDED NOTABLE PERFORMANCES, FROM SEASON 1945-55 by John Dennis, Club Historian, ‘BEENA QUINELLA clipping from Caulfield/Port Phillip Leader, 17/05/2010, an recent match, SEVEN UP FOR POYAS AS SAINTS HAVE THEIR WAY WITH MORDI, clipping from Caulfield/Port Phillip Leader, 24/05/2011, includes recent match by Murrumbeena, and VAMPIRES RISE, SAINTS DRAINED, clipping from Caulfield/Port Phillip Leader, 31/05/2011, notes that MURRUMBEENA HAD THE BYE., Paul Amy, IT’S BEENS TOP TON, clipping from Caulfield/Port Phillip Leader, 16/11/2010, article on forthcoming Club 100th Anniversary Dinner, with photograph of Club STALWARTS David Hartham, Don McDermott and Leigh Hardham., Paul Amy, SIR DONS LAST STAND, clipping from Caulfield/Port Phillip Leader. 13/03/2012, on Don McDermott, member of the Club for sixty years, includes photograph, PORT’S DAY KIN FINDS FORM WITH CLASSY CENTURY, from Glen Eira/Port Phillip Leader, 06/11/2012, includes recent match by Murrumbeena against Chelsea, Brad Beitzel, WICKETS FALL BUT PORT STILL A CHANCE, clipping from Glen Eira/Port Phillip Leader, 26/02/2013, notes recent match by Murrumbeena against Cheltenham, FOUR DAY MATCH SHOULD YIELD A RESULT, clipping from Glen Era/Port Phillip Leader, 19/03/2013, notes loss in match by Murrumbeena to Brighton District
Moorabbin Saints Junior Football League
This file contains 1 item, an article from the Caulfield/Port Phillip Leader on the success in athletics and football of Malcom Neiwand, dated 19/07/2011
Murrumbeena Park Bowls Club
Documents pertaining to the history (1958-83) of Murrumbeena Park Bowling [sic] Club, viz., Notes on the formation of the Club, 1957-59 (two handwritten sheets), History of the Club, on its twenty-fifth anniversary (1983), compiled by J.W. Brown and J.A. Forrest (title page MURRUMBEENA PARK BOWLING CLUB, twenty-fifth ANNIVERSARY, 1958-1983, plus eight sheets, typescript., All documents stapled to comprise a single item.
St. James Parade, 22 Elsternwick
2 items about this property:, 1. Newspaper advertisement dated 16/03/2002, includes 2 photos and brief details of home for forthcoming auction., 2. Hand written research on former occupiers at property done by Claire Bardon on 15/03/2013 from Sandra McDougall.
Victorian Railways
This file contains three items., 1. Original railways grid map of Victoria with passenger mileages (in miles) which shows railway stations in Glen Eira as part of the rail network., 2. Original pamphlet titled ‘Pocket History Vicrail 1839 – 1981’, dated 1981. Chronological history of milestones and dates, ie. 1981 Caulfield loop opened 24/01/1981 as part of underground rail loop. Image on front cover shows 2 images (steam train and stainless steel train)., 3. Original pamphlet by Ministry of Transport titled ‘Your neighbourhood Public Transport System’ outlining fare structure. Stylised map of Caulfield (Glen Eira) neighbourhood.
Banks in Caulfield
This file contains two items., 1. A hand written list of branches of the English, Scottish and Australian Bank Limited and its merger the Australia and New Zealand Banking Group Limited, undated and author unknown. The list records the opening dates of branches in Carnegie, Caulfield East, Caulfield South, Elsternwick, Glen Huntly, Murrumbeena, Ormond, Garden Vale, Caulfield and Caulfield West encompassing years from 1886 to 1927, listing also the merger of the two banks as being in 1970 as well as 1852 as being the founding year of the English, Scottish, and Australian Bank Limited., 2. Three identical Elsternwick State Savings Bank withdrawal slips, from the 1910s. All three are blank, and include brief directions for filling in the slip typed at the bottom. Also included on the slip is a decorative illustration.
Memorials in Glen Eira
Black and white photograph, undated, source unknown, of Caulfield Park War Memorial, Copy of photograph of Caulfield Park War Memorial, undated, source unknown, Colour photograph of Caulfield Park War Memorial, dated June 1982, source unknown, and slide of same, Print of webpage of Friends of Caulfield Park, dated 02/08/2013 with colour image of and information about the war memorial there, Two black and white photographs, undated and source unknown, of war memorial at Koornang Park, Four colour photographs and one black and white copy of photograph of war memorial and its inscription at Koornang Park. Date and source unknown, Article dated 30/04/2013 from GLENEIRA LEADER about funding for plaque for Lone Pine at Caulfield Park, Article dated 23/04/2013 from THE AGE about state funding for repair of war memorials including one at McKinnon, Article dated June 2013 from GLEN EIRA NEWS about state funding for repair of five WWI memorials in Glen Eira. Includes two photographs., Article from GLEN EIRA NEWS dated April 2012 about restoration of Caulfield Park War Memorial. Includes colour photography
Henshaw, Cyril H.
This file contains one item., 1. A copy of the ‘Australian Railway Enthusiast Vol. 22, No. 3’, Train Watching pp.4-11. In this article Mr Henshaw refers in part to his early life as a resident in Ormond and describes the rail transport that served the Glen Eira area.
Grand Union Tramway Junction Balaclava Road and Hawthorn Road
This file contains three items., 1. A three-page Caulfield Conservation Study of the Balaclava Road/Hawthorn Road Tramway Crossing, undertake by Andrew Ward and dated September 1994. Study includes a brief history of the junction and a statement of significance. Study also includes Four black and white photographs of the junction and of architectural details of the tram tracks., 2. A letter from the Conservation Manager of the National Trust of Australia (Victoria) to the manager of the Planning Section for the City of Glen Eira, dated 15/06/2001 and attached to a six-page Classification Report. The letter informs of the Classification of the Grand Union Junction at the intersection of Balaclava and Hawthorn Road by the national trust, signed by Conservation Manager Ian Pausacker. Classification Report includes details such as the date of construction, a statement of significance, history of the junction, physical description of the junction and the condition of the junction at the time of writing. Report also includes a map of the Melbourne Tram Network drafted by Keith Kings and dated 01/005/1956, with illustration of the layout of fifteen tram depots, and updated aerial illustration of the Grand Union Junction, and a further map of Melbourne Tramways developed by North Melbourne Electric Tramways and Lighting Co. and Prahran and Malvern Tramways Trust, drafted by Keith Kings and dated January 1914 with illustrations of three tram depots., 3. Two articles from the Caulfield Leader written by Aaron Langmaid and dated 13/02/2007 and the Melbourne Bayside Weekly dated 21/02/2007, both concerning the Grand Union Junction. The article from the Caulfield Leader includes a picture of Executive Officer of the council of Tramway Museum of Australia Craig Tooke in front of the intersection. The article from the Bayside Weekly includes a picture of a tram passing through the junction and a brief history of the junction and tram network in Caulfield. The article also refers to twp local tram shelters at the intersection of Dandenong Road and Alma Road and also Orrong Road and Balaclava Road.
Send an email to Glen Eira Historical Society
|
cc/2020-05/en_middle_0102.json.gz/line1984
|
__label__wiki
| 0.845437
| 0.845437
|
← The Spectacular Newport Mansions in Rhode Island Hosts an Annual Food and Wine Festival 2014
Medieval Eze on the French Riviera is a Top Vino con Vista Site →
Roman Emperor History Tips
Augustus Pontifex Maximus #3 (Photo credit: Roger B. Ulrich)
Emperor Nero. Plaster cast in Pushkin museum after original in British museum, London (Photo credit: Wikipedia)
Bust of Tiberius, a successful military commander under Augustus before he was designated as his heir and successor (Photo credit: Wikipedia)
Deutsch: Marmorbüste des Caligula mit Farbresten; daneben Rekonstruktion der Polychromie an einer Gipsreplik, Ny Carlsberg Glyptotek, Kopenhagen (Photo credit: Wikipedia)
English: Bust of Nero at the Capitoline Museum, Rome (Photo credit: Wikipedia)
When you’re in Rome having a Vino con Vista at one of my favorite rooftop bars, you can flaunt your knowledge of Roman history.
Emperor Caligula, Ny Carlsberg Glyptotek. (Photo credit: Wikipedia)
Here’s a tip for remembering the names of the first five Roman Emperors after Julius Caesar was assassinated in 44 B.C. Remember the phrase “Another Tom cat caught napping”. The emperors are Augustus (27 B.C.–AD 14), Tiberius (14-37), Caligula (37-41), Claudius (41-54) and Nero (54-68).
Ny Carlsberg Glyptotek – Emperor Caligula (Photo credit: Michiel2005)
Emperor Nero blamed the burning of Rome on Christian terrorists. In 64, most of Rome was destroyed in the Great Fire of Rome, which many Romans believed Nero himself had started in order to clear land for his planned palatial complex, the Domus Aurea. Nero ordered the execution of the apostles Peter and Paul during his reign.
Mosaics in the Hagia Sophia, section: Maria as patron saint of Istanbul, detail: Emperor Constantine I with a model of the city (Photo credit: Wikipedia)
Eventually, with a succession of 25 emperors in 75 years, the Emperor Constantine (306-337 AD) joined the Christians and before he moved to Constantinople he built several churches in Rome.
San Giovanni in Laterano, St. Peter’s Basilica and San Lorenzo fuori le Mura were all built during Constantine’s reign. Talent and leadership abandoned the newly divided empire and successive waves of Barbarians invaded Rome including the Visigoths, Vandals and the Ostrogoths.
By 800 AD, Emperor Charlemagne asserted papal authority and launched another power struggle between the Church and imperial authority. By 1309, the pope moved to the safety of Avignon. The papacy’s supremacy returned to Rome in 1377. In the 1500’s, a glorious rebirth of Rome flourished when the popes invited the most talented architects, painters and sculptors to rebuild Rome’s grandeur during the Renaissance.
Rome, Ara Pacis museum: cast of a portrait of emperor Tiberius. From the collection of casts of busts showing the members of the Julio-Claudian dynasty. The original artwork is exhibited in the Ny Carlsberg Glyptotek (Copenhagen). Picture by Giovanni Dall’Orto, March 30 2008. (Photo credit: Wikipedia)
Dr. EveAnn Lovero writes Travel Guides and
Who’s Really the Last Roman Emperor?
Who was Nero?
Saint Paul Outside the Walls: a UNESCO Basilica in Rome
Filed under Ancient Rome, Colosseum, ebooks, Italian Architecture, Italian art, Italian Food, Italian Food and Wine, Italian Wine, Italy, Italy Travel Guides, Pantheon, Renaissance Art, Roman Amphitheater, Roman Architecture, Roman Emperors, Rome, Rome History, Rome Italy, Travel and Tourism, UNESCO, vino con vista, World Heritage Sites
Tagged as Ancient Rome, Caligula, Churches in Rome, Emperor Cladius, Emperor Nero, History, italy travel, Italy Travel Guide, Julius Caesar, Paul the Apostle, Peter the Apostle, Roman Emperor, Roman Empire, Roman History, Rome, Rome Travel Guides, San Giovanni in Larerano, St. Peter's Basilica, Tiberius, Travel and Tourism, unesco, vino con vista, World Heritage Site
3 responses to “Roman Emperor History Tips”
Pingback: Top Ten Reasons to Travel to Italy | Vino Con Vista Italy Travel Guides and Events
Pingback: My Glorious Vino Con Vista Weekend in Rome: Non Basta una Vita | Vino Con Vista Italy Travel Guides and Events
Pingback: The Ancient Basilica of Santi Cosma e Damiano in Rome Italy | Vino Con Vista Italy Travel Guides and Events
The latest The Social Media Daily! paper.li/SocialMediaEvi… Thanks to @myself1234567 @anrimaca100 @CrainsChicago #socialmedia #smm 1 hour ago
|
cc/2020-05/en_middle_0102.json.gz/line1989
|
__label__cc
| 0.666666
| 0.333334
|
What is Duchenne Muscular Dystrophy?
Duchenne is the most common fatal, genetic childhood disorder, which affects approximately 1 out of every 5,000 boys each year worldwide.
DONATE FOR A CURE
DONATE TO CHANGE LIVES
Continue Reading "Our Story"
After a period of grief and mourning, we managed to gain the strength and courage to learn about Duchenne and meet other Duchenne families.
In our research, we learned two things:
There has never been a survivor of Duchenne
For the first time, there have been some scientific breakthroughs which give us hope. We decided to turn adversity into strength.
Currently, Alexander is a curious and sweet-natured 12-year old boy who loves being with friends and family. He enjoys playing video games, and has a passion for football and basketball. He has a deep love of sports, even though he cannot play them. His enjoyment in watching them and pretending to be a commentator, satisfies his interests. Alexander has a special gift, whose continuous bright smile attracts all who meet him. Despite Duchenne stealing his “footsteps,” he never complains and he never asks “why.” He has taken his reality and taught us the lesson that life is unexpected and fragile, and it is up to us to find the joy in each moment and appreciate the life we have been given.
Duchenne parents are living on a time clock. As most parents make plans and look forward to their children’s future, Duchenne parents, fear the future. We fear what lies ahead for our boys. The time is now for breakthrough treatments for these boys. This generation has the opportunity to be the first ever survivors.
We founded Walking Strong to solidify our determination and commitment to Alexander and all Duchenne boys, to help them thrive and be hopeful that their footsteps never end.
We hope to keep these boys walking strong, as we continue to walk strong for all Duchenne boys and their families.
Our beautiful son Alexander was 5 ½ years old – and was not
as physically active as his peers. After trying physical therapy, we were advised to have our son genetically tested, and then our nightmare began.
Our son was diagnosed with a fatal disease: WITH NO CURE.
DMDVideo
Our mission is to build a supportive community to help us end Duchenne Muscular Dystrophy by raising money for ground-breaking research, spreading awareness, and providing aid to children and families with Duchenne.
Walking Strong Support
WALKING STRONG has proudly donated over $250,000 to the Center For Duchenne Muscular Dystrophy at UCLA and a research project at the Center for Gene Therapy at Nationwide Children’s Hospital in Columbus, OH. Both centers have numerous laboratories working on ground-breaking and life-altering, scientific research as well as hosting numerous clinical trials.
What is Duchenne?
(Pronounced “Du shen”)
Duchenne is the most common fatal, genetic childhood disorder, which affects approximately 1 out of every 5,000 boys each year worldwide. It currently has no cure. Diagnosis occurs around 3 – 5 years of age, usually the first sign is muscle weakness and large calf muscles.
The Duchenne gene is found on the X- chromosome and occurs mostly in boys which progressively degenerates all their muscles over time including the heart and the lungs. It is carried through the mother and often times is a spontaneous mutation and does not run in the family. Duchenne does not discriminate and occurs within any racial, ethnic or economic background.
Duchenne Boys make little or no Dystrophin protein which is responsible for muscle strength and function.
Most Duchenne boys are in a wheelchair between 10-12 years old.
Duchenne is associated with respiratory failure, heart failure, and debilitating orthopedic complications.
Most Duchenne boys don’t live past their late twenties.
There has never been a survivor
Many of the vital needs of Duchenne boys and their families are not covered by health insurance such as: Power wheelchairs, specialty scooters, night splints for their legs, specialized physical therapist, in-home needs for adaptability such as ramps and stair lift, as well as a handicap accessible van.
In September of 2016, the first ever drug for Duchenne was approved in the U.S. by Sarepta Therapeutics. This exon-skipping drug will help 13% of the DMD Population. The circumstances of the approval at the FDA were highly unusual, and included sharp internal protests that were ultimately overturned.
Steroids is the only therapeutic drug prescribed for 100% of Duchenne genetic mutations in order to provide strength and help to slow the progression of the disease. It is no way a cure, and has many long-term side effects.
In February 2017, the steroid drug called Emflaza was approved in the U.S., so parents no longer have to order this superior steroid to prednisone, from the U.K.
Daily stretching by the caregivers and the use of braces at night on their legs, is a necessity for boys with Duchenne.>
Some boys need surgery to release the tight muscle in their leg as well as spinal surgery in their early teens.
For the first time, there are numerous clinical trials taking place with promising therapeutic treatments for Duchenne including the ground-breaking gene therapy trials.
Over 42 biotech and pharmaceuticals have aligned with the Duchenne community in advancing efforts towards therapies to treat Duchenne.
For the first time in history, there are treatment drugs in the pipeline and clinical trials are happening. Duchenne will not be cured with one therapeutic approach. It will be a cocktail of treatments to dramatically slow the progression of the disease in hopes of making it a chronic illness.
Exon-Skipping: Exon skipping is a way to help make the genetic code readable again, allowing the body to make a shorter form of dystrophin that still works but is mutation specific. Clinical trials are on-going for two different exon-skipping drugs for the most common mutations which is skipping Exon 51 which is around 13% of the DMD population.
Gene Therapy: Gene therapy approaches offer the possibility of delivering a functional copy of the dystrophin gene to muscle cells where it could restore production of the dystrophin protein.
Dystrophin replacement – Duchenne muscular dystrophy is caused by mutations in the dystrophin gene which contains the instructions for making the dystrophin protein- an important component of the structure of muscle. It is thought that another protein called utrophin may be able to compensate for the lack of dystrophin in boys with Duchenne muscular dystrophy since both proteins are structurally similar and appear to have very similar functions.
For more information on Duchenne Muscular Dystrophy please go to:
http://www.duchenneandyou.com
www.parentprojectmd.org
www.cureduchenne.org
Duchenne Assistance Program
Walking Strong proudly has an assistance program that helps Duchenne families with their over-bearing medical needs that are most often not covered by insurance. To date, we have provided families with life-changing items such as: a handicap accessible van, hoyer lifts, in-home ramps, alternative therapies, medical travel expenses and on-line training courses for older Duchenne teens to help provide them with a career.
For more information and to apply please contact: lori@walkingstrong.org or valerie@walkingstrong.org
Your donation keeps us and all the families with Duchenne, Walking Strong.
Donate For DMD
Walking Strong is recognized as a public charity under Internal Revenue Code section 509(a) and has 501(c)(3) status. Donations to Walking Strong are deductible. Donors should consult their tax advisor for questions regarding deductibility.
Thank you for joining us in the fight against Duchenne. Together, we can truly make a difference in improving the lives of those affected and give strength so that every boy diagnosed with Duchenne continues Walking Strong.
WALKING STRONG’S Board of Directors represent leaders in the forefront of their fields in film, media, legal, financial, and advertising.
Laurie Anast
laurie@walkingstrong.org
Lori Ansaldi
lori@walkingstrong.org
Peter Ansaldi
peter@walkingstrong.org
Robb Friedman
robb@walkingstrong.org
Thelma Gutierrez
thelma@walkingstrong.org
Dean Masserman
dean@walkingstrong.org
Silvia Masserman
silvia@walkingstrong.org
William Stavropoulos
william@walkingstrong.org
Andrew Vorzimer
andrew@walkingstrong.org
Please fill out the form below with any questions or concerns and we will get back to you shortly.
|
cc/2020-05/en_middle_0102.json.gz/line1994
|
__label__cc
| 0.592307
| 0.407693
|
Series Spotlight Tour: Druid’s Portal by Cindy Tomamichel and Meet the Author
By viviana-mackade on June 14, 2019 • ( Leave a comment )
This is the kind of series I wish I had the guts to write. PS: I was in Stonehenge a few years back, and the sky was exactly like the cover. The resemblance is uncanny.
The series is Druid’s Portal by Cindy Tomamichel, a Time Travel Romance, Historical Fantasy and Adventure.
Druid’s Portal: The First Journey
A portal closed for 2,000 years.
An ancient religion twisted by modern greed.
A love that crosses the centuries.
An ancient druid pendant shows archaeologist Janet visions of Roman soldier Trajan. The visions are of danger, death, and love—but are they a promise or a curse?
Her fiancé Daman abandons her before the wedding, her beloved museum is ransacked, and a robed man vanishes before her eyes. Haunted by visions of a time she knows long gone, Janet teeters on the edge of a breakdown.
In the shadow of Hadrian’s Wall and 2,000 years back in time, Janet’s past and present collide. Daman has vowed to drive the invaders from the shores of Britain and march his barbarian hordes to Rome. Trajan swears vengeance against the man who threatens both his loves—Janet and the Empire.
Time is running out—for everyone.
Druid’s Portal : The Second Journey
A love that can never be.
Ethan—latest guardian of the Arwen pendant—finds his heritage of time travel a burden he can scarcely endure. Rowena—last of the line of Daman—is a soldier in the Celtic army, forced to perform deeds that haunt her. Both tormented by visions of the other, separated by barriers of time.
A time that should not exist.
Rowena flees the catastrophic end of her time but is trapped by an ancient family pact with an evil goddess. Desperate to save her, Ethan crosses over into her timeline, where his parents never met, and Daman—their greatest enemy—rules.
The past is ruled by a man who knows the future.
Thirty days to stop a goddess taking over her body. Thirty days to save his timeline. Together they will fight their way through an altered history to the dark past of Stonehenge.
But time is running out—for everyone.
Cindy Tomamichel is a multi-genre writer. Escape the everyday with time travel action adventure novels, scifi and fantasy stories or tranquil scenes for relaxation.
Find a world where the heroines don’t wait to be rescued, and the heroes earn that title the hard way.
The Druid’s Portal series is a genre blend of action, adventure, romance, time travel and magical historical fantasy set in Roman Britain.
Hello Cindy, and thank you so much for being here with us
Can you tell us what inspired you to write this book?
The same thing that inspires any author – the characters really won’t leave you alone. Apparently they decide when the story is finished, not me. Otherwise, lots of small bits of historical research is also inspiring. Janet the archaeologist working on Hadrian’s Wall for instance has a fascination with Roman sandals. Hundreds of sandals have been excavated at Vindolanda (a fort on Hadrian’s Wall) preserved in the mud. I found a reference to a incense burner at the site of a water goddess Coventina, and that got included in the story.
I was also keen to write a hero that is not one of the over forceful dominating types. Both Trajan and his son, Ethan are powerful capable men, yet both have a gentle side which they are not afraid to show.
What can we expect from you in the future?
The future involves finishing the Druid’s Portal series, which will be another three books. I have a book and e-course coming out for writers – The Organized Author. This is designed to help authors set up their author platform. Then there are all the scifi and fantasy novels I have on my hard drive to polish and get out into the world. So plenty to keep me and readers busy.
Can you tell us a little bit about the characters in Druid’s Portal: The Second Journey?
The series focuses on the family of Janet and Trajan, who we meet in the first book. Janet is an archaeologist who is dragged back in time to Roman Britain and Hadrian’s Wall where she meets Trajan, a Roman soldier.
In the Second Journey, we follow their son, Ethan, who has inherited the duty of guardian of the time travel pendant, and has grown up in the shadow of heroic parents. One mistake creates an alternate history, and there Rowena battles a culture of war. But love is a chancy thing, and for a guardian, always comes with danger and death.
How did you come up with the concept and characters for the book?
In the first one, I have always had a hankering to be an archaeologist, plus she needed to be fluent in latin. An interest in time travel, and a location and the story wrote itself.
For the Second Journey, I have noticed that growing up with parents that are already heroes themselves is a tough thing for the child. Think Indiana Jones, Luke Skywalker, Diehard series, and The Mummy series for instance. All tough, smart kids, but their parents have already done it all. What would be the consequences for a man growing up in the shadow of heroes? Will Ethan follow in his father’s footsteps, or forge his own path? Rowena also battles her heritage as a descendant of a man who warped her world into war.
Where did you come up with the names in the story?
Often names just come to me, but for secondary characters I consult a baby name book which also has info on the meaning and origin of the name. I can’t be christening ancient Celts with modern German names!
What did you enjoy most about writing this book?
Tying all the threads together, and dropping hints of future events. This one starts to weave the threads of family and history that we glimpsed in the first one into what will become three generations of the family travelling into time.
Ethan has grown up in the shadow of heroic parents, and has trained his entire life to become both a historian, linguist and fighter. None of which he would have chosen to do himself, yet it is his duty and heritage.
Rowena has grown up in a world dominated by war, and will be training as a soldier. Her choices are narrowed to being a citizen or a slave. She can see no other paths open to her, except for her dreams and visions of Ethan.
Website * Newsletter * Facebook * Twitter * Instagram
Pinterest * Bookbub * Amazon * Goodreads
$15 Amazon
An ebook of 5 Minute Vacations – 1 winner each
www.silverdaggertours.com
Categories: Romance
Tagged as: Britain, Celtic Folklore, Druid, Hadrian Wall, Latest in a Series, magic, Roman Empire, Series, Timetravel, Tour
Series Spotlight: The O’Connor Brothers by A.S. Kelly
On Tour with The Kristian Clark Saga by Jes Drew and Meet the Author
|
cc/2020-05/en_middle_0102.json.gz/line2002
|
__label__cc
| 0.725796
| 0.274204
|
Growing like Spain: 1995-2007
Manuel García Santana, Josep Pijoan-Mas, Enrique Moral-Benito, Roberto Ramos 23 May 2016
Spain enjoyed substantial growth in the decade prior to the Global Crisis, despite declining aggregate productivity. Recent research blames the poor productivity on different forms of a ‘financial resource curse’. This column argues that resource misallocation was particularly severe due to corruption and crony capitalism. This suggests future growth will require serious political reforms.
Bribery and firm performance: New evidence
Jan Hanousek, Anna Kochanova
Eurozone: Looking for growth
Laurence Boone, Céline Renucci, Ruben Segura-Cayuela
The arithmetic of (excessive?) fiscal consolidation in Spain
Javier Andrés, Rafael Doménech
Does corruption sand or grease the wheels of economic growth?
Nauro Campos, Ralitza Dimova
Spanish GDP grew at an average rate of 3.5% per year during the expansion of 1995–2007. However, as first noted by Conesa and Kehoe (2016), this growth did not stem from productivity gains, but from the pure accumulation of capital and labour. In fact, aggregate productivity declined at a yearly rate of 0.7%, in sharp contrast with the rest of Europe, where productivity grew by 0.4% per year.
Why did productivity behave so poorly in Spain during the boom years? Conventional wisdom blames it on different forms of a ‘financial resource curse’ due to the entry of Spain to the Economic and Monetary Union. Benigno et al. (2015) argue that the large entry of cheap capital resulted in a misallocation of resources towards low-productivity sectors, in particular construction. Along these lines, Diaz and Franjo (2016) also emphasise the increase in construction, but blame it on the myriad of public sector subsidies and contracts. Fernandez-Villaverde et al. (2013) suggest that the capital inflows generated exceptional returns, making it difficult for banks to screen between different investment projects, which worsened the allocation of capital across firms. Finally, Gopinath et al. (2015) argue that the sharp fall in interest rates produced a deterioration of allocative efficiency across firms because financial frictions resulted in firms accumulating capital at different speeds.
Our recent paper presents three facts pointing to an alternative explanation (García-Santana et al. 2016). The fall in aggregate productivity was indeed due to the increase in misallocation of resources between firms in all sectors, but this problem was especially severe in those industries where the influence of the public sector is more important to success. Worries about corruption are large in Spain and arguably responsible for the hung parliament that emerged in the elections of December 2015. However, estimates of the macroeconomic costs of corruption are scarce, and limited to developing economies when available (e.g. Khwaja and Mian 2005). Our results show that the connections between firms and public officials may have cost at least a 0.3% TFP growth per year in Spain over the 1995–2007 period.
Fact 1: Aggregate data
The left panel of Figure 1 shows the well-known result of TFP decline in Spain between 1995 and 2007 (black line), compared to the increase in the EU (blue line). One potential reason behind the decline in TFP is the movement of resources from high productivity sectors to low productivity sectors, for example construction. The empirical evidence, however, is not consistent with this hypothesis. The yellow line in the left panel of Figure 1 plots a counterfactual TFP keeping the share of the 5 largest sectors constant to their value in 1995. Absent the reallocation of resources across sectors, aggregate productivity would have fallen by 0.4% per year, which is only slightly better than the actual fall.
Figure 1 Total factor productivity comparison and losses
Fact 2: Firm-level data
Given that reallocation of resources across sectors accounts only for a small portion of TFP decline during 1995-2007, we are left with the hypothesis of a worsening in the allocation of resources across firms within sectors. To investigate this, we use firm-level administrative data (Central Balance Sheet Data or Central de Balances Integrada (CBI) in Spanish) of around 350,000 firms per year in manufacturing, construction, trade, and services for the period 1995-2007. Slicing the data into 518 4-digit industries, we document two patterns.
First, the within-sector dispersion of productivities across firms increased sharply during the expansion. In a frictionless economy we should observe no dispersion in firm-level revenue productivities within each industry – high productivity firms would expand attracting more capital and workers, which in turn would diminish their revenue productivity (because of either decreasing returns to scale or downward-sloping demand curves). Hence, dispersion of revenue productivities across firms is a symptom of a poor allocation of resources across firms. This is the idea behind the methodology by Hsieh and Klenow (2009), who estimate the disparity in efficiency levels between India, China, and the US, with firm-level data.
Our evidence implies that, had misallocation remained at its level in 1995, Spanish TFP would have grown 0.8% per year. This counterfactual series is plotted in the left panel of Figure 1 (green line) alongside observed TFP in Spain (black line) and in Europe (blue line). This result means that technological progress did not come to a halt in Spain, but capital and labour were not assigned efficiently to the best projects within each sector. In the right panel of Figure 1 we can see that the productivity losses stemming from misallocation were largest in construction (red line), but also important in services (yellow line), manufacturing (blue line), and trade (green line). The increase in misallocation within manufacturing is also documented by Crespo and Segura-Cayuela (2014) and Gopinath et al. (2015) with Amadeus data.
Second, firms’ growth during this period was inversely related to initial productivity. That is, during the boom years, low productivity firms were assigned more capital and labour than high productivity firms. As a result, the former outgrew the latter. Figure 2 displays this pattern for a selection of six industries, but this result is widespread across most industries. Following Foster et al. (2006) industry productivity growth can be decomposed into:
Firms’ productivity growth weighted by size;
Firms’ size growth weighted by productivity;
A cross-term capturing the interaction between firms’ productivity growth and size growth; and,
Two extra terms capturing entry and exit.
The pattern documented in Figure 2 illustrates the second component of this decomposition, which turns out to explain the whole fall in industry productivity.
Figure 2 Growth and productivity for six industries
Fact 3: Industry variation
The deterioration of resource allocation across firms was pervasive across all industries, but there was substantial variation among them. We exploit this variation to shed some light on the possible factors behind the increase in misallocation.
We find that heterogeneity in financial dependence, capital structure intensity, skill intensity, tradability, and innovative content were unrelated to changes in allocative efficiency. Likewise, we find that the worsening in allocative efficiency was present across all regions and that regional differences in wage growth or house price growth were uncorrelated with the increase in distortions. These results undermine explanations by usual suspects like financial frictions, dual labour markets, or lack of competition.
On the contrary, we find that sectors that are more prone to cronyism (as measured by the Bribe-Payers Index of Transparency International) experienced misallocation between firms twice as big as the rest. This implies that had the whole economy behaved as the non-crony sectors, productivity growth would have been 0.3% higher per year during 1995–2007. This is a large number, and represents a novel measurement of the potential aggregate costs of cronyism. It does not completely account for the misallocation-related annual productivity loss of 1.1% of Spain with respect to the rest of Europe, but we stress that our measurement of cronyism only captures variation across sectors. It remains to be seen whether more precise measures of cronyism might give larger productivity losses.
Will productivity grow in the coming years? Which type of policies could help foster productivity growth in Spain? Understanding the causes behind the poor productivity growth in the boom years is very important to answer these questions. The financial resource curse type of explanation is relatively optimistic – without the effects of Spanish entry to the EMU, there should be no further allocative distortions in the future. Instead, if the poor performance of productivity in the past has its root in a form of crony capitalism, then we should not expect much growth unless serious (political) reforms are undertaken.
Benigno, G, N Converse, and L Fornaro (2015) “Large capital inflows, sectoral allocation, and economic performance”, Journal of International Money and Finance, 55: 60–87.
Conesa, J C and T Kehoe (2016) “Productivity, taxes and hours worked in Spain: 1970-2014”, Mimeo.
Crespo, A and R Segura-Cayuela (2014) "Understanding competitiveness", EUI Working Paper MWP 2014/20.
Díaz, A and L Franjo (2016) “Capital goods, measured TFP and growth: The case of Spain”, European Economic Review, 83: 19-39.
Fernández-Villaverde, J, L Garicano and T Santos (2013) “Political credit cycles: The case of the Eurozone”, Journal of Economic Perspectives, 27(3): 145-166.
Foster, L, J Haltiwanger and C Krizan (2006) “Market selection, reallocation, and restructuring in the US retail trade sector in the 1990s”, The Review of Economics and Statistics, 88(4): 748-758.
García-Santana, M, J Pijoan-Mas, E Moral-Benito and R Ramos (2016) “Growing like Spain: 1995-2007”, CEPR Discussion Paper Series 11144.
Gopinath, G, S Kalemli-Ozcan, L Karabarbounis and C Villegas-Sánchez (2015) “Capital allocation and productivity in South Europe”, NBER Working Paper No 21453.
Hsieh, C T and P J Klenow (2009) “Misallocation and manufacturing TFP in China and India”, Quarterly Journal of Economics, 124(4): 1403-1448.
Khwaja, A I and A Mian (2005) “Do lenders favor politically connected firms? Rent provision in an emerging financial market”, Quarterly Journal of Economics, 120(4): 1371-1411
Topics: Europe's nations and regions Industrial organisation Productivity and Innovation
Tags: Spain, growth, productivity, Corruption, Public sector, resource allocation, industries, crony capitalism, firms
Manuel García Santana
Assistant Professor of Economics, Universitat Pompeu Fabra; Affiliated Professor, Barcelona GSE; CEPR Research Affiliate
Josep Pijoan-Mas
Associate Professor of Economics at CEMFI and CEPR Research Affiliate
Enrique Moral-Benito
Economist, Banco de España
Roberto Ramos
|
cc/2020-05/en_middle_0102.json.gz/line2004
|
__label__wiki
| 0.978087
| 0.978087
|
to main page send e-mail Last Updated: Monday, January 20, 2020
Advertising in The Mover
About The Mover
On The Road News
The independent voice of the global moving industry
Obituary: Tony Dawes
Tony Dawes, Partner at Simpson Packaging Group of Companies in West Yorkshire, died suddenly in August, aged just 60. Tony was away on a golfing trip over the August Bank Holiday weekend with family and friends when he suffered a massive heart attack. The company said that this had come as a “devastating shock to everyone” as there had been no previous history of related illness or any warning signs.
Photo: Tony Dawes
Cookies: This site uses non-invasive cookies to provide an enhanced visitor experience and to measure site performance. By viewing this website you are agreeing to our use of cookies in this manner. For further information on how cookies are used on this site, please see our privacy policy.
Privacy Policy | Terms of Use All material © 2011 The Words Workshop Ltd.
|
cc/2020-05/en_middle_0102.json.gz/line2005
|
__label__cc
| 0.72574
| 0.27426
|
« Finland’s Berlusconi proposes new bout of neoliberalism
Greece: crossing the red lines »
Austerity: has it worked?
Most governments in capitalist economies have engaged in what is loosely called ‘austerity’ policies since the end of the Great Recession in 2009. More precisely, austerity policies are those where the government aims to reduce its annual deficit on spending and revenues and shrink the overall debt burden, plus introduce ‘reforms’ to weaken the labour rights and conditions at work to keep wage costs down for the capitalist sector. The fiscal part of these austerity measures mainly involved cutting back on government spending, both in public sector employment, wages, public services and investment projects.
Those economists and governments that advocated austerity claimed that by getting debt ‘under control’, costs would be reduced and companies would invest, consumers would spend and economies would recover quickly. Keynesians and others who opposed these measures reckoned that austerity would drive down ‘aggregate demand’ as government spending was cut, taxes raised and wages held down. The way out of the crisis was to borrow more, not less and spend more not less.
The debate continues. In my view, both sides are right and wrong. See my posts on this:
https://thenextrecession.wordpress.com/2012/04/14/the-austerity-debate/ and
https://thenextrecession.wordpress.com/2012/09/30/can-austerity-work/
The Austerians recognise that the key to a capitalist economy recovering is to reduce costs for the capitalist sector by cutting wages and government taxation so that profitability can rise. Raising wages or increasing government spending, as the Keynesians advocate, would reduce profitability at a time when it needs to rise. However, the Keynesians recognise that, once an economy is in a slump and labour incomes are falling, cutting them further can worsen the fall in consumer spending and investment demand and for some time. It’s not quite Catch 22; but looks like it for a while.
In a recent study, the IMF considered the question of whether austerity worked. The IMF found that if governments did not spend too much when economies were growing and spent more when economies were in a slump, then this would act as a counter-cyclical buffer to the volatility of the capitalist sector. The IMF quantified this effect as cutting “output volatility by about 15 percent, with a growth dividend of about 0.3 percentage point annually”. The IMF optimistically reckoned that “Stability, growth and debt sustainability could all greatly benefit if measures that destabilize output, such as spending increases in good times, were avoided”.
But this is the classic sort of fiscal management policy advocated by mainstream economics back in the 1960s that supposedly was the answer to controlling capitalist booms and slumps. Governments could smooth economic fluctuations by judicious (and even automatic) fiscal ‘stabilisers’. Yet this policy (in so far as it was even implemented) proved a total failure during the 1970s, when the major capitalist economies experienced inflation and unemployment together and government fiscal management failed. Indeed, governments probably increased volatility by stimulating or applying austerity at the wrong times.
Anyway, has austerity worked in getting economies to recover quicker since 2009 or have austerity measures made it worse? See the graph below covering 30 advanced capitalist economies for changes in real GDP growth and reductions in government budgets since 2010 (from http://www.economonitor.com/dolanecon/2015/04/08/did-austerity-work-in-britain-one-chart-tells-it-all/) . The further to the right a country, the more austerity there has been – with Greece leading the way. The further up the graph a country is, the more growth there has been since 2010.
The graph trendline appears to show that tightening the budget by one percent of GDP cuts about half a percentage point off the growth rate, even if we omit Greece. But the correlation is not very strong. The US underwent more fiscal consolidation than the UK in 2010-2014, but it also had better growth. On the other hand, the countries of the Eurozone, on average, grew more slowly than the OECD average despite a similar average level of austerity. So other factors than the fiscal policies of governments were much more important for post Great Recession growth (see my post,
https://thenextrecession.wordpress.com/2012/10/25/uk-and-us-gdp-and-anglo-saxon-angst/.
As for the other arm of austerity, ‘labour market reform’ (i.e. weakening trade unions, increasing the ability of employers to hire and fire at will, deregulating contracts and hours and job qualifications), have they worked? These measures are advocated by the IMF, the OECD and by the European institutions in their current negotiations with Greece. Well, a new study by IMF economists found no evidence that “deregulatory labour market reforms could have a positive impact in increasing economies’ growth potential”. What they found was that more competition among capitalists in markets and higher investment spending contributed much more to boosting productivity than squeezing the conditions for the workforce.
What the IMF did not consider was that while more investment in new technology might raise productivity per worker more, cutting wage costs and weakening labour’s bargaining power can deliver more profitability quicker. It might be short-sighted, but the capitalist mode of production does not take the long view.
In short, austerity has not worked in restoring trend economic growth, although it has not made things much worse either. The problem is that cutting wage costs and holding back on government investment and spending has not sufficiently restored profitability and reduced debt to allow a significant rise in new investment. But the alternative policy of Keynesian-type government spending might have helped labour a little, but it would not have boosted investment and growth either, as it would have lowered profitability. Governments appear helpless to change things either way. Another recession may do the trick.
This entry was posted on April 24, 2015 at 9:38 am and is filed under capitalism, economics, Profitability. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.
9 Responses to “Austerity: has it worked?”
Peter Thompson Says:
Reblogged this on Ernst Blog.
Tony Phillips Says:
Nice balanced economic analysis — didn’t take into account the cost in people’s lives / jobs etc but even leaving that out which is quite painful in countries such as spain and greec with huge un- and under-employment — austerity doesn’t work anyway. Like the short-term view issue (this is key) you can run a company by financial quarters (but not a country.)
johkari Says:
What to do??
Pray for another recession to fix the awkward situation?
Mike Ballard Says:
Comrade, you need to attend to a slight spelling error in your piece: “Raising wages or increasing government sending, as the Keynesians advocate….”
Thanks, will correct.
vallebaeza Says:
Reblogged this on Alejandro Valle Baeza.
“But the alternative policy of Keynesian-type government spending might have helped labour a little, but it would not have boosted investment and growth either, as it would have lowered profitability.”
Surely all historical evidence, and Marx’s own view is that its only when wages rise particularly high, due to a using up of the available labour force – which itself then causes a squeeze on profits (not the same as the falling rate of profit) – that causes capital to invest in new technology so as to recreate a relative surplus population?
Marx cites Ricardo to that effect that machines are only introduced when labour becomes expensive. Marx himself cites the reverse of this that capitalists continued to use women to pull canal barges, even in preference to horses, because the women were cheaper and more easily replaced than horses.
As he and Engels point out, labour saving machines are only introduced by capital when their cost is less than the paid part of labour, and as productivity rises, this paid part of the day gets ever smaller, particularly in respect of the advanced rather than laid out capital, as the rate of turnover rises.
If the aim is to encourage additional investment in labour saving machines, then surely a rise in wages, which squeezes profits, and makes such intensive accumulation profitable would be the way to go. Its the kind of policy that Singapore adopted as a development strategy to move its production on to ever higher value production. China seems to be adopting a similar approach now.
But, as Marx says, this kind of intensive accumulation is not the only or even most important kind of capital accumulation undertaken. As he sets out in Volume III, Chapter 15, for long periods of time accumulation takes place on the basis of the same technology – and so as he says creates NO tendency for the rate of profit to fall, because it causes no rise in the organic composition of capital.
All of the emphasis on whether INVESTMENT is rising or not is framed in terms of whether investment in fixed capital is rising, but the whole point about Marx’s analysis, is that the organic composition of capital rises not because fixed capital rises, but because circulating constant capital rises, because newer cheaper fixed capital is far more productive, and thereby process much greater quantities of that material.
As Marx says way back in Capital I, expansion of capital is increase in the proletariat. Capital for Marx after all is not a collection of pieces of equipment, but a social relation between capital and wage labour. That has other consequences too, as he again set out in Capital I, and which relates to the experience in Singapore.
Marx points out that it was precisely the introduction of the Ten Hour Day, and factory legislation, which caused employers to develop and introduce new forms of technology. He cites the earthenware manufacturers in the Potteries who had claimed that they could not possibly survive if the Ten Hour Day was introduced. But Marx writes,
“In 1864, however, they were brought under the Act, and within sixteen months every “impossibility” had vanished.
‘The improved method,” called forth by the Act, “of making slip by pressure instead of by evaporation, the newly-constructed stoves for drying the ware in its green state, &c., are each events of great importance in the pottery art, and mark an advance which the preceding century could not rival…. It has even considerably reduced the temperature of the stoves themselves with a considerable saving of fuel, and with a readier effect on the ware.’
In spite of every prophecy, the cost-price of earthenware did not rise, but the quantity produced did, and to such an extent that the export for the twelve months, ending December, 1865, exceeded in value by £138,628 the average of the preceding three years.”
(Capital I, Chapter 15 p 447)
Moreover, and this is a point that Marx makes in general about this consequence of the introduction of new technologies bringing about an increase in profits, the expansion in production also led to an absolute increase in the number of workers employed, even thought the relative number fell due to the higher rate of productivity.
Because more workers were thereby employed in total, and because the value of labour-power of each worker had fallen, due to the rise in social productivity, not only did the surplus value for each worker rise, but the number of workers producing surplus value also rose, so that the mass of surplus value rises on both counts, facilitating further accumulation.
In fact, this is why there has been continual growth in population over the last 250 years, as well as continual growth in productivity, and yet far from this resulting in ever rising unemployment, ever falling living standards, and ever falling profits, it has led to the opposite.
The opposite being ever rising employment, ever rising living standards, and ever rising profits.
Of course, no such “ever rising” exists in capitalism. Cycles of rising, and falling, employment, living standards, and profits do.
Structural changes in levels of unemployment, rates of improvement, stagnation, and decline in living standards, in profitability, in rate of growth occur as capital accumulates.
All Boffy has said, in his usual long winded way, is that capitalism has expanded since the 18th century. No shit Sherlock.
is absolute nonsense.
Marx iterates and reiterates that the the organic composition of capital rises due to amplification of labor productivity, an amplification that is expressed in the proportional expulsion of living labor from the production process. The point of capital accumulation in the means of production is to convert the increased mass, and value, of those means into greater mass and value of commodities, which are the circulating capital.
Advanced in technology, in improving the productivity of labor, in expelling living labor, are “cheaper” in that less of the “sunk” capital value is transferred to the commodities in the labor process. The value of the means of production, the fixed capital, expands, increases and yet less can be realized in a circulation period. Hence the “turnover time” lengthens for the total capital deployed in production which is another way of expressing the decline in the rate, the RATIO, of profit realized in the capitalist cycle.
Leave a Reply to Boffy Cancel reply
|
cc/2020-05/en_middle_0102.json.gz/line2008
|
__label__cc
| 0.701243
| 0.298757
|
« Shaikh at Greenwich
CETA and the crisis in world trade »
Basic income – too basic, not radical enough
The idea of a basic income has gained much popularity recently and not just among leftists but also with right-wing pro-capital proponents. Basic income boils down to making a monthly payment by a government to every citizen of an amount that meets ‘basic necessities’ whether that person is unemployed or not or whatever the circumstance. As Daniel Raventós, defines it in his recent book: “Basic Income is an income paid by the state to each full member or accredited resident of a society, regardless of whether or not he or she wishes to engage in paid employment, or is rich or poor or, in other words, independently of any other sources of income that person might have, and irrespective of cohabitation arrangements in the domestic sphere” (Basic Income: The Material Conditions of Freedom).
He lists various things in its favour: that it would abolish poverty, enable us to better balance our lives between voluntary, domestic and paid work, empower women, and “offer workers a resistance fund to maintain strikes that are presently difficult to sustain because of the salary cuts they involve”.
And recent books such as Inventing the Future by Nick Srnicek and Alex Williams and Postcapitalism by Paul Mason have also brought this issue to prominence. These writers reckon that the demand for a universal basic income by labour should be part of the struggle in a move to ‘post-capitalism’ and should be a key demand to protect workers from a capitalist world increasingly dominated by robots and automation where human beings will become mostly unemployed.
But ‘basic income’ is also popular among some right-wing economists and politicians. Why? Because paying each person a ‘basic’ income rather than wages and social benefits is seen as a way of ‘saving money’, reducing the size of the state and public services – in other words lowering the value of labour power and raising the rate of surplus value (in Marxist terms). It would be a ‘wage subsidy’ to employers with those workers who get no top-up in income from social benefits under pressure to accept wages no higher than the ‘basic income’ which would be much lower than their average salary. As Raventos has noted, (in the American Journal of Economic Issues June 1996 with Catherine Kavanagh), “by partially separating income from work, the incentive of workers to fight against wage reductions is considerably reduced, thus making labour markets more flexible. This allows wages, and hence labor costs, to adjust more readily to changing economic conditions”.
Indeed, the danger is that the demand for a basic income would replace the demand for full employment or a job at a living wage. For example, it has been worked out that, in the US, the current capitalist economy could afford only a national basic income of about $10,000 a year per adult. And that would replace everything else: the entire welfare state, including old age pensions disappears into that one $10,000 per adult payment.
The basic income demand is similar to the current idea among Keynesians and other leftist economists for increased public spending financed by ‘helicopter money’. This policy means no fundamental reform of the economy but a just a cash handout to raise incomes and boost the capitalist economy. Indeed, this is why the leftist Greek economist Yanis Varoufakis has viewed favourably the basic income idea. A minimum equal income for everyone, Varoufakis tells us, is the most effective way to confront the deflationary trends that manifest capitalism’s inability to balance itself. Creating a minimum income that’s delinked from work, he argued, would increase effective demand without substantially increasing savings. The economy would grow again and would do so in a much more balanced way. The amount of the minimum income could become a simple, stand alone lever for the economic planners of the 21st century.
Here the basic income demand provides an answer to crises under capitalism without replacing the capitalist mode of production in the traditional Keynesian or post-Keynesian way, by ending ‘underconsumption’. But what if underconsumption is not the cause of crises and there is a more fundamental contradiction within capitalism that a ‘basic income’ for all, gradually ratcheted up by government planners, cannot resolve?
Raventos retorts to this argument that “Some people complain that basic income won’t put an end to capitalism. Of course it won’t. Capitalism with a basic income would still be capitalism but a very different capitalism from the one we have now, just as the capitalism that came hot on the heels of the Second World War was substantially different from what came at the end of the seventies, the counter-reform we call neoliberalism. Capitalism is not one capitalism, just as “the market” is not just one market.”
This answer opens up a whole bag of tricks by suggesting that we can have some form of non ‘neoliberal’, ‘fairer’ capitalism that would work for labour, as we apparently did for a brief decade or so after the second world war. But even if that were true, the ‘basic income’ demand stands little prospect of being adopted by pro-capitalist governments now in the middle of a Long Depression unless it actually reduced the value of labour power, not increased it. And if a socialist worker government were to come to power in any major capitalist economy would the policy then be necessary when common ownership and planned production would be the agenda? As one writer put it: “The call for basic income in order to soften the effects of automation is hence not a call for greater economic justice. Our economy stays as it is; we simply extend the circle of those who are entitled to receive public benefits. If we want economic justice, then our starting point needs to be more radical.”
In his book, Why the Future is Workless, Tim Dunlop says that “the approach we should be taking is not to find ways that we can compete with machines – that is a losing battle – but to find ways in which wealth can be distributed other than through wages. This will almost certainly involve something like a universal basic income.” But is that the approach that we should take? Is it to find ways to ‘redistribute’ wealth “other than through wages” or is it to control the production of that wealth so that it can be allocated towards social need not profit?
I have discussed in detail in previous posts what the impact of robots and AI would be for labour under capitalism. And from that, we can see an ambiguity in the basic income demand. It both aims to provide a demand for labour to fight for under capitalism to improve workers conditions as jobs disappear through automation and also wants basic income as a way of paying people in a ‘post-capitalist’ world of workless humans where all production is done by robots (but still with private owners of robots?).
And when we think of this ambiguity, we can see that the issue is really a question of ownership of the technology, not the level of incomes for workless humans. With common ownership, the fruits of robot production can be democratically planned, including hours of work for all. Also, under a planned economy with common ownership of the means of production (robots), it would be possible to extend free goods and services (like a national health service, education, transport and communications) to basic necessities and beyond. So people would work fewer hours and get more free goods and services, not just be compensated for the loss of work with a ‘basic income’.
In a post-capitalist world (what I prefer to call ‘socialism’ rather than mincing around with ‘post-capitalism’), the aim would be to remove (gradually or quickly) the law of value (prices and wages) and move to a world of abundance (free goods and services and low hours of toil). Indeed, that is what robots and automation now offer as a technical possibility.
The basic income demand is just too basic. As a reform for labour, it is not as good as the demand for a job for all who need it at a living wage; or reducing the working week while maintaining wages; or providing decent pensions. And under socialism, it would be redundant.
This entry was posted on October 23, 2016 at 10:22 am and is filed under capitalism, economics, marxism. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.
46 Responses to “Basic income – too basic, not radical enough”
Wal Buchenberg Says:
October 23, 2016 at 11:39 am | Reply
For the vast majority of wage-earners nothing would change by means of a state basic income. Our wage pay remains more or less the same as before, except that part of our income is no longer paid by the capitalist, but by the state. This case already exists in Germany as a “combination-wage”, where a too low wage is increased by state. In any case: the wage or combi-wage, which is partly paid by the state and partly by the company, is the result and product of our own work.
Hopes for an unconditional basic income are made by both capitalists and by poor people. The capitalists, because they will lower wage payments and hope for a slimmer, cheaper state apparatus. Poor people hope for basic income because they are hoping for a higher income without bureaucratic harassment.
One wants a more effective capitalism, the other a more human capitalism.
I lack the belief in a more human capitalism and I distrust our politician class and do not want it to get even more power and more money into the hands by introducing a basic income for all.
Wal Buchenberg
stephenhinton Says:
I don’t agree that nothing would change. If you ask people on their morning commute WHY they are going to work most of them say they have to. If you ask them WHY again they say to get food on the table and roof over my family’s head. If you ask them if they would go to work if they got those things anyway 80% say no. Basic income would alter the demand for work. It would also affect work choices. People would do more what they felt was right. And finally it would affect the political challenge of transitioning from fossil-based economy to renewable and circular. Losing your job would no longer be stigmatised and stressful.
Surely, Walt, the power of the capitalist class comes from having a pool of labour that are forced to work and to buy from them. Basic income gives them no more power.
EarthVote (@EarthVoteOrg) Says:
Would Capitalist owners of resources, machines, and property not increase the cost of their products and services? It’s purely an Inflationary design, all Rent, Food, Transport, etc would increase in price and the worker would still be locked into the same perpetual existence of slave labor, nothing would change, just the prices. Here’s a more radical proposal that includes BI but reforms the nature of $ and Property so we can transition from fossil-based to renewable like you imagine. EarthVote.org/common-planet.html
murray cohen Says:
We live in a global economy in which the income of wage earners at the imperial centers are indirectly supplemented by labor in the peripheries (and directly by super-exploited agrarian guest workers as in the US). Would the global south’s billions of employed and unemployed victims of permanent primitive accumulation also get a basic income? same everywhere and for everyone? for the favela dwellers of forever “emerging” nations? for the sheiks of Arabia? Michael’s critique is spot on. But it’s amazing to me how Western economists (even Greek ones!) simply are blind to the imperial nature of wage formation. “Blind mouth’d” (the term is Milton’s) bourgeois utopias must be refuted, I guess. But mostly with grim laughter.
If you think a basic income is unlikely to be implemented by governments, an abolition of the price system and a move to absolute abundance is a pipe dream.
Yes, automation is a massive problem for capitalism. But, what I see from these Marxist commentators all the time is a massive overestimation about the near term future possibilities of robots.
Right now, in the US, there’s about 125 million full-time workers working hundreds of billions of hours a year to generate almost $20 trillion of income. How much would we have to generate to get absolute abundance of goods and services among the population? If we assume you need to earn $200,000 to be able to buy anything everyone wants (which is probably an underestimation), you’ll see robots to produce everything that current human workers produce multiplied times 4 in the US.
Maybe one day that will happen but soon? No way. There are tens of millions of jobs that are clearly decades if not centuries away from being fully automated. And in a world constrained by environmental factors hugely limiting production in the long run, abundance of all goods and services seems impossible anyway and hugely damaging to the environment. So, for as long as we live on this planet at least, we will always a way to ration goods and services.
Virgens Kamikazes Says:
You highlight some important challenges a socialist society would have to face once in existance. Those questions, however, do not belong to our generation: they will have to be solved by the future generations. Humans can only solve problems that exist, not imaginary ones. What people in a future socialist society will want for their lives, what will be their values, their culture etc. transcends our imagination. Our problem is, right now, how to overthrow capitalism and initiate the implantation of socialism.
Of course, it doesn’t mean we can’t have the notion of the very basic foundations of socialism – in fact, we must, otherwise we would be fighting against a ghost. So, there are some other issues you state that are inexistent:
1) Yes, there are circa 125 million workers in the USA, but if I’m not mistaken, more than half of them are unproductive; they don’t generate income. And the American working class for sure doesn’t generate US$ 20 trillion in income.
2) In socialism, labor would be directly social, ie people would tend to work according to their capacities and would receive according to their needs. The calculation you make (one person = US$ 200,000.00) wouldn’t make sense in a socialist society, first, because there wouldn’t be money-capital, second, because each needs are different and humans project their needs not according to their imagination, but according to the objective material conditions they live in.
I agree with you that these will be future issues if we want to implement an entirely socialist society. To address your points:
1) A lot of workers in a capitalist system aren’t productive e.g financial services but I wouldn’t say it’s half or even close to that. And the $20trn is the sum of all workers in the economy, of course some produce less than the $100 an hour which is the average productivity of the US economy. In order for full automation to be possible in the long run, current worker productivity must skyrocket when in fact, it’s growing at the slowest rate in post-war history.
2) $200k wouldn’t make sense in purely financial terms, but it represents a material quality of life and value of production. In order to live in a world of abundance, surely not just everyone’s material needs would have to be fulfilled, but also their desires too. Including hundreds of millions of expensive homes and cars etc. Unless the result of production was distributed by the state which would not be an age of abundance at all, it would be an age of designated rationing which is similar, in a way, to how capitalism works except it’s a central body designating goods and services to individuals instead of the market designating capital and then the individual choosing which goods and services to buy. It’s undeniable the latter system is substantially more efficient for obvious reasons.
semyorka Says:
Ben, most of these 125 million jobs are not in the industry (non service providers), but in services (except transportation and stock). Work in the industry decreased a lot ~15% (http://www.bls.gov/emp/ep_table_201.htm ) in the last 15 years in the US. Services do not create surplus, they are at most a burden to the system.
Services are a burden? Are you saying that almost everyone providing a service in the US is a ‘burden’? What about education, healthcare, retail, restaurants, transportation etc etc etc. None of these are ‘industry’ but they create immense value for society.
A burden for the capitalist system. Some forms of services may create surplus, like parlor services, restaurants, transportation. The others, are just enablers of surplus, but they do not add to the mass of profits but only subtract.
You underestimate the level of disgust people are waking up to about Capitalism, and the potential for radical change. here’s a proposal we just released that is already beginning to change the dialogue: http://www.EarthVote.org/common-planet.html
-If a currency is not transferable in any way, then what’s stopping people from abandoning the state-instituted currency and adopting a third-party currency? Also, how can a currency not be transferable but you can sell things? If I wanted someone to transfer one billion ‘R’ to me, I’d just supposedly sell them a pen for a billion ‘R’. Isn’t that legitimate under that system or will the state somehow completely impractically institute a range of values towards certain assets?-
-What’s the incentive to create a ‘group’?
-How would a community determine which land is owned by who democratically? Wouldn’t that be ridiculously inefficient with thousands of polls having to occur each and every year in which most voters wouldn’t know a thing about?
-What if I don’t want to work at all? What if I just sit back enjoy my free house and food and do nothing? If millions did that, it would mean a massive collapse in production and GDP.
-What if another country not in this system decides to bomb us and we have no military?
-Would the state pay you in ‘R’ even if you produced art, music etc that had no value whatsoever and sold 0 copies?
-Who would pay for compensation in car accidents or house damage without insurance?
-What’s the incentive for any ‘groups’ to innovate if they will just get immediately copied without any intellectual property laws?
It would do the world a great benefit if people stopped dreaming up massively flawed social systems and instead campaigned to make real positive improvements to the relatively massively successful system we have now.
Ben, great questions, please consider the fact that we’ve had the advantage of 10 months time to ponder and answer all of those questions, and given enough time, you would come to the answers on your own. However, since the only info we’ve shared is just the Introduction, I’ll address a few of your questions here. Fyi, we will slowly release more info soon.
Many of your questions involving the Currency can likely be found at Copiosis.com
It would be illegal to create another currency, as what need would even necessitate the creation of another currency that wouldn’t already be permissible? The Reward currency itself is not transferable, but yes, you bring up an obvious question, what about possessions that we own which we wish to sell to a person, a group, or release to the Commons? The social judgement of others along with Algorithms would determine the value such that two individuals cannot arbitrarily determine their own value. Most common items would have a consensus value, and rare items would solicit further consideration and judgement then to consensus and if it’s not agreeable to the person then then they don’t have to part with it if they choose in the end. The determination of such ‘value’ is not determined by a small group of bureaucrats or the ‘state’ which will not exist, but rather the collective judgement of your peers in your community and the world at large, similar to the ratings in IMDB.com. The collective judgement of individuals is harder to compromise, especially when there is no conflict of interest for personal gain.
-The incentive to create a group? It’s the Freedom to pursue your passions and or desire to help your community, and in cases of crappy work, for the benefit of higher pay in Reward.
– The property/housing/land/office question is a big one, and it’s one we plan to reveal next week on our website, which really brings the rest of the plan into the realm of real possibility and desirability.
-Are there not 100s millions of idle people right now because Capitalists can not profit from their labor? Are there not 100s millions of people ‘working’ right now that produce nothing of the necessary food, housing, infrastructure or products for society right now? (David Graeber) is writing a book about that right now. What GDP? what is that? that only exists today in a system that measures something make believe rather than measuring how much food is produced/used in a given region/globe, how much resources are available/used, how/for what, how much excess or little housing is available, etc, we don’t measure, manage those resources at all right now. for example, why produce 100,000 of the best quality soccer ball for retail of $150 and 5,000,000 of sub par quality when they basically use the same resources? because profit that’s why. How many resources are currently wasted because it’s more profitable to make it so it breaks, so they can sell more?(planned obsolescence). Non reusable, non recyclable Kurig cups to maximize profit, that’s what for profit Capitalism not only allows per law, but rewards.
– Nuclear weapons and other war only weapons will be destroyed and made illegal. There is no state anymore, we are all humans on the same planet, let’s wake up, we have much bigger challenges to work together toward than trying to control each other. the struggle has always been to gain freedom from an oppressor, but when you are free, in a world of other Free people, do you think they are going to attempt to lose their freedom in trying to create a secret group to weaponize and control others? how would you even go about trying to produce a bomb without someone finding out? and even if you somehow managed to, then what? for what reason? what don’t you have that you can not already get access to? more food? easy, more products, easy, more vacation, easy. you already have freedom to your body, mind, and property.
– The value of our time could be paid in a range from Zero to $10 R per hour (example), within this range, there will be a global consensus that if you paint, you earn .5 R per hour, and if your print is selected ‘sells’ (x number) of copies online to the global community you earn a Bonus of .01 R. just examples of what’s possible.
-the purpose of work is to do good work, if your individual contribution or that of your group is great, and copied, used by others, there can be a Bonus Reward issued, it’s not that complicated. If yours becomes the best 3D/Robot design for producing clothing using x material, then of course it should be shared and used by cities and groups all over the world. If you produce the best, most efficient, environmental sustainable solar cells then yes, those too should be shared, you’ll get your earned Reward and a consensus Bonus too.
-Current State of the World
1. Guaranteed Future Financial Crisis
2. Guaranteed Nuclear threat
3. (possible/guaranteed) Ecological Collapse
plus, how many millions die of starvation, malnutrition, preventable illness, suicide, wars, homelessness, etc.
how many species are going extinct
how much air, water, soil, food pollution is enough?
how much misinformation/lies
how much structural violence and stress
This you call Success? I’d hate to think what system failure would look like.
The truth is, a hundred years ago, if you could get a group of the smartest 1000 people together to devise the WORST possible system for People & Planet, I doubt very much you would come close to what we have allowed to happen.
It’s embarrassing!
Apostolis Says:
Let me points 3 negative things around basic income:
a) It replaces the state welfare system. Money that are used only for specific needs of society (helthcare etc.) are transformed into consumable money.
Because the money are consumable, people will not fight for better wages.
b) it goes hand in hand with the privatization of the welfare system. Even though society does not democratically control the state welfare system, it is still better than a private one since there is no incentive for profit. It is built to provide a service to society.
c) The whole point of this is to reduce the money that the state gives to its citizens and communities, so that they can be given to banks, companies etc.
There can be a good basic income initiative if those 3 do not hold, basically if we keep the welfare system, and it is financed from the taxation of the companies.
And of course, such a measure should be a first step toward the complete abolition of capitalism.
VN Gelis Says:
Globalist fantasies which don’t take into account population movements. If 10m new workers have been added into UK in last twenty odd years and the basic income was say set at £1k what would stop another 30m arriving in a decade from areas with no basic income?
Bank bailouts, post war unemployment and housing benefit etc all are evidence of basic income being assigned one way or another to both capital and labour.
The real issue in the present is Less Work but Work for All with enough basic income to survive adequately, not what exists at present…
Andy B Says:
Just to point to out that some Post-Keynesians particularly the MMT school support a Job Guarentee not a UBI. http://neweconomicperspectives.org/2016/06/argument-basic-income.html
andy blatchford Says:
The MMT crowd have a policy of a Job Guarantee as they don’t agree with a UBI for quite a few of the reasons pointed out above.
A UBI is a basically right wing idea. Why any of the left support it beats me. Does it reduce ‘poverty’ not sure it does.
‘Helicopter Money’ is just the new Mandyonetarists (Neo Keynesians, New Keynesian’s, neither new neither Keynesians) wanting to so ceed control to the central bank as Politicians are apparently too stupid.
“Mandyonearists” ?? Autocorrect playing up that should be ‘monetarists’
Felipe Stuart Says:
How do you view the historic demand for minimum wage laws?
Felipe Stuart
On Sun, Oct 23, 2016 at 4:22 AM, Michael Roberts Blog wrote:
> michael roberts posted: “The idea of a basic income has gained much > popularity recently and not just among leftists but also with right-wing > pro-capital proponents. Basic income boils down to making a monthly > payment by a government to every citizen of an amount that meets ‘basi” >
Felipe Stuart C. Says:
Michael, where does the historic demand for minimum wage laws fit into your analysis?
A minimum wage helps the very low paid and a living wage helps the low paid. Both help labour, so should be supported. The basic income is a different sort of demand not to do with income from the workplace.
Robert Reich wrote an article in favor of it last month. He is a rare bird, someone about whom you almost always decide: the more he promotes something, the more you should be against it.
Stephen Stillwell Says:
Perhaps more radical, providing global economic enfranchisement, by requiring sovereign debt to be backed with Commons shares, that may be claimed by each adult on the planet, for deposit in trust with their bank, as part of an actual social contract, we recognize, distribute, and secure, some value of the Commons for the direct benefit of each
This would define, limit, and distribute to each, a quantum of the fiat that backs our currencies, and by tying all currencies to the value of the same fiat, stabilize exchange and trade
Since fiat does not physically exist, it can be distributed without cost, so each shareholder may claim an arbitrarily valued share of sovereign credit, with no economic impact
If that arbitrary value is equivalent to one million USD, and all available fiat is borrowed, each shareholder would receive a thousand USD/month
Current global sovereign debt would yield about ten or twenty, depending on the inclusion of corporate secure paper (observing that corporations are governments subordinate to their charters,) so the return would be non-negative between zero and a thousand per month, at a sustainable 1.25%, based on the level of global sovereign debt
By recognizing each shareholder as sovereign, and allowing access to secured loans against a portion of their share, for home, farm, or secure interest in employment, at the sovereign rate, each may invest in the means of production
https://en.m.wikipedia.org/wiki/User:Tralfamadoran777
Thanks for your kind indulgence
Responding to Left-Criticism of UBI | Mr Liu's Opinions Says:
[…] A criticism of the universal basic income from the left (Roberts 2016). […]
Varoufakis is concerned with two things– saving capitalism, and getting paid for it.
Think the point is supposed to be about not saving capitalism; about overthrowing it.
SimonH Says:
For all the Ben’s of the world constantly harping on about the impossibility of socialism, what about the transition from feudalism? Once feudalism was the dominant mode of production but now it’s not, was there not a massive change from a society based on serfdom turning in to a society based on wage labour? Or will Ben and others like him pretend there was hardly any change at all?
As far as scarcity is concerned, if you’re really environmentally concerned Ben why are you supporting capitalism which is based on endless growth?
I thought that one of the Marx’s main tenets was how work under the capitalist system was soul-destroying. The skilled worker, with her set of specialist tools and competences was replaced by mindless assembly-line jobs and the knowledge and skills that once individuals carried with them were embedded in the capital of the firm.
Surely Michael, a basic wage, if you could purchase food and accommodation on it would change the demand for labour as well as supply price. People would be freed up to find ways to start small businesses and hone their skills unchained from the need to get an immediate return. Indeed, the individual can go back to a new form of self-sufficiency of the kind that was enjoyed by people in England before Adam Smith and the elite of the time found nasty ways to force people into factories. (Adam Smith was distraught that a man could make a pair of shoes in an afternoon, but had to work three days to be able to buy a pair. Other cronies hated that people had cows at home because it meant they could provide for themselves and need not demand work.)
It would not happen like you stated because of the tendency of the profit rate to fall being the result of rising organic composition of capital. If the OCC rises, variable capital falls relative to constant capital, which means the quantity of starting money-capital required to start a viable business (individual capital) tends to be insurmountable over time for the worker – unless you’re already born in a golden cradle (ie you inherited the means of production).
In this sense, Marx is actually vindicated by Piketty’s data, since it proves that, over time, the main factor that makes one a capitalist is already being born one.
I draw a parallel, Virgens, with the Uber and the airbnb so-called sharing economy. Here people are earning money on their assets and labour but the real winners are the capitalist system owners so I guess you are right that more capital would be needed for people to become entrepreneurs. Some kind of starting capital facility perhaps. However, having started several companies myself I can say a basic income would help a lot more really good inventions come to market.
I’m just the old fashioned type– I always thought the task was to abolish the wage system. Now if you see a “basic wage for all” as some sort of agitational point, a transitional moment so to speak, for abolishing wage labor, well go ahead and make that point.
Otherwise, this is all pretty much nonsense, a social-democrat’s dream for the preservation of capital.
El Firman Says:
Reasons not to be cheerful about basic income under capitalism:
1. Impact on migrant workers: As they wouldn’t be entitled to BI any migrant labour would be exploited by employers as a de facto reserve army of willing labour at any price.
2, Basic income becomes a maximum income for people who cannot access work due to (i) caring obligations (young children and elderly dependents or disabled family members) thus perpetuating intra-class inequality (women in particular would lose out here); (ii) for many disabled people it would also become a maximum income if they were unable to work. Although some versions of BI argue they wouldn’t abolish supplementary benefits for disabled people, they don’t seem to know what these benefits are, and what they are for – some ‘benefits’ exist to secure the right to live independently – nor their overall cost. Some seem to think basic income represents some kind of wages for housework for women. But how, if you receive it without doing housework or caring?
3. I understand it its possible to imagine technology replacing labour if you live in uk, but that’s mainly because labour intensive industries have been moved to poorer countries where labour is unregulated and much cheaper so many falsely assume this work does not exist anymore.
4. Once your recognise point 3, you realise that however basic income is funded it will inevitably involves much larger transfer of surplus value from impoverished labour abroad, to rich individuals in advanced economies (via global assembly lines of production) than current system of national redistribution.
4. Basic income is a gift to the privateers especially particularly public services because theoretically it removes the difficulty of justifying privatisation on the grounds of income. E.g. why should health care be free at the point of use if everyone has BI…?
5. Basic income also undermines those fighting discrimination in employment -‘ if you’ve got a basic income, then what does it matter if white people get 9 x more job interviews than black people’?
6. In 2015 only 5000 employers were prosecuted for breaching minimum wage law in UK. Where is the Basic Income grand plan to tackle this colossal inadequacy?
So many people nowadays tend to assume all citizens have the same needs with only minor differences, but this is a result of right wing propaganda, and the homogenous ‘rational actor’ of economic dogma. Sadly there is also very little consideration paid to the increase in migrations flows due to climate change altering local conditions of production and reproduction and there’s no sign of this changing (the walls of Fortress Europe get bigger every day). It really worries me that if basic income is implemented, it could lead to amplified calls for stronger immigration controls – especially if people thought BI would deliver a ‘bargaining chip’ over wage rates and then find it doesn’t.
As Michael mentioned, reduction of the work week is infinitely superior to a guaranteed minimum income as a social demand. Given a constant quantity of social necessary labor, a reduced work week will require the creation of more jobs to make up the difference. No doubt Ben will pop up to tell us that work week reduction is “centuries away”, but strangely the work day was reduced from 12 to 8 hours and the week from 6 to 5 days over the 100 years to 1950. Even more strangely, it has been stuck at an official 40 hours ever since, despite clear increases in labor productivity. “Stuck at 40” in an imperialist country is even stranger when we factor in any value transfers to worker’s consumer goods by means of international commercial labor arbitrage of super-exploited labor overseas, aka “outsourcing”.
However I too am not optimistic on an accelerated application of IT robotics under capitalism. The barrier is not technical but social. A rational roll out of IT automation in production would no more “take centuries” than the time it took for the extinction of Thomas Jefferson’s agrarian utopia. Jefferson, like Ben, thought too that it would “take centuries”. And IT automation in the circulation of goods and services is precisely the thing to extinguish, also, Ben’s market fetish utopia. Contrary to what Ben thinks, the alternatives are not simply between bureaucracy and his precious market. There was a reason Stalin hated cybernetics.
But under capitalism IT is generally rapidly and productively applied, not to manufacturing production, but to circulation of commodity-capital and hence to the transport sector, of which IT itself is an industrial branch. Otherwise it is applied to facilitate purely parasitic activities such as offshoring value transfers, real estate landed property operations, and the operations of derivative finance capital. Not to mention the monstrous military-industrial state capital, from whence IT was spawned, that does very, very well without Ben’s market, thank you.
I predict that the shortcomings of the application of IT automation will be one of the great historic failures of the capitalist mode of production, though places like China might be an exception, but we shall see there as well. The drastic reductions in the turnover times of capital in both production and especially commodity-capital circulation will create too many problems in the viability of markets. That precisely defines capitalism as a mode of production in deep and terminal decay. Forces meet Ben’s fetters. Moribund.
Basic Income in the hands of capitalists is a bad idea, but so is everything in the hands of capitalists, including technological advancement!
That doesn’t necessarily mean we shouldn’t fight for it as a progressive measure. I guess a basic income recognises the problem that as technology does advance the demand for human labour reduces.
This brings us to Ben’s points. Actually as technology advances the demand for Labour has not really reduced because capitalism is a system built on endless growth, speculative production etc etc.
This is the point about socialism, what gets produced will be much more thought out, rather being speculative and ‘production for productions sake’ and the income inequalities will not be as vast under a socialist system.
If socialism manages to reduce the resources devoted to useless production and increases production in things that are really useful then that is a step forward in itself. In a capitalist system what gets produced is what makes a profit and this leads to a society where production and consumption are separated and human beings don’t take an active role in what gets produced but are simply actors that affect the market. This is a crucial difference between capitalism and socialism. And from my view the wealth of a socialist society would look radically different to the wealth of a capitalist society.
This is why Ben’s scenario falls down, he is trying to compare Apples and Oranges.
However, he is correct about Marxists sometimes overstating the potential of Robots to deliver ‘abundance’. Why Marxists sometimes do this is beyond me because as SimonH pointed out it is the endless growth of capitalism that will hit these barriers at full speed sooner or later!
But of course Marx wasn’t a Marxist and he never thought robots or machines would deliver “abundance.” Human labor, social labor, delivers abundance, and the point of technology is to amplify that abundance producing characteristic. Capital reaches its limit not in technology, but in the social organization of labor as value producing, which in turn means that amplifying the abundance producing character of social labor is limited, restricted, circumscribed, and inverted by the relations of capital.
The barriers capitalism hits are not the limits of human labor, nor of technology, but of profit. Abundance is intrinsic to social labor, not so intrinsic to the preservation of capital.
“Abundance is intrinsic to social labor”
You may as well claim that famine is intrinsic to social labor.
Don’t be ridiculous. Famine’s are the result of the underdevelopment of social labor; the lack of amplifying the productive power of labor– the aggrandizement of social labor for private, restricted consumption and accumulation.
“Famine’s are the result of the underdevelopment of social labor”
This is completely illogical, especially when compared with your other statement:
“Human labor, social labor, delivers abundance, and the point of technology is to amplify that abundance producing characteristic.”
What you are actually now saying is that unless social labour reaches a certain development then famine is a risk.
In which case your comment on October 25, 2016 at 4:19 pm was unmerited.
We have not even brought crop failure into the equation!
If you look at the history of the development of capitalism in
England, let’s say 16th century, what it did do was “emancipate” society from the “Malthusian” trap were population increases, and populations in general were victimized by sudden decimation due to a) crop failures– which is another way of saying lack of accumulating and preserving surplus and b) plague due to one or more pathogens– which is another way of saying lack of sanitation.
Famine, since the development of capitalism, and the ascension of capitalism to dominance has not been the result of “too few resources” or “too many people,” but it has been a result of social policies imposed upon (mainly indigenous) populations, or derived from those policies– think of Ireland and black ’47; India during the WW2 years; famine in Russia before and even after the revolution (i.e. the civil war period); or the recurrent “famines” in sub-Saharan Africa. Those famines are not a result of the overpopulation, or lack of resources, but of a social order that is incapable of overcoming the limits of private property.
Where has there been a famine due to a crop failure that was not the result of social policies in last 100 years?
Clearly famine is still a risk for Africa, and if you agree that the risk exists– what is the source of the risk?
Well if you now conclude this is because social Labour is not developed enough then this contradicts your comment on October 25, 2016 at 4:19 pm.
If we now agree that comment was unmerited then we can stop this circular argument!
Where drought has been extreme, loads of examples. Now climate change is making this situation more acute but if a nation suffers severe drought, which some nations are more prone to than others, then this must be considered a factor in any resulting famine, even if it doesn’t tell the whole story.
So there isn’t any single source of famine to speak of.
I have no idea what your point is. What is the source of the risk of famine in Africa– lack of resources? lack of water? climate change? Or is the legacy, and continued practices of capitalism? Is it the civil wars, or is it some inherent vulnerability of Africa?
My comments are consistent: that is that capitalism has amplified the productivity of labor to eliminate the risk of famine, while at the same time, making that productivity dependent upon, secondary to profitability, thus reestablishing famine as result, intentional or not, of policy.
You say that there “loads of examples” of famine due to a crop failure that was not the result of social policies. OK, name just one. Explain just one– a single famine that was created by purely “natural” conditions, that could not have been prevented from becoming a famine by….socialism. Just one.
There isn’t a single source of difficulties, challenges, problems– but there certainly is a “single source” for those difficulties becoming plagues, famines, epidemics. Look at Haiti. The earthquake was a natural disaster; the devastation of Haiti by capitalism has made the disaster permament.
Or perhaps you think the cholera epidemic, which disease never had a history of outbreak in Haiti was a product of “nature.”
Socialism or the initial stage of communism is not based on need nor does it occupy the realm of abundance. The problem with a citizen or basic income is that it redistributes paid labour. It does not redistribute between unpaid and paid labour which has always been the object of the class struggle.
“The problem with a citizen or basic income is that it redistributes paid labour.”
I am not sure I fully agree with this. being a long standing union activist one crucial part of the negotiations is to ensure the pay gap between ‘skilled’ and ‘unskilled’ is kept to a minimum. So part of the negotiations is to ensure the pay scales reflect this. Many such class struggles under capitalism ultimately resolve into a redistribution between paid labour. This is one of the reasons for abolishing it!
The class struggle in its trade union form is not a conscious struggle, nonetheless it is a complex struggle. At a tactical level you are right. However, at a strategic level the struggle between capital and labour is the struggle over the division and re-division of the working day, between its paid and unpaid components. More precisely it has been the struggle to claw back some of the gains of rising productivity to ensure that wages grow alongside profits. Hence the maxim “fair wages and fair profits”. These gains for labour amounts to only this – not all the increased productivity goes unpaid. This does not mean that the rate of exploitation is reversed, it just means it is moderated. (It is instructive to note that in the USA since 1973, wages for the bottom 60% of the population has risen only 4%-6% in real terms against an increase in productivity of +75%). It is also true that historically trade union struggles could be sectarian, especially by the skilled sections of workers, but with the rise of the general trade unions which now dominate, much of the firepower of the unions or what is left of it has been against the rate of exploitation.
You might like this video on why Marxism never works https://www.youtube.com/watch?v=r8f8OW7eUDw
Well, Adam I watched the seven minutes of ‘Why Marxism makes no sense’ and it was non-sense. Apparently, because we have a welfare state and progressive taxation, it means that better off workers are ‘exploited’ by poorer workers through transfer payments, which is ridiculous and therefore shows Marx’s value theory is ridiculous. Here I am being clearer than he was about what he says – as he just repeats himself endlessly in the seven minutes on this point. Taxation and welfare redistribute part of the value created by labour in an economy but that does not make one worker an ‘exploiter’ of another any more than a better off worker exploits a poorer one because he gets more wages at work. The exploitation takes place in the process of production between labour and capital not in the distribution of that value. That’s the point of Marx’s value theory. You might want to spend more time on Marx’s theories than this youtube nonsense.
tharga8616 Says:
I fully agree that in an automation paradise, giving money to access food and services is a redundant and stupid step. Resource based economy talks about this. The main problem us that you have to pass through a transition while more and more people falls unemployed.
UBI is just that, the freedom needed to focus on that change towards a full automated socialism.
|
cc/2020-05/en_middle_0102.json.gz/line2009
|
__label__wiki
| 0.657068
| 0.657068
|
Germany carries out raids over far-right email threats
BERLIN (AP) — German authorities carried out raids Wednesday in connection with threatening far-right emails sent to mosques, political parties, the media, migrant reception centers.
Bavaria's state criminal police office said seven properties in the southeastern German region and three other states were searched.
The raids were prompted by investigations into 23 emails sent to recipients across Germany over a two-week period in July that contained threats of bomb attacks, among other things. The authors signed off as "People's Front," ''Combat 18" or "Blood and Honor."
Seven people are under investigation and six of them were temporarily detained Wednesday morning, according to Bavaria's state interior minister, Joachim Herrmann.
They were released once the raids were over. Authorities weren't immediately able to locate the seventh suspect.
Herrmann said authorities will now carefully evaluate evidence that was seized.
|
cc/2020-05/en_middle_0102.json.gz/line2014
|
__label__cc
| 0.541433
| 0.458567
|
5 ways you’re shopping Cyber Monday all wrong
From the Cyber Monday Super Guide: The best of everything, with links series
The experts at NerdWallet have some tips for Cyber Monday and how to get the best discounts throughout December.
You’re one of the many shopping on Cyber Monday. But chances are you’re going about it the wrong way.
Don’t just spot a deal and put it in your cart. There’s so much more to do before that part.
We put together a list of some of the most common shopping mistakes. Plus, here’s how to fix them — if you still choose to partake.
(Don’t worry, we didn’t rhyme all of our tips. But seeing as it’s the holiday season, a song-like rhythm seemed to fit.)
1. You’re missing out on coupons
Cyber Monday is meant to be shopped online. So search coupon sites before you buy — it’ll only take a little bit of your time.
Don’t just settle for the Cyber Monday sale prices you see online. Chances are you can stack a coupon (or two or three) on top of those sales, according to Jenny Martin, the writer behind frugal-living website Southern Savers.
“With all of the online deals that are running, look for websites that are always going to let you stack multiple offers together,” Martin says. “If they’re not, I’d almost consider moving on.”
Keep an eye out for percent-off coupon codes, free shipping codes and loyalty member discounts. For example, do you have Kohl’s Cash you can redeem along with a Kohl’s coupon? Victoria’s Secret is another example of a retailer that allows multiple codes for online shoppers.
2. You’re forgetting about Black Friday
Look back at Black Friday prices to remind yourself of the deals that were. And if Cyber Monday sales don’t beat them, hold out a little while longer.
It’s easy to assume everything is a great price on Cyber Monday, but not so fast. Look back at a retailer’s Black Friday ad to see how the deals compare.
You may find that a deal isn’t so great in comparison. If that’s the case, consider skipping Cyber Monday and waiting for last-minute sales before Christmas.
Or, you may find that the deals are exactly the same as Black Friday’s offers, Martin says. That can be a good reminder that limited-time deals aren’t always as limited as they may seem.
After looking back, compare current prices. Apps like ShopSavvy make it easy to cross-check Cyber Monday prices at multiple stores to see where an item is cheapest, says John S. Boyd, CEO of Monolith Technologies Inc., which acquired the ShopSavvy assets.
This price comparison tool has a keyword search feature. Download the app, then type in a product you want to buy. The results combine the best of the web’s sales and deals.
3. You’re limiting yourself
Cyber Monday sales don’t just happen at websites like Walmart, Best Buy and Target. In fact, cyber deals extend to products like hotels, plane tickets and even carpet.
Keep your shopping options open on Cyber Monday. Chances are you’ll come across plenty of deals beyond electronics and toys.
Travel is a prime example, says Sarah Schlichter, senior editor at online travel magazine SmarterTravel. That includes hotel, airfare and tours as well as travel products like shoes, clothing and luggage.
Shop around for a vacation like you would anything else. For example, consult a hotel’s own website as well as hotel search engine sites such as Hotels.com and Trivago.
In addition to Christmas presents and trips, you can also act on cyber sales to better yourself, says Kara Stevens, founder of The Frugal Feminista. Think of a discount on a music class or a discounted education course. After all, cyber sales are just about everywhere.
4. You’re skipping a step
Gift cards aren’t just for gifting to friends and family. In fact, you can buy yourself a gift card on Cyber Monday — and spend it strategically.
Before you find a product, load it in your cart and hit checkout, take one step back and consider purchasing a gift card that you can use as your payment method when you shop.
At gift card marketplaces like Raise, you can buy a gift card for less than face value, then turn around and purchase discounted Cyber Monday products with it. It’s like an added layer of savings.
At the time of this writing, we spotted Macy’s gift cards for up to 5% off, Petco gift cards for up to 6% off and Ulta gift cards for up to 14.4% off at Raise.
There’s also an option to buy a gift card for the exact amount of your Cyber Monday shopping cart, says Raise’s CEO Jay Klauminzer. For some brands, you don’t have to buy a $50 gift card to cover a $42 present. Look for “Exact Pay” on the Raise app.
5. You’re feeling pressured
Much like Black Friday, Cyber Monday has become a weeklong affair. So keep checking back over the next few days for more deals on appliances, electronics or even furniture, like a chair.
There will be plenty of opportunities for sales, even after Cyber Monday is over. So don’t feel compelled to shop now. If a deal isn’t quite right, it’s OK to hold off.
Perhaps most importantly, set a Cyber Monday spending limit before you start clicking around websites. Hold yourself to this budget so you don’t buy things just because Monday is a major shopping event.
“Maybe you got a good deal on those items, but if it’s outside your budget, you didn’t actually save anything,” Schlichter says.
The next 4 weeks will deliver major discounts
The countdown to Christmas is on. But don’t let the pressure stop you from shopping smart in December, just like you do during the rest of the year.
Before you set out on last-minute shopping expeditions this month, consult our list of what to buy (and skip) in December in order to save yourself time and money.
Buy: Toys
If your son or daughter is asking for a flashy new toy or a cuddly stuffed animal this year, it’s wise to buy in December; that’s when toy discounts are likely to abound.
Expect great sales close to Dec. 25. And don’t forget about Super Saturday; retailers traditionally offer loads of savings on the last Saturday before Christmas. This year, Super Saturday is Dec. 21.
Skip: Bedding
Cold weather may have you craving a new set of flannel sheets, but don’t throw out your old linens yet. Historically, the best pricing on bedding and linens happens in January during retail “white sales.” These white sales take place at department stores and online.
The savings are usually substantial. In the past, Joss & Main offered up to 60% off patterned and multicolored bedding picks. Pottery Barn shoppers could save 20% on bedding, towels and more. Overstock offered discounts of up to 70%.
Buy: Christmas decorations
The best discounts on holiday decorations will be after Christmas, when big-box chains and department stores drastically cut prices (sometimes by as much as 80%) on artificial trees, ornaments, wrapping paper, stockings and other seasonal staples.
But if you want to buy some last-minute Christmas necessities for this year, expect discounts to increase as the holiday nears. In the past, some Christmas closeout sales began Dec. 24.
Skip: TVs
Black Friday, the day after Thanksgiving, is the ultimate deal day on electronics, including television sets. If you missed the opportunity, you’ll likely see additional TV deals in December.
But those who can hold out a bit longer will be rewarded with great prices leading up to the Super Bowl. Check for TV discounts in January and the first couple of days of February.
Retailers including Amazon, Target and Best Buy tend to drop prices of TVs around the Super Bowl. Best Buy, for example, has offered up to 30% off some 4K TVs in the past.
Buy: Cookies
If you welcome any excuse to eat a cookie, how about getting one for free? Dec. 4 is National Cookie Day, and cookie shops will celebrate with sweet deals and freebies.
Last year, some stores offered free or discounted cookies to celebrate. Look for similar offers this year from your favorite grocery stores and dessert brands.
Shop intentionally to avoid holiday overspending
The holidays can be hard: cooking elaborate meals, facing frigid temperatures, making travel plans that please everyone.
Overspending, however, is too easy. In fact, about 48 million Americans are still paying off credit card debt from last holiday season, according to a NerdWallet survey conducted by The Harris Poll.
To avoid financial regrets in 2020, shop intentionally. Here’s how:
Understand why overspending is easy
Pressures and emotions run high
Ideally, your holidays are full of joy. But they may be loaded in other ways, like the pressure to buy everyone presents.
Gift-buying requires money, time and energy when you may already feel overwhelmed, says Los Angeles-based financial therapist Amanda Clayman. During the holidays, “we’re chasing a sort of emotional experience,” she says. Think: the love and happiness of a Hallmark movie.
But feelings of grief or longing may be more realistic. “This is a sad and lonely time for many people,” says Sarah Newcomb, behavioral economist for Morningstar. Shopping (for anything or everything) can be a convenient coping mechanism.
Marketers play on emotions
“Retailers are quick to tell you that if you’re not feeling particularly in the holiday spirit, then the solution is a gift or deal,” Clayman says.
Retailers also play on your sense of identity through marketing. They “show the life you want to be living,” says Newcomb, author of “Loaded: Money, Psychology, and How to Get Ahead Without Leaving Your Values Behind.” You, too, can be the ultimate host, perfect Santa or unforgettable gift-giver — if you splurge on catering, buy every toy, or surprise your spouse with a Lexus.
“It’s not a coincidence that almost all the research on psychology and spending is in the marketing journals,” Newcomb says. “Marketers are highly aware of how deeply connected our purchases are to our sense of identity.”
Learn to shop intentionally
Acknowledge emotions and triggers
Recognize feelings, like sadness, and that they may lead to overspending. Plan to cope in another way, like calling a friend, Newcomb says.
Reflection can also help you outsmart marketing messages. “Get clear on your emotional goals for the holidays,” like connecting with family, Newcomb says. Ads showing people fulfilling your goal may provoke you to spend, she says. Recognize those loaded messages, and Newcomb says you’ll face “less of a subliminal pull.” Knowing your goals will also help you consider cheaper ways to achieve them.
Rethink gift-giving
Instead of everyone giving one another presents, swap names so you buy for only one person. Don’t forget the price cap. Newcomb’s family buys gifts for the children only. That decision “took a lot of stress off everybody,” she says, adding that the grown-ups cared only about spending time together anyway.
Make a shopping list
A list “makes the biggest difference in whether people shop frugally or not,” says Utpal Dholakia, professor of marketing at Rice University’s Jones Graduate School of Business. Identify exactly what you need or want, or it will be too easy to impulse buy.
Research products and prices
Once you know what you want, Dholakia recommends researching brands and features. Find prices at many retailers so you can compare, and search online for price history. Marketers research ways to position products and price them in compelling ways, he says. Your homework will help you determine if those prices are actually bargains.
Be wary of markdowns
You’ll spot many items on sale that you want but aren’t on your list. Take a cue from Newcomb, who passed on a discounted sweater while shopping for a comforter. She told herself: “There are a thousand things in this store that are beautiful and that I’m not here for.”
Discounts don’t justify unplanned purchases, she says. Admire a product and its price, then move on. “If you bought everything that was a good deal, you’d run out of money immediately,” Newcomb says.
Skip the cart
Handle in-store shopping like a buffet, Clayman says. Like scouting the spread before loading a plate, peruse the store’s offerings before grabbing a cart.
Otherwise, you may fill it without reflecting. At that point, “you’ve already bonded with [the product],” Clayman says. “Putting it back feels like a loss.”
Give yourself time and space
Spending time apart from items you initially love is part of why the buffet strategy works. After circulating throughout the store, you may forget about them or lose interest.
Space and time are key, Clayman says. If you like something that’s not on your list, she suggests leaving the store and returning another time. You risk the item or its promotional price no longer being available. But around the holidays, she says, there are plenty of things to buy and deals to claim.
In many cases after leaving, Newcomb says, “the emotion cools, you think back and say ‘oh yeah, I’m glad I didn’t buy that.’”
Dccdbz
Cyber Monday Super Guide: The best of everything, with links
Nov 27, 2019 collection
Best in personal care
Best around the house
Best for do-it-yourselfers
Related to this collection
Buying guide: Before you jump online for Cyber Monday deals, check out these independent recommendations from BestReviews.
Subscribe to The Southern
iPhone & Android App
Southern Business
Special Sections on ISSUU
Newspapers.com Archives
Top 20+ Dining Card
eEdition Newspaper
Be a carrier
Dealer returns
© Copyright 2020 The Southern Illinoisan, 710 N. Illinois Avenue Carbondale, IL | Terms of Use | Privacy Policy
|
cc/2020-05/en_middle_0102.json.gz/line2021
|
__label__wiki
| 0.905701
| 0.905701
|
FILE - This Feb. 27, 2018 file photo, Australian Malka Leifer, right, is brought to a courtroom in Jerusalem. Leifer is wanted in Australia for 74 charges of sexual assault and the country's request for her extradition has been delayed for years. (AP Photo/Mahmoud Illean, File)
Drawn-out sex crimes case rattles Israel-Australia ties
JERUSALEM (AP) — Nicole Meyer endured years of sexual abuse allegedly at the hands of her former school principal. She’s had to watch as her alleged abuser fled her residence in Australia for Israel, evaded justice for years and is now undergoing a protracted extradition process that critics have...
FILE - This Dec. 6, 2019 file photo shows Harvey Weinstein, center, leaving court following a bail hearing in New York. A former model who accused Weinstein last year of sexually abusing her when she was 16 filed a new lawsuit against him Thursday, Dec. 19, saying she didn't want to be included in a proposed global settlement that would split $25 million among various accusers. (AP Photo/Mark Lennihan, File)
Los Angeles Prosecutors Reviewing 8 Cases Against Weinstein
LOS ANGELES (AP) — Prosecutors in Los Angeles are reviewing eight cases accusing disgraced film mogul Harvey Weinstein of sexual assault, an official said Thursday. The Los Angeles and Beverly Hills police departments each brought four investigations to prosecutors, according to Ricardo Santiago, a...
FILE - In this Sept. 27, 2015 file photo, clouds are lit by the rising sun over St. Augustine Roman Catholic Church in Philadelphia. Pennsylvania’s Roman Catholic dioceses have paid nearly $84 million to 564 victims of sexual abuse, a tally that’s sure to grow substantially in 2020 as compensation fund administrators work through a backlog of claims, according to an Associated Press review. (AP Photo/Julio Cortez)
Pennsylvania Dioceses Offer $84M To 564 Clergy Abuse Victims
Pennsylvania’s Roman Catholic dioceses have paid nearly $84 million to 564 victims of sexual abuse, a tally that’s sure to grow substantially in the new year as compensation fund administrators work through a backlog of claims, according to an Associated Press review. Seven of the state’s eight...
AG suspends investigation of Michigan State over Nassar
LANSING, Mich. (AP) — State Attorney General Dana Nessel has suspended a nearly two-year-long investigation into Michigan State University's handling of complaints against now-imprisoned serial sexual abuser Larry Nassar, a spokeswoman said Tuesday. The probe, which began under Nessel's predecessor...
Maryland pediatrician gets jail for sexually abusing patient
BALTIMORE (AP) — A Maryland pediatrician has been sentenced to a year in a county detention facility for sexually abusing an 18-year-old patient he had been treating since she was a baby. Ernesto Torres, 69, was sentenced Monday, news outlets report. He'll get credit for the about 230 days he's...
FILE - In this Wednesday, June 19, 2019, file photo, state Sen. Brad Hoylman, D-New York, speaks in the Senate Chamber at the state Capitol in Albany, N.Y. Hoylman introduced the Adult Survivors Act in the autumn of 2019, saying survivors of adult sex abuse deserve their day in court. (AP Photo/Hans Pennink, File)
Bill aims to open lawsuit window for adult sex abuse suits
ALBANY, N.Y. (AP) — Churches, youth groups and schools were hit by a tsunami of lawsuits in 2019 after New York gave survivors of childhood sexual abuse a one-year window to sue over allegations ordinarily barred by statutes of limitation. Now, some lawmakers want to open the same window for people...
Legion of Christ finds 33 priests, 71 seminarian sex abusers
VATICAN CITY (AP) — The Legion of Christ religious order, which was discredited by its pedophile founder and the cult-like practices he imposed, says an internal investigation has identified 33 priests and 71 seminarians who sexually abused minors over the past eight decades. A third of the...
In this Monday, Dec. 9, 2019 photo, Monsignor John Kennedy, the head of the Congregation for the Doctrine of the Faith discipline section, speaks during an interview on the terrace of the section's offices at the Vatican. "We're effectively seeing a tsunami of cases at the moment, particularly from countries where we never heard from (before)," Kennedy said, referring to allegations of abuse that occurred for the most part years or decades ago. (AP Photo/Alessandra Tarantino)
Vatican office lifts veil, revealing vast caseload of abuse
VATICAN CITY (AP) — The Vatican office responsible for processing clergy sex abuse complaints has seen a record 1,000 cases reported from around the world this year, including from countries it had not heard from before — suggesting that the worst may be yet to come in a crisis that has plagued the...
Ex-Model Sues Weinstein, Renewing Allegations Of Abuse At 16
NEW YORK (AP) — A former model who accused Harvey Weinstein last year of sexually abusing her when she was 16 years old filed a new lawsuit against him Thursday, saying she didn't want to be included in a proposed global settlement that would split $25 million among various accusers. Kaja Sokola,...
This combination of photos made from individual Polaroid emulsion transfers shows, from left, Dorothy Small, 65; Patrick Shepard, 48, and Jacob Olivas, 50. They were believers_before their trust was tested, fractured or blown apart entirely by sexual abuse at the hands of a priest. (AP Photo/Wong Maye-E)
SUNDAYS AFTER: Portraits of resilience after clergy abuse
They came from different towns and cities, from different ethnic and economic backgrounds. They were A-students and outcasts, people of all ages. From their churches they sought love or guidance, a better education or a place that felt like home. They were believers_before their trust was tested,...
|
cc/2020-05/en_middle_0102.json.gz/line2025
|
__label__cc
| 0.560706
| 0.439294
|
2PM | Archives
Past issues Subscribe
Jul 5 Jul 7
2 PM LINKS - No. 77 Warby Park it, A Weaker Nike, Megatrends
This is issue no. 77 of 180. Last letter saw a 39.91% open rate with 8.38% going to this article on accelerating early eCommerce revenue.
Today's Top Intelligence (8 Reads)
On The Laws of Retail Physics
ECOMMERCE: There will be a whole new generation of great brands created in the coming years. There are many great investors leaning into these opportunities, including us. But I’d suggest that founders in these categories look for modest valuations and bootstrap as much as possible. Loot Crate bootstrapped its way to 600,000 subscribers and $100 million in revenue — you can too. Leverage Kickstarter or Indiegogo as much as possible — Misfit got its start on Indiegogo and ultimately sold for a quarter billion dollars.
Also read: 2PML's Last Word on June 30.
8 Snapchat Follows for Marketing & Growth
BRAND: It took me a while to finally “get” Snapchat. In fact, it wasn’t until earlier this year when my agency’s founder kept sending me random snaps from Comedy Central’s Discover Channel that I finally Googled, “how to use Snapchat” like an old person so that I could figure out how to appropriately respond to her. Yes, I was part of the 1% of Millennials that wasn’t actively using Shapchat, but thanks to my boss’ love for Key and Peele, her refusal to get cable TV, plus my cousin’s random cat videos, I decided it was finally time to become better acquainted.
5 eCommerce Lessons from Burberry and Hermes
ECOMMERCE: Both brands are longstanding international status symbols at the forefront of the fashion industry - each featuring distinct and exceptional product lines. But where they differ greatly is in their digital commerce offerings. Burberry is a luxury brand that really gets it right. The brand’s digital experience is perfectly aligned with its image and persona - creating a sleek, chic, modern and cool feel. The couture brand uses bold visuals throughout its site, with a dynamic homepage that integrates interactive elements and visually stunning photography that instantly captures the attention of any consumer.
MeUndies Boosted Sales Through Snapchat
ECOMMERCE: Like MeUndies, many companies started considering Snapchat as if it were TV by producing narrative-driven series. While every snap can be seen as a story in some degree, Paul Marcum, president for agency Truffle Pig (backed by Snapchat, WPP and DailyMail), believes that Snapchat requires “a different approach and a different level of brand presentation,” meaning that brands have to be agile and develop content quickly. “The biggest challenge on Snapchat is to make everything look as effortless as possible,” said Marcum.
This Giant Athletic Brand Is No Longer Invincible
BRAND: Nike already anticipates that there will be excess inventory going into the first fiscal quarter of 2017, and excess inventory means deep discounts, which ultimately hurts profits. As for basketball sneakers, though the sales dip is only 1 percent, according to UBS, basketball accounts for 12 to 14 percent of the company's business—so 1 percent is nothing to sneeze at. There's also the rise of luxury sneakers to consider.
Video Drives More eCommerce Conversions
ECOMMERCE: One of the most significant statistics outlined in the infographic reflects the potential impact of video in the sales process. According to the statistic, using product videos on ecommerce sites can increase product purchases by 144 percent. That’s a huge difference. But if you think about the growing popularity of online videos, it makes sense. Especially in an ecommerce environment where buyers don’t have the opportunity to pick up products.
Bots in 2016: Mid-Year Check In [Access For The First 30 Clicks]
THE INFORMATION: The past six months have shown that building compelling bots is very challenging. Completely automated bots aren’t ready for prime time and hybrid services with human involvement cost a lot to develop. How developers can make money from bots also hasn’t been clarified. But I’m still bullish on the shift to bots. In light of great hype and quick disappointment in most places, the hype-cycle backlash has already started.
Inside the Newest Snapchat Megatrend
MEDIA: There are two types of geofilters: community filters and on-demand filters. Community filters pop up when you step into a new city, onto a college campus, into a park, or even a neighborhood. They generally cover a larger area and stick around forever. On-demand filters are typically used for events, including weddings, birthday parties, concerts. Those cover less space and last a shorter period of time, but are also much easier to submit and get approved.
Whiteboard: converting eCommerce metrics to investor-speak
Today's top article on The Laws of Retail Physics is an important article. There is truth and clarity in it, even if there are a few points that I'd contend. Warby Parker ($115M raised) has fewer exit opportunities than most. Casper is at the cusp ($56M raised) of the same sorts of limitation and Bonobos has blown past them both with ($128M raised).
One of the laws of retail physics that we observe in the startup world's second tier markets like Vegas, New Orleans, Columbus, Dallas, Atlanta, Louisville is that you should raise as little as possible. This typically means that achieving cash flow positive must be in the cards, early on, to be a sustaining business.
In between the two American coasts, DNVB's have to operate for short-term profitability. Series A and Series B rounds are raised to achieve this goal. This is often done by reverse engineering investor metrics into workable, efficient eCommerce marketing and branding plans. Data driven brand managers / CMO's are rare but they exist at the healthiest eCommerce brands.
"The CEOs of DNVBs obsess over creating the perfect Facebook ad featuring photogenic models, but they really need to spend more time honing their financial model in Excel." ~ Micah Rosenbloom, Partner Founder Collective
This is probably the most important quote. It's what a few companies have done really well. Often, the ones that do have raised < $10M in total capital and have 60+% gross margins with a financial model that leans upon omni-channel, Net Promoter-driven organic sales, and a honed-in digital ad strategy that drives quarterly growth with minimal risk. These are the few that will achieve a 3-4x multiple at exit.
Jul 5 Archive Jul 7
© 2016-2020 2PM | Archives
|
cc/2020-05/en_middle_0102.json.gz/line2027
|
__label__wiki
| 0.779921
| 0.779921
|
PRESIDENT | VICE PRESIDENT | FIRST LADY | MRS. CHENEY | NEWS
Your Government | History & Tours | Kids | E-mail | En Español
Podcasts RSS Feeds
Global Diplomacy
Judicial Nominations
Federal Facts
Home > News & Policies > September 2008
Printer-Friendly Version Email This Page
Statement by the President on H.R. 2638, the "Consolidated Security, Disaster Assistance, and Continuing Appropriations Act, 2009"
Today I have signed into law H.R. 2638, the "Consolidated Security, Disaster Assistance, and Continuing Appropriations Act, 2009." The Act, consisting of five divisions, consolidates into a single Act several appropriations bills. It provides through emergency supplemental appropriations additional Fiscal Year (FY) 2008 resources needed for relief and recovery from hurricanes, floods, and other disasters, and other supplemental appropriations.
The Act also includes full-year FY 2009 appropriations for the Department of Defense and the Department of Homeland Security and for Military Construction and Veterans Affairs. Furthermore, the Act provides FY 2009 appropriations to continue operations of the Federal Government through March 6, 2009, for projects and activities not otherwise covered in the full-year bills. This Act lifts the legislative moratoria on oil and gas leasing on significant portions of the Outer Continental Shelf and the prohibition on the completion of regulations for commercial leasing of oil shale, which will allow us to reduce our dependence on foreign oil.
I am disappointed that the Congress passed a long-term continuing resolution. There is much work to be done, and the Congress should not adjourn for the year without finishing important business on spending, taxes, and free trade agreements.
Finally, this legislation contains certain provisions similar to those found in prior appropriations bills passed by the Congress that might be construed to be inconsistent with my Constitutional responsibilities. To avoid such potential infirmities, the executive branch will interpret and construe such provisions in the same manner as I have previously stated in regard to similar provisions.
THE WHITE HOUSE,
President | Vice President | First Lady | Mrs. Cheney | News & Policies
History & Tours | Kids | Your Government | Appointments | Jobs | Contact |
Accessibility | Search | Privacy Policy | Help | Site Map
|
cc/2020-05/en_middle_0102.json.gz/line2028
|
__label__wiki
| 0.90816
| 0.90816
|
Read Next: TV Ratings: NFL's AFC, NFC Championship Games Down From 2019
July 27, 2018 10:30AM PT
‘Chicago Fire’ Casts Annie Ilonzeh, Steven Boyer in Recurring Roles (EXCLUSIVE)
By Joe Otterson
Joe Otterson
TV Reporter @https://twitter.com/joeotterson FOLLOW
Joe's Most Recent Stories
‘Surviving Jeffrey Epstein’ Docuseries Gets Greenlight at Lifetime
‘World According to Jeff Goldblum’ Renewed for Season 2 at Disney Plus
Freeform Boss Tom Ascheim Touts ‘Four-Part Formula for Longevity’
CREDIT: Courtesy of Annie Ilonzeh/Steven Boyer
“Chicago Fire” has cast both Annie Ilonzeh and Steven Boyer in recurring roles for the show’s upcoming seventh season, Variety has learned exclusively.
Ilonzeh will appear as Emily Foster, described as an intelligent, easygoing and confident new paramedic. Foster is new to the Chicago Fire Department but is a quick and effective worker. She may have a chip on her shoulder from the previous bumps in the road, yet takes everything in stride.
Boyer will play Assistant Deputy Commissioner Jerry Gorsch, the recently named Assistant Deputy Commissioner at the CFD. Nursing a Napoleon complex, Gorsh is not a typical hero. Never known for his bravery, he’s a former firefighter who has set his eyes on the cushier jobs at headquarters.
Ilonzeh has had recurring roles on shows like “Empire,” “Person of Interest,” “Graceland,” “Drop Dead Diva,”
“Arrow,” and “Switched at Birth.” She is known for her starring role on ABC’s reboot of “Charlie’s Angels” and for playing Maya Ward on “General Hospital.” She also just completed a starring role opposite Jennifer Garner in
the action drama thriller “Peppermint.” She is repped by Etcetera and Company and Jackoway Austen Tyerman Wertheimer Mandelbaum Morris Bernstein Trattner & Klein.
Boyer currently stars on NBC’s crime mockumentary “Trial & Error.” He has also appeared on shows like “Orange Is the New Black,” “The Blacklist,” “The Good Wife,” and “Law & Order.” He is repped by the Stone Manners Salners Agency and Bleecker Street Entertainment.
Leave a Reply6
|
cc/2020-05/en_middle_0102.json.gz/line2030
|
__label__wiki
| 0.862513
| 0.862513
|
Read Next: Korea Box Office: ‘Secret Zoo’ Beats ‘Dolittle’ and ‘Bad Boys’ for Weekend Win
September 6, 2019 6:06PM PT
Toronto Film Review: ‘Human Capital’
Several upstate New York lives are entangled by a hit-and-run accident in this well-cast but middling remake of the 2013 Italian film.
By Dennis Harvey
Dennis Harvey
Dennis's Most Recent Stories
‘VHYes’: Film Review
‘The Wave’: Film Review
‘Standing Up, Falling Down’: Film Review
CREDIT: Toronto Film Festival
Liev Schreiber, Marisa Tomei, Peter Sarsgaard, Maya Hawke, Alex Wolff
“Human Capital” has returned home in a sense, in that American novelist Stephen Amidon’s 2004 book was made into a very well-received Italian film by Paolo Virzi in 2013, and now Marc Meyers’ U.S. feature is based on both prior incarnations. There’s no reason it shouldn’t work again in what is, after all, its original setting. Yet as with the recent stateside do-overs of “After the Wedding” and “Gloria,” this is another remake probably best enjoyed by those unfamiliar with its predecessor, which remains more incisive and memorable. This “Capital” succeeds as a well-acted crisscrosser of a melodrama between two awkwardly entangled families in upstate New York. Where it falls well short is in attaining the level of biting social commentary Virzi drew from the same material.
The first thing we see here is a restaurant worker bicycling home from work, only to be sideswiped by an SUV on a dark country road and left for dead. It takes some time before we get back to that incident, however, as the focus immediately shifts to the financial woes of real estate agent Drew (Liev Schreiber), who’s a bit stretched — and soon to be more so, once he learns that his therapist second wife Ronnie (Betty Gabriel) is expecting twins.
But a lucky break appears to fall in his lap when he drops off teenage daughter Shannon (Maya Hawke of “Stranger Things”) at her boyfriend’s manse. Fellow high schooler Jamie (Fred Hechinger) happens to be the son of superstar venture capitalist Quint Manning (Peter Sarsgaard), who happens to need a tennis partner at that moment. Having nearly gone pro in his youth, Drew passes muster, and doesn’t miss the chance to propose getting in on Quint’s much-trumpeted latest hedge fund.
Trouble is, this is the kind of enterprise devised by already rich people to further enrich one another. While assuring Quint otherwise, Drew doesn’t have the ready cash to make even the minimum required contribution of $300,000. But convinced he’s onto a “sure thing,” he falsifies his finances to get a high-interest loan. This could turn out to be a very bad idea — and needless to say, it does.
As this noose of his own making tightens around Drew’s neck, at the approximately one-third point certain events start being retold from a different perspective, that of Quint’s wife, Carrie (Marisa Tomei). A former actress of no particular renown, she’s a dissatisfied trophy wife, with little to do save run interference between her only child, Jamie, and his demanding father. She spies an opportunity for fulfillment in the form of a dilapidated but still impressive old art deco theater in their upstate town. With hubby’s money, could she acquire it, oversee a restoration, then chair the board for a new community arts center? It seems possible — until that hedge fund tanks, which proves bad news for all involved.
The events are related a third and final time from the viewpoint of Shannon, a somewhat bratty, sullen looker still resentful over her mother’s long-ago abandonment and Ronnie’s arrival. The hit-and-run mishap now takes center stage as the core plot mystery. Police have figured out the bicyclist was injured by Jamie’s car — but who was driving? Was it the rich kid, drunk after a party? Newly ex-girlfriend Shannon, whom he called for a ride? Or Ian (Alex Wolff of “Hereditary”), her new beau, who not incidentally is a disturbed patient of her stepmother’s?
Oren Moverman’s typically skillful screenplay etches these relationships and conflicts with brisk economy, and Meyers (whose last film “My Friend Dahmer” impressively managed a trickier tonal challenge) plays them out effectively enough, thanks in large part to his strong cast. But this time around, “Human Capital” feels less ingenious than a bit gimmicky, less a set of sharp if schematic collisions between oppositional interests than an overloaded pile of crises á la “Crash.” The class barriers that felt formidable in the Italian film are less potent in this American context, robbing the story of some thematic heft.
In the end, this incarnation comes off as an intelligent potboiler, no more or less, its convoluted narrative rigging not leading to any particular sense of meaning. The lack of some framing thesis, however vague, hurts because what we’re left with is just the human factor — and these largely dislikable characters aren’t easy to root for.
Nonetheless, the solid performances and assured packaging make this a reasonably engrossing tale set in a convincingly upscale burg where some less-prosperous citizens are trying not to make their anxiety too obvious. If the typical screen bedroom-community drama of half a century ago was about the disillusioning aspects of affluence, “Human Capital” is just as relevant in its reflection of today’s reality. Its middle-class denizens aren’t bored — they’re too busy hanging on for dear life.
Toronto Film Review: 'Human Capital'
Reviewed at Toronto Film Festival (Special Presentations), Sept. 6, 2019. Running time: 97 MIN.
Production: A Maven Pictures, Bert Marcus Film presentation in association with Raptor Films, Farcaster Films, Sobiloff Prods., Ibid Films, Bit of Both Prods., Illuminated Content, Indiana Prod., RAI Cinema. (Int'l sales: UTA, Los Angeles.) Producers: Celine Rattray, Trudie Styler, Oren Moverman, Bert Marcus, Matthew Stillman. Executive producers: Peter Sobiloff, Michael Sobiloff, Cathleen Ihasz, Nicole Ihasz, Joanna Plafsky, Cassandra Thorton, Brian Lamacchia, Henry Wu, Jody Girgenti, Jenny Halper, Nic Marshall, Christopher Burch, Ali K. Rizvi, Ash Avildsen, Voula Wolf Duval, Jon Wanzek, Jacqui Lewis, David Yashar, Alex Hall, J.D. Oppenheim, Fabrizio Donvito, Marco Cohen, Benedetto Habib, Daniel Campos Pavoncelli, Dov Mamann.
Crew: Director: Marc Meyers. Screenplay: Oren Moverman, based on the book by Stephen Amidon” and the film “Il Capital Unman” by Paolo Virzi. Camera (color, widescreen, HD): Kat Westergaard. Editors: Tariq Anwar, Alex Hall. Music: Marcelo Zarvos.
With: Liev Schreiber, Marisa Tomei, Peter Sarsgaard, Maya Hawke, Alex Wolff, Betty Gabriel, Assif Mandvi, Mark Blum, Dominic Colon, James Waterston, Fredric Lehne, Marisa Ryan, Paul Sparks. Fred Hechinger.
An avalanche isn’t the most desirable image to show packed movie houses at the base of a mountain in Utah, but it’s used to great effect in “Downhill,” an American riff on the Ruben Ostlund film “Force Majeure,” set to light up the Sundance film festival this week. Julia Louis-Dreyfus and Will Ferrell team for [...]
There’s a feeling I always get at the end of a long Oscar night when the movie that won isn’t a terrible choice, but it’s the safe, blah, MOR predictable choice, the one that conforms to the dullest conventional wisdom about the kinds of movies Oscar voters prefer, because in the core of their being [...]
Enderby Entertainment is developing a feature film based on Melissa Fay Greene’s civil rights drama “Praying for Sheetrock,” Variety has learned exclusively. The non-fiction book, published in 1991, was a finalist for the National Book Award and won the Robert F. Kennedy Book Award, Chicago Tribune Heartland Prize, Georgia Historical Society Bell Award and the ACLU National Civil [...]
The first-ever trailer for Marvel and Sony’s next Spider-man spinoff “Morbius” left comic book fans reeling with theories. While the plight of the main character, Dr. Michael Morbius (Jared Leto) – a scientist dying of a rare blood disease who accidentally turns himself into a vampire – seemed ripped right out of the comics, the [...]
“Bad Boys for Life” has given a jolt to the North American box office, blasting past forecasts with a $73.4 million opening at 3,775 sites over the Martin Luther King Jr. holiday weekend. The third iteration of the Will Smith-Martin Lawrence action comedy franchise will finish the Friday-Monday as Sony Pictures’ biggest R-rated opening ever [...]
|
cc/2020-05/en_middle_0102.json.gz/line2031
|
__label__wiki
| 0.78935
| 0.78935
|
Europe: Peggy Sue, Cate Le Bon, Peter Morén, Hauschka, and Rebecca Ferguson
I can't help but think of Buddy Holly when I think of Peggy Sue, but clearly this Brighton-based band doesn't sound anything like Buddy. For one thing, they are supposed to sound…
peggywho.com
I caught Peggy Sue in 2010 at the 400 Bar (RIP). The folky British band (Rosa Slade and Katy Young and drummer Olly Joyce) will be returning with a new album Choir of Echoes on January 28th on Yep Roc Records. In the meantime, the band released their new single, "Idle" on their Soundcloud account:
They explained that the song, "[is] about being unemployed and incurably thoughtful. The opening and closing parts are a kind of troubled gospel song—a prayer for purpose in the knowledge that the purpose will probably not be a ‘good’ one. It’s about impatience and distractions and thinking about things too much..... and of course it’s about a boy."
The band will begin a full UK tour in support of the new album:
01/27/14 - London, St Pancras Old Church
03/27/14 - Copenhagen - Ideal Bar @ VEGA
03/28/14 - Hamburg - Kulturhaus III & 70
03/30/14 - Berlin - Privatclub
03/31/14 - Munich - Kranhalle
04/01/14 - Cologne - Blue Shell
04/02/14 - Brussels - Botanique (Witloof Bar)
04/03/14 - Utrecht - Ekko
04/07/14 - Brighton - Green Door Store
04/08/14 - Coventry - The Tin
04/09/14 - Manchester - Soup Kitchen
04/10/14 - Glasgow - Broadcast
04/11/14 - Liverpool - Leaf
04/12/14 - Sheffield - The Harley
04/14/14 - Bristol - The Old Bookshop
04/15/14 - London - Oslo
Remember Cate le Bon? I saw her play live earlier this year, and I reported that she has a "haunting voice". Well she's back in the news again with a couple of news items …
catelebon.com
Welsh singer/songwriter Cate Le Bon’s new album, Mug Museum, is her first recorded outside of her homeland – deep in the dark heart of the entertainment empire at Seahorse Sound Studios, Los Angeles.
Taking such a unique talent and placing it in the heart of Autotuneland was an alarming prospect to those who have come to love her dark indie songcraft. However, a first listen of Mug Museum reveals that the new record is as eclectic and darkly ethereal as ever. Producer Noah Georgeson (Joanna Newsom/Devendra Banhart) adds a subtle polish to the songs without detracting from their Velvet Underground / Television / Nico influenced indie sparkle.
Cate and her band are hitting the road next week to promote Mug Museum on a North American tour that kicks off at the Rickshaw Stop in San Francisco on December 3rd and winds up at the Soda Bar in San Diego on February 1st.
Cate Le Bon's tour dates:
12/03 San Francisco, CA - Rickshaw Stop ~
12/05 Portland, OR - Doug Fir Lounge ~
12/06 Seattle, WA - Barboza ~^
12/07 Boise, ID - Neurolux ~
12/09 Salt Lake City - Kilby Court ~
12/11 Denver, CO - Larimer Lounge
12/13 Phoenix, AZ - Pub Rock Live ~
12/14 Los Angeles, CA - Bootleg Bar ~
01/07 Dallas, TX - Three Links
01/08 Houston, TX - Fitzgerald's
01/09 New Orleans, LA - The New Orleans Mint
01/10 Birmingham, AL - The Bottletree
01/11 Decatur, GA - Eddie's Attic
01/12 Carrboro, NC - Cat's Cradle Back Room
01/14 Charlottesville, VA - The Southern
01/15 Washington DC - DC9
01/16 New York, NY - Mercury Lounge
01/17 Philadelphia, PA - Boot & Saddle
01/18 Boston, MA - Middle East Upstairs
01/21 Toronto, ON - The Drake Hotel
01/22 Pontiac, MI - Pike Room at The Crofoot
01/23 Chicago, IL - Schubas
01/24 Madison, WI - The Frequency
01/25 Minneapolis, MN - 7th St. Entry
01/27 Kansas City, MO - Record Bar
01/28 Norman, OK - The Opolis
01/29 Austin, TX - The Mohawk
01/31 Tucson, AZ - Club Congress
02/01 San Diego - Soda Bar
~ = w/ Kevin Morby, ^ = w/ Basia Bulat
Much of this was attributed to the band’s infectious, sometimes corny enthusiasm. In his powder blue suit, Peter Morén, flaunted Bowie-inspired dance moves while guitarist Björn Yttling …
PETER MOREN
petermoren.com
Peter Morén (The Peter in Sweden's Peter, Bjorn, & John) will be releasing a series of EPs, starting with Broken Swenglish Vol. 1, a four song release.
I know you're wondering, whatever happened to PB&J? Since the band had a breakthrough hit album in 2006 with Writer's Block (hey, even Kanye sampled "Young Folks"!) the band's been distracted with various side projects and such.
The band's last album Gimme Some was released in 2011 and spawned a hit song "Second Chance", which was used for CBS' 2 Broke Girls.
Since then Morén concentrated on his third solo album Pyramiden (his second all Swedish album), which was released last year in Sweden. One of the reason why the album never resurfaced in England or America is because all the songs were written and sung in Morén's native tongue, Swedish. Of course, it was considered some of his best work, thanks to his new found freedom of expressing his music.
Look for Broken Swenglish Vol. 1 on December 9th on Ingrid. The release marks Morén’s first solo release in the US since 2008’s full-length studio album The Last Tycoon.
SPCO's Liquid Music
How appropriate it was that Saturday night’s concert at the McGuire Theater in the Walker Art Center was co-presented with the St. Paul Chamber Orchestra’s Liquid Music Series, as “liquid music” was one of the most …
HILARY HAHN & HAUSCHKA
hahnandhauschka.com
The Saint Paul Chamber Orchestra's Liquid Music series and Schubert Club Mix is presenting the upcoming Hilary Hahn & Hauschka show at Aria (in the Warehouse District of Minneapolis) on January 12th. They will be playing music from Silfra. Tickets are $25, and you can find out more details at thespco.org/liquidmusic.
This is a rare treat to have two-time Grammy-winning* American violinist Hilary Hahn and German pianist/composer Volker Bertelmann (known simply as Hauschka) together in Minneapolis. Last year, the two got together at Greenhouse Studios in Reykjavík to record Silfra, which was mostly inspired by the Silfra rift in Iceland. The recording, as improvised, was never meant to be played live... so for the very first time, thanks to Liquid Music, the two will be brought together to play live renditions of Silfra.
Bertelmann explains, "Silfra and the performances that are based on the record, which also represent a state of mind, are for me always extraordinary and thrilling. To perform this in this exceptional concert series and in Minnesota, where I will perform for the first time, makes me excited, and I hope we can give something back."
Trivia: Hahn both won best solo violinist for her works in Brahms & Stravinsky Violin Concertos (2001) and Schoenberg: Violin Concerto; Sibelius: Violin Concerto (2008).
rebeccaofficial.com
Rebecca Ferguson is a British singer-songwriter, who rose to fame by becoming the runner-up to the seventh series of UK's "The X Factor". She didn't leave empty-handed, of course, having inked a joint record deal with Syco Music and Epic Records in the UK and later to Columbia Records in the U.S.
Ferguson's second studio album Freedom will be release this December 2013, and a March 2014 headlining UK tour dates were recently announced:
03/16/14 London O2 Shepherds Bush Empire
03/18/14 Bournemouth Pavilion Theatre
03/19/14 Brighton Dome
03/20/14 Cardiff St David’s Hall
03/22/14 Edinburgh Usher Hall
03/23/14 Liverpool Echo 2 @ Echo Arena
03/24/14 Manchester Bridgewater Hall
03/26/14 Ipswich Regent Theatre
03/27/14 Birmingham Symphony Hall
03/28/14 Bristol Colston Hall
angela + vu ( ) ♥ weheartmusic.com
Posted by W♥M on Saturday, 30 November 2013 at 01:51 PM in Angela, Cate Le Bon, Hauschka, Hilary Hahn, Ingrid, Liquid Music, Peggy Sue, Peter Bjorn and John, Peter Moren, Peter, Bjorn and John, Rebecca Ferguson, SPCO, Vu | Permalink | Comments (0)
The Moon and the Stars
Mark Kozelek
Have you ever been to church and felt like the terrible seating is contrived to be as much a part of the lesson as the sermon itself? Like pain and suffering for the greater good, I hoped tonight's performance …
markkozelek.com
It used to be easy to keep up with Mark Kozelek. He’d release a record every couple years – either a solo album of covers or an album of original material with his band moniker Red House Painters or Sun Kil Moon. However, these days, it seems like a new Kozelek release is as frequent as a Miley Cyrus tongue shot. Last year, Kozelek released an 18-track album under the Sun Kil Moon moniker (Among the Leaves), and this year he’s released the cover album Like Rats, two live albums, the Mark Kozelek/Jimmy Lavalle collaboration album Perils from Under the Sea, and, most recently, he contributed vocals and bass to the latest album by ex-Red House Painters guitarist Phil Carney’s band Desertshore (entitled Mark Kozelek and Desertshore).
And, naturally, there’s a new Sun Kil Moon record on the horizon: Benji, which will be released on February 11, 2014 and can be pre-ordered from Caldo Verde. His recent live shows have included songs from the forthcoming album, as well as from his other recent releases, and even the odd Red House Painters tune tossed in for good measure. In any incarnation, a night spent with Kozelek’s deeply personal songs is always a bit like reading someone’s diary… if the diary came with lovely guitar plucking and a melodic voice.
The short American leg of Kozelek’s current world tour begins on December 19th at the intimate Lincoln Hall in Chicago.
12-19 Chicago, IL – Lincoln Hall
12-21 Dallas, TX – Granada Theater
12-22 Austin, TX – Central Presbyterian Church
02-20 Portland, OR – Aladdin Theater *
02-21 Seattle, WA – Neptune Theatre *
02-22 Vancouver, BC – Biltmore Cabaret *
03-01 San Francisco, CA – Noise Pop
03-08 Los Angeles, CA – First Unitarian Church
* - Sun Kil Moon show
Paste Magazine called Moon Taxi one of "12 Tennessee Bands You Should Listen to Now," this Nashville five-piece is currently on tour. …
ridethemoontaxi.com
Moon Taxi is an indieprog rock band based in Nashville, Tennessee. The band features singer/guitarist Trevor Terndrup, bassist Tommy Putnam, guitars/programmer Spencer Thomson, drummer Tyler Ritter, and keyboardist Wes Bailey. The band currently releases music under their 12th South Records label, with distribution via BMG.
Anyway, after appearing on the Late Show with David Letterman for "Running Wild" semi-recently, the Nashville band announced a six-track acoustic EP Acoustic on West 56th, coming out December 17th. The EP was recorded in New York City earlier this Summer. All acoustic version ("Running Wild", "The New Black", "Change", "River Water", "Young Journey", and "Suspicious") on the EP were taken from the band's album Mountains Beaches Cities, which was released on September 10th, 2013.
Remaining Moon Taxi 2013 tour dates:
12/05 Raleigh, NC @ Southland Ballroom
12/06 Richmond, VA @ Capital Ale House
12/08 Washington, DC @ Rock & Roll Hotel
12/20 Birmingham, AL @ Workplay Theater
12/31 Nashville, TN @Marathon Music Works
facebook.com/wearesnowbird
Snowbird is a duo (Stephanie Dosen and Simon Raymonde) with a new album called moon via Bella Union (the label that Raymonde has curated since his former band Cocteau Twins went their individual ways in 1997).
moon features a stellar various whos-who guests, such as Radiohead's Philip Selway (who I've interviewed for KFSR 90.7 in 1995) and guitarist Ed O’Brien, Midlake's Eric Pulido and drummer McKenzie Smith and Lanterns on the Lake's Paul Gregory, etc.
Although the guests are cool, Ryamonde emphasized that it's singer Stephanie Dosen that should be the spotlight, "Having them add their magic to the record was a thrill, but really, I think this is very much Stephanie's record. She's a really special singer and I feel the simplicity of my music was the perfect backdrop for her stories and her incredible vocal arrangements... Stephanie was the first singer I had worked with since Elizabeth [Fraser of Cocteau Twins] that I had a real musical empathy with. She could do anything..."
Look for moon in early 2014 on Bella Union.
snowflakeband.com
Speaking of snow, Snowflake is the stagename for producer/mixer D. James Goodwin, his debut album We All Grow Around the Sea is coming out December 10th. In the meantime, you can hear "Black Stars" via The Big Takeover:
Snowflake's music is said to be sound like Mogwai (who, incidentally did a fantastic job providing the creepy music for the French television show "The Returned"), but with the size of Pink Floyd.
With the release of We All Grow Toward the Sea, expect Snowflake to do a tour in 2014.
Posted by W♥M on Saturday, 30 November 2013 at 12:33 PM in Angela, Mark Kozelek, Moon Taxi, Snowbird, Snowflake, Sun Kil Moon, Vu | Permalink | Comments (0)
Read more Many Manly Men.
So is the world. For example, JD Samson (of MEN and Le Tigre), organized a court room statement reading last week. Supporters and readers included Chloë Sevigny …
JD SAMSON & MEN
menmakemusic.com
It’s hard to believe it’s been nearly a decade since the last Le Tigre album (2004’s This Island), and six years since the band with the roller-skate jams went on hiatus. While Kathleen Hannah has been re-exploring her punk roots with The Julie Ruin, JD Samson has continued to mine the dance/electropop vein of late-period Le Tigre with her band MEN, whose sophomore album, Labor, was self-released in October to positive critical reception.
MEN’s latest single is “Making Art” (also available as a remix E.P. because that’s what dance acts do) and butch heartthrob JD Samson has been taking that term to heart by making custom tampon string hats which are available for purchase on their website. If hipster visuals with a feminist bent and a beat you dance to is your thing, come see MEN on their national tour which is currently zig-zagging its way across the country.
Dec 6 - Second Ward Foundation, Hudson NY
Dec 7- The Flywheel- Easthampton MASS
Dec 8 - Comet Ping Pong, Washington DC
Dec 14- Rough Trade, Brooklyn NY
Jan 25 - Il Motore, Montreal
Jan 26 - The Garrison, Toronto
Jan 28 - Blind Pig, Ann Arbor
Jan 29 - Beachland Tavern, Cleveland
Jan 30 - Radio Radio, Indianapolis
Jan 31 - The Empty Bottle, Chicago
Feb 1 – 7th Street Entry, Minneapolis
Feb 3 - The Frequency, Madison WI
Feb 4 - The Basement, Columbus
Feb 6 - Johnny Brenda’s, Philadelphia
Feb 8 - Great Scott, Boston
ofmiceandmenofficial.com
Of Mice & Men, a name stolen from John Steinbeck (by the way of William Shakespeare), has announced a third studio album called Restoring Force to be release on January 28th on Rise Records. The album is a follow up to the band's The Flood, which established the California-based band as a 'force' in the modern heavy metal music scene.
Frontman Austin Carlile explains, "What happens after a disaster? What happens after The Flood? You return to normal. You find balance again. That's what we felt like we were doing with this album. We wanted this record to bring equilibrium back to our band and music. We're letting everyone know that we're here to stay. We're Restoring Force."
Also, it's been announced that they will be joining Bring Me The Horizon for 'The American Dream Tour', which kicks off February 3rd in Orlando and ends on March 28th in San Diego.
The American Dream Tour:
Feb 03 Orlando, FL - The Plaza 'Live' Theater
Feb 04 Ft. Lauderdale, FL - Revolution Live
Feb 05 St. Petersburg, FL - Jannus Live
Feb 06 Jacksonville, FL - Brewster's Megaplex
Feb 08 Mexico City, DF - Jose Cuervo Salon
Feb 10 Tucson, AZ - Rialto Theater
Feb 11 Phoenix, AZ - Marquee Theater
Feb 12 Albuquerque, NM - Sunshine Theater
Feb 13 Denver, CO - The Ogden
Feb 14 Kansas City, MO - Uptown
Feb 15 Sauget, IL - Pops
Feb 17 Minneapolis, MN - Mill City Nights
Feb 18 Chicago, IL - House of Blues
Feb 21 Plymouth, MI - Compuware Arena
Feb 22 Toronto, ON - Sound Academy
Feb 24 Montreal, QC - Metropolis
Feb 27 Worchester, PA - The Palladium
Feb 28 New York, NY - Best Buy
Mar 02 Philadelphia, PA - Electric Factory
Mar 03 Silver Springs, MD - Fillmore Silver
Mar 04 Clifton Park, NY - Upstate
Mar 06 Atlanta, GA - The Tabernacle
Mar 07 Nashville, TN - War Memorial Aud
Mar 08 Memphis, TN - New Daisy
Mar 10 New Orleans, LA - House of Blues
Mar 11 Houston, TX - House of Blues
Mar 12 Mission, TX - Las Palmas Race Park
Mar 13 San Antonio, TX - Backstage Live
Mar 14 Austin, TX - SXSW
Mar 15 Grand Prairie, TX - Quik Trip Park
Mar 16 Oklahoma City, OK - Diamond
Mar 18 El Paso, TX - Tricky Falls
Mar 21 San Francisco, CA - Regency Grand
Mar 24 Seattle, WA - Showbox
Mar 25 Vancouver, BC - Vogue Theater
Mar 26 Portland, OR - Roseland Theater
Mar 28 San Diego, CA - Soma
best-man.com
Sales of the Universal Pictures' The Best Man Holiday Soundtrack quadrupled over last weekend, landing at #2 and #4 on this week's Billboard Soundtracks and R&B Album Charts, respectively.
Film writer and director, Malcolm D. Lee, commented on why the movie soundtrack is just as important as the film, "I am a firm believer that music is essential to the entirety of a film going experience. The Best Man Holiday soundtrack is no exception. The songs listed here not only make up the fabric of the movie, but many served as inspiration to the creation of the screenplay. With a combination of new R&B tunes and Christmas classics by contemporary artists, this is the soundtrack I heard accompanying this movie. I hope you enjoy it this holiday season and every year."
The Best Man Holiday - Original Motion Picture Soundtrack track listing:
01 Christmastime To Me Jordin Sparks
02 Someday at Christmas Mario
03 What Christmas Means To Me Fantasia
04 I Still Have You Charlie Wilson
05 Christmas I'll Be Steppin' R. Kelly
06 This Christmas Mary J. Blige
07 Shelter John Legend
08 Have Yourself A Merry Little Christmas Monica
09 Winter Wonderland Emeli Sandé
10 Can You Stand The Rain New Edition
11 I Want To Come Home for Christmas Ne-Yo
12 O Holy Night Jayda Brown & Jasmine Watkins
13 As Marsha Ambrosius & Anthony Hamilton
QUIET MARAUDER
quietmarauder.co.uk
MEN is the new album from Cardiff anti-folk Quiet Marauder. The album's tagline is, "111 songs. 4 volumes. 5 hours." The album is set for release in England on January the 27th 2014 on Bubblewrap Records.
With 111 songs and spanning over five hours, it made sense that it's some sort of Guinness World Record for longest debut LP in recorded popular music history.
Quiet tour dates:
11/30/13 Rhondda Rocks - Factory - Porth
12/06/13 Circus Punk - Warehouse 54 - Newport
12/08/13 Christmas Cwtch - Gwdihw - Cardiff
12/09/13 Bubblewrap Xmas Party - Four Bars
Posted by W♥M on Thursday, 28 November 2013 at 10:16 PM in Angela, Film, Films, JD Samson, Le Tigre, Of Mice And Men, Soundtrack, Vu | Permalink | Comments (0)
Toad the Wet Sprocket w/ Lee DeWyze - Mill City Nights, Minneapolis (11/23/13) concert review
Crowing
New Constellation
All I Want
Dam Would Break
Come Back Down
Nightingale Song
Crazy Life
Rare Bird
Is It For Me
California Wasted
Fall Down
I'll Bet on You
Walk on the Ocean
12/07/13 "KFOG Concert For Kids"
01/29/14 Phoenix, AZ Crescent Ballroom
01/30/14 Flagstaff, AZ Orpheum Theater
01/31/14 Salt Lake City, UT Depot
02/01/14 Stateline, NV Harrah's Lake Tahoe
02/05/14 Bend, OR Tower Theatre
02/06/14 Portland, OR Aladdin Theater
02/07/14 Spokane, WA Bing Crosby Theater
02/08/14 Seattle, WA Showbox
02/13/14 Boise, ID Knitting Factory
02/15/14 Napa, CA Uptown Theatre Napa
Toad the Wet Sprocket are in the middle of a tour in support of their Kickstarter-funded album New Constellation, which was released last month (October 15th).…
It’s been pretty good for Monty Python-related news of late. The classic comedy troupe just announced a London reunion (which sold out in 43 seconds, prompting four more added shows) and California alt-rock band Toad the Wet Sprocket just appeared at Minneapolis’ Mill City Nights, ending their 2013 tour with a toe-tapping 90 min. set.
The band, named after a Python “Rock Notes” skit, took fans both backwards and forwards, with generous samplings of both their 90’s-era radio hits, and selections from their latest and first in sixteen years, the Kickstarter-funded New Constellation, self-released on their own Abe’s Records label.
While fellow American Idol winner Phillip Phillips was just down the street opening for John Mayer, Season 9 winner Lee DeWyze entertained with a 40 min. opening set promoting his latest, Frames (Vanguard Records). New songs like ‘Silver Lining’ and ‘Fight’ were well received, and the audience was mostly receptive to his humble and honest songwriting.
“Nice to see you!”, Toad singer, the ageless Glen Phillips remarked just as the Divine Fits intro music faded and the band launched into new song, ‘The Moment’ to start their set. A familiar ‘Good Intentions’ got the mostly thirty-something crowd swaying, Phillips and bassist Dean Dinning harmonizing the chorus as if it were twenty years prior.
“This band wouldn’t be a band without Minneapolis”, Phillips mentioned, then related all the area bands off of the top of his head that he considered an influence, before cheekily asking Dinning if he knew the bassline to ‘When Doves Cry’. The band, rounded out by guitarist Todd Nichols and Randy Guss on drums, was more than ably assisted on stage by Jonathan Kingham playing keyboard, steel guitar, and mandolin.
TTWS’s songs have always blended a California sensibility with echoes of similar Brit and Aussie alt-pop that was also happening during their heyday (i.e. The La’s, Crowded House, etc.) but it’s maybe because they all came from a similar songwriting approach rather than were directly influenced, and the songs from New Constellation fit seamlessly alongside their older back catalogue.
Guitarist Nichols took over lead vocals for several tracks, including ‘Inside’ and ‘Crazy Life’ with deft Kingham organ playing, Nichols’ voice somewhat deeper and slightly rougher than Phillips, but no less melodic.
Phillips asked the crowd to sing along in three part melody (balcony, floor, and front) prefacing ‘All I Want’ and marveled at Minnesotans’ ability to dress for “10 degrees outside and 80 degrees inside”- “you have mad skills…or you’re standing on piles of coats!”, which prompted a collective laugh.
Somehow appropriate (though may have been more suitable during ‘Fall Down’), the band paused ‘Dam Would Break’ mid-song as he noticed a girl collapsing in the middle of the floor, only to pick it up again quickly as the boyfriend embarrassingly hustled his companion away briskly. Phillips playfully strummed the beginnings of The Replacements’ ‘Unsatisfied’ before giving up and instead going into the much-more familiar ‘Come Back Down’.
‘Nightingale Song’ was a crowd clap-a-long, prodded on by bassist Dinning keeping the collective time on tambourine. “Enough of love”, Phillips declared, “we’ll go back to boys and ladders”, finishing the new ‘Rare Bird’ and going into ‘Is It For Me’ from 1991’s Fear. A spirited ‘Fall Down’, from the band’s other platinum selling album, 1994’s Dulcinea, closed the main set with an energetic finish.
Setlist with Guitar Changes
The encore began with hit ‘Something’s Always Wrong’ followed by the new ‘I’ll Bet on You’ and ended with ‘Walk on the Ocean’, embellished by Kingham’s mandolin and whose choruses seemed to be sung in a lower key, but was no less entertaining.
Like a comfortable blanket or familiar book, Toad the Wet Sprocket returns to form, like they never left us as the 1990’s ended, less dark in theme now and more assured and relaxed in concert than before. For some in the audience, it was re-capturing the soundtrack of their glory years; for others, a welcome revisiting of the past with new beginnings and songs to make future memories with.
As the crowd filtered out to the outro music of Python’s ‘Always Look on the Bright Side of Life’, what’s ahead for Toad the Wet Sprocket is only on the bright side once again.
Toad the Wet Sprocket at Mill City Nights, Minneapolis (11/23/13)
john ( ) ♥ weheartmusic.com ♥ toadthewetsprocket.com
Posted by W♥M on Thursday, 28 November 2013 at 07:24 AM in John, Lee DeWyze, Mill City Nights, Toad the Wet Sprocket | Permalink | Comments (1)
No Way, Norway!
Remember the first time you heard of Röyksopp? I do. It was about time I was looking for the next Daft Punk, and this little Norwegian duo's song "Poor Leno" stole my heart. …
royksopp.com
I'll be honest, it's been a long time since Poor Leno.
Poor Leno
If you don't remember, Röyksopp is an electronic music duo (Svein Berge and Torbjørn Brundtland) from Norway. They were pretty big in the techno scene in the early 2000, and by the time their debut album Melody A.M. was released, they had been nominated for one Grammy Award and won several Norway's Spellemannprisen awards. Then, in the past few years, the band remained relatively quiet about their musical output.
Well, the duo is back, look for "Running to the Sea", their first new single since 2011, this December 16th, 2013, via Wall of Sound and Cooking Vinyl. The single's already been released in America under the Cherrytree/Interscope Records last week (November 25th).
"Running To The Sea" features Norwegian singer Susanne Sundfør and it's a good sign for the duo's return to music. Hear it:
You know we like Psy, check out the review on Psy's album 6甲 (Six Rules). It is still pretty amazing that for a non-"pretty boy" Korean singer rode his phantom horse …
YLVIS
ylvis.com
Norwegian comedy duo Ylvis (Brothers Vegard and Bård Ylvisåker) has a hit with "The Fox (What Does the Fox Say?)", crossing the 250 million mark on YouTube. The song is such a hit that Fox's Glee will be covering the song tomorrow (November 28th). They are definitely the next PSY with his "Gangnam Style".
Can't get enough of The Fox? The brothers will be releasing a children's book "What Does The Fox Say" to be published by Simon & Schuster on December 10. The brothers will return to the United States for TV and book signing appearances around its release. This is probably a smart thing to do, considering that I don't think they have enough material to play a full concert.... so a book tour is actually a smart idea.
According to this message on their Facebook (see below), the book is out in Norway. The English portion of the comment indicates the English version won't be available until December 10th.
'Hva sier reven?' er nå i bokhandelen. Men slå gjerne til på nettet, der prisen kanskje er lavere.
Children's book "What does the fox say?" on sale from December 10.
Highasakite
Yep, Brody and Jess survived the Great Escape Music Festival in Brighton. The festival came to an end on Saturday, May 18th. Highasakite at The Haunt, Brighton (05/18/13) …
highasakite.no
Remember we covered Highasakite at the Great Escape 2013? The Norwegian quintet announced that their debut album Silent Treatment is coming out on March 4th in the U.S.! I have the cover artwork and track listing, so I'll give that information below.
Hopefully we'll see this band if they tour in support of the album.
Silent Treatment Tracklisting
1. Lover, Where Do You Live?
2. Since Last Wednesday
3. Leaving No Traces
4. Hiroshima
5. My Only Crime
6. I, The Hand Grenade
7. Darth Vader
8. Iran
9. The Man On The Ferry
10. Science & Blood Tests
Posted by W♥M on Wednesday, 27 November 2013 at 05:22 PM in Highasakite, Norway, Royksopp, Vu, Ylvis | Permalink | Comments (0)
Girls Girls Girls: Polica, Kathleen Hanna, and Lissie
“I’m so glad to be home”, Poliça’s Channy Leaneagh exclaimed in a rare outpouring of on-stage banter, the band fresh from its Coachella weekends and at the end of a long year-plus …
Read more Girls Girls Girls.
thisispolica.com
Minneapolis hometown favorites Poliça were just deemed “America’s Portishead” in Rolling Stone's review of the band’s sophomore album, Shulamith (Mom+Pop Records), but they’re so much more than that. A thundering rhythm section (Chris Bierden - bass/vocals, Drew Christopherson - drums and Ben Ivascu - drums) is anchored by the dreamscape vocals of singer Channy Leaneagh and the new album was named after (and somewhat inspired by) late feminist writer, Shulamith Firestone.
The new songs reign the band in somewhat, yet still keep the auto-tune/reverb of Leaneagh’s voice over dreamy, ambient, r&b-tinged electroni-pop. Live, they are as entrancing as ever, even sneaking in a Lesley Gore cover into recent sets. The tour continues, including a two-night stand in hometown Minneapolis, with another Ryan Olsen helmed (but very different sounding) project opening, noise band Marijuana Deathsquads.
11/26/13 Denver, CO Bluebird Theater
11/27/13 Omaha, NE The Waiting Room
11/29/13 Minneapolis, MN Mill City Nights
12/05/13 Chicago, IL Metro / Smart Bar
12/07/13 Madison, WI Barrymore Theatre
Longtime readers will know that I'm actually a pretty big riot grrrl fan, so I'm happy to report that Kathleen Hanna is back with her Julie Ruin project. The new Julie Ruin album, entitled Run Fast…
kathleenhanna.com
Sure, we mentioned Kathleen Hanna's project The Julie Ruin new record Run Fast, earlier this July, but I wanted to let you know that Kathleen Hanna will be appearing in person at selected shows The Punk Singer documentary on opening weekend, November 29th (this Friday!).
The documentary was directed by Sini Anderson and produced by Tamra Davis, and will be premiering in NYC & LA on November 29th. If you don't live in those cities, the documentary will also be made available as on demand and on iTunes movies. A national theatrical rollout is expected for December 2013, see ifccenter.com for further details.
In the meantime, The Julie Ruin just wrapped up their U.S. tour and will be making their way to Australia in 2014. The live band will feature the dream-team of Kathi Wilcox on bass (Bikini Kill bandmate), Kenny Mellman on keys (’Kiki and Herb’), Carmine Covelli on drums (actor, filmmaker and musical juggernaut) & Sara Landeau on guitar (met Kathleen mentoring at Rock Camp for Girls).
Australia tour dates:
01/15/14: Melbourne, Australia @ Corner
01/17/14: Sydney, Australia @ Factory Theater
01/18/14: Hobart, Australia @ Mona Foma
lissie.com
Elisabeth Corrin Maurus, better known as Lissie, takes to the road again, in support of her second full-length, Back to Forever, released just last month on Fat Possom/Columbia. Bolstered by positive reviews from such outlets as AllMusic and Paste Magazine, the folk-rock singer still bases her songs in yesteryear influence (sounding more 80’s than 70’s, this time out) and the new album has bigger bombast, compliments of Irish producer Jacknife Lee, who has previously amp’d up the likes of U2, R.E.M., and Snow Patrol.
Expect a musically diverse set (Lissie even has covered a Kid Cudi song in recent encores) with Chicago indie-pop girl band Purple Apple opening in Minneapolis, self-described as “made up of three 16-year-old girls and their younger sibling's twentysomething babysitter on drums”. Ohhh-kay…
Nov 27 - Pittsburgh, PA @ Mr. Smalls Theatre ^
Nov 29 - Chicago, IL @ Park West ^
Nov 30 - Minneapolis, MN @ Skyway Theatre ^
Dec 2 - Denver, CO @ Gothic Theatre *
Dec 3 - Salt Lake City, Utah @ Urban Lounge *
Dec 5 - Seattle, WA @ The Crocodile *
Dec 6 - Portland, OR @ Wonder Ballroom *
Dec 7 - San Francisco, CA @ The Independent *
Dec 9 - Los Angeles, CA @ The Fonda Theatre *
Dec 11 - San Diego, CA @ House of Blues *
Dec 12 - Santa Ana, CA @ The Observatory *
* Kopecky Family Band supporting
^ Purple Apple supporting
vu + john ( ) ♥ weheartmusic.com
Posted by W♥M on Tuesday, 26 November 2013 at 05:46 PM in John, Kathleen Hanna, Lissie, Polica, Vu | Permalink | Comments (0)
It's that time of the year: Black Friday, this Friday! It's tradition, I'm heading out in the bleak morning of Black Friday to these stores: Best Buy, Target, and Wal-Mart. …
theblackfriday.com
It's that time of the year again, Black Friday. Like last year, it's more like Black Thursday, as Kmart, Walmart and are opening their doors at 12am, 6pm, and 8pm, respectively.
If things goes well (especially if items are in stock), I'm hoping to score these:
The Last of Us (PS3) - $25 - Walmart
Beyond Two Souls (PS3) - $25 - Walmart
The Wolverine (BD) - $3.96 - Walmart
The truth is, I would ideally like to get these things, but often I ended up not getting them because they are out of stock or they sometime offer other (unadvertised) deals. We'll see how this plays out, but I'd just be happy if I can get the Last of Us video game for that price.
This year, Target's Black Friday deals aren't very good - with selections that doesn't appeal to me at all. They also seem to concentrate on the higher-ticketed items. I don't really need it, but the iPod 5th Generation is on sale for $179 ($229 minus $50 Target Gift Card) looks mighty tempting.
Best Buy is only advertising DVDs for their television sales. I'm only interested in Blurays, but like many of these things, I won't know it until I see it in the stores.
Dale Earnhardt Jr Jr
Dale Earnhardt Jr. Jr. (aka Detroit duo of Josh Epstein and Daniel Zott) recently just dropped a GoldenboyZ Remix of "If You Didn't See Me (Then You Weren't On …
daleearnhardtjrjr.com
Dale Earnhardt Jr. Jr. will be releasing a special Black Friday Black Vinyl edition of their record The Speed of Things. The standard edition was released earlier in October via Warner Bros.
Details about the Black Friday Vinyl is that it's limited to only 3000 copies, and will be on sale Friday, November 29th. After wrapping up a string of dates with Atlas Genius, the band will begin their headlining tour in 2014 (dates with * indicates with support from Chad Valley).
02/13 Cleveland, OH - Grog Shop*
02/14 Cincinnati, OH - 20th Century Theatre*
02/15 Indianapolis, IN - Deluxe *
02/16 St. Louis, MO - Old Rock House*
02/17 Nashville, TN - Mercy Lounge*
02/18 Atlanta, GA - Terminal West *
02/20 Dallas, TX @ Trees*
02/21 Houston, TX - Fitzgerald's Upstairs*
02/22 Austin, TX - Emo's*
02/24 Albuquerque, NM - Launchpad*
02/25 Tucson, AZ - Club Congress*
02/27 San Diego, CA - The Casbah*
02/28 Los Angeles, CA - El Rey Theatre*
03/01 San Francisco, CA - The Fillmore*
03/03 Portland, OR - Doug Fir Lounge*
03/05 Seattle, WA - Neumos*
03/07 Salt Lake City, UT - State Room*
03/08 Denver, CO - Bluebird Theater*
03/10 Lawrence, KS - Bottleneck*
03/12 Minneapolis, MN - Fine Line*
03/13 Milwaukee, WI - Turner Hall*
03/14 Chicago, IL - Metro*
03/15 Columbus, OH - A&R Music Bar*
03/18 Toronto, ON - The Hoxton*
03/20 Boston, MA - Brighton Music Hall*
03/21 Washington DC - 9:30 Club*
03/22 Millvale, PEA - Mr. Smalls Theatre*
03/23 Charlottesville, VA - Jefferson Theater*
03/24 Philadelphia, PA - Union Transfer*
03/26 New York, NY - Webster Hall*
How hard does The Lone Bellow vocalist/guitarist Zach Williams work? He was pooled in sweat, red-faced with blood vessels bulging, out of breath, …
thelonebellow.com
A limited run of The Lone Bellow/Brandi Carlile split 7" orange vinyl will be released on Black Friday, November 29th in celebration of Record Store Day via Descendant Records. The split 7"includes two tracks (Carlile's "Raise Hell" and The Lone Bellow's "You Never Need Nobody") from fan favorites during the time the bands toured together.
The Lone Bellow are currently out on a headlining tour with Aoife O'Donovan, and Ivan & Aloysha ending on The Late, Late show with Craig Ferguson on Dec. 13th. They've already sold out their California tour dates!
Dec. 1 - Denver, CO / Bluebird+
Dec. 4 - Salt Lake City, UT / State Room+
Dec. 6 - Vancouver, BC / Venue+
Dec. 7 - Seattle, WA / Tractor Tavern*
Dec. 8 - Portland, OR / Aladdin Theater +
Dec. 10 - San Francisco, CA / Independent+
Dec. 11 - Los Angeles, CA / Troubadour +
Dec. 12 - Los Angeles, CA / Troubadour+
* with Aoife O'Donovan
+ with Ivan & Aloysha
secretstashrecords.com
Secret Stash Records, the label based out of Minneapolis and specializing in collectible vinyls is releasing a very limited pressing of Peter King's Omo Lewa with Coke bottle green vinyl with pink splatter. The 12" is on sale this Friday November 29th.
The record is a followup to their re-issue of King's African Dialects, and bringing back these rare Orbitone Records back into print.
NOTE: Only the first 350 copies come on limited edition coke bottle green vinyl with pink splatter, so act fast if you really need it. The standard edition LP and CD versions of this title won't be available until January 21, 2014.
Posted by W♥M on Monday, 25 November 2013 at 08:53 PM in Black Friday, Brandi Carlile, Dale Earnhardt Jr. Jr., Record Store Day, Secret Stash Records, The Lone Bellow, Vu | Permalink | Comments (0)
Cults at First Avenue, Minneapolis (11/22/13)
11/25/13 Toronto, ON Lee's Palace
11/26/13 New York, NY Webster Hall
12/05/13 Phila, PA Theatre Of The Living Arts
01/31/14 Durham, NC Durham Performing *
02/01/14 Asheville, NC Thomas Wolfe Aud*
02/02/14 Nashville, TN Ryman Aud *
02/04/14 Atlanta, GA Tabernacle *
02/06/14 St. Louis, MO Peabody Opera House*
02/07/14 Columbus, OH Lifestyle Communities*
02/08/14 Detroit, MI Fillmore Detroit *
02/09/14 Chicago, IL Riviera Theatre *
02/11/14 Kansas City, MO Arvest Bank *
* with the Pixies
When Cults originally booked their show in 2012 at the Fine Line, it immediately sold out - so the band got an upgrade to a larger-capacity show at First Avenue. …
New York's Cults are in the middle of their tour for their second album, Static, stopping by Minneapolis' First Avenue on November 22nd.
MOOD RINGS
Atlanta's Mood Rings was the first band on, they played in almost complete darkness. This was the band's first time in Minneapolis, and they seem eager to play songs from their new album VPI Harmony (out now on Mexican Summer). From what I've heard: it's very shoegazy/ethereal rock.
According to my notes, they played seven songs, and they often introduce feedback and distortion in many of their songs.
New York's trio Sacco (by the way of California) played psychedelic/surf music. They had two singers, John and Andy, who alternate between songs. Their set also consists of a brief seven songs.
The last time we saw Cults, they admitted that playing First Avenue was one of the scariest thing they've ever done. The band is back, and this time, showing that they are more confident in their show! Gone are singing in darkness, this time, Cults used lots of light effects as well as new background projection. I have to say, they are certain more entertaining this time around.
As you can see from their setlist, they got their biggest hit "Abducted" out of the way first. Their new song "Slow Song" was also well-received.
Rounding out the rest of their set were new songs from Static, including "High Road", "Always Forever", "Were Before", "So Far", "I Can Hardly Make You Mine", and "Keep Your Head Up."
The last half of their set were a ton of old favorites from their debut album, including the set closer "Rave On" and the encores "Go Outside" and "Oh My God."
Cults will be wrapping up their Static tour this December. Look for them in 2014 to open up for the Pixies!
vu ( ) ♥ weheartmusic.com ♥ moodringsmusic.com ♥ facebook.com/saccomusic ♥ cultscultscults.com
Posted by W♥M on Sunday, 24 November 2013 at 10:31 AM in Cults, First Ave, First Avenue, Mexican Summer, Mood Rings, Podcast, Sacco, Vu | Permalink | Comments (0)
Brendan Canning at the 7th Street Entry, Minneapolis (11/22/13)
Brendan Canning
The main room too big for you? No problem, taking place next door is First Ave's smaller room, the 7th Street Entry. That November 22nd will feature Brendan Canning …
The Toronto indie rock band's sophomore album, Shaky Dream will be out August 6 via Dine Alone Records.…
Broken Social Scene's Brendan Canning is currently on tour in support of his second solo LP, You Gots 2 Chill, stopping by the 7th Street Entry in Minneapolis on Friday.
Opening up the show was Hark (aka Marnie Herald), who played a brief set. She tells us that she's actually in Brendan Canning's band, filling in all the guest vocal duties originally Daniela Gesundheit of Snowblink.
Dinosaur Bones was next, the Toronto band is currently touring in support of their new album Shaky Dream, so they played a few tracks from the album, including "Nothing Left Between the Lines", which was their set finale.
This was the first night that Escondido joined Brendan Canning on tour. Although the band is from Nashville, singer Jessica said she used to be a Canadian. I actually really enjoyed their set, thanks to their upbeat songs. My highlight was the trumpet for "Rodeo Queen" and their cover of The Pixies "Where Is My Mind".
By the time Brendan Canning took the stage, he asked for the lights to be turned all the way down. What follows were very moody, atmospheric music. Hark actually sang on quite a few Canning songs, even though Canning said that she's only joined the band four days ago.
Songs on their setlist were mostly from You Gots 2 Chill, including "Plugged In", "Bullied Days" (with Hark singing), and the last song "Turn Again".
Canning continues his tour:
11/24/13 Winnipeg, MB Park Theatre
11/25/13 Saskatoon, SK Amigos Cantina
11/26/13 Edmonton, AB Artery
11/27/13 Calgary, AB Commonwealth Bar
11/29/13 Vancouver, BC Media Club
11/30/13 Victoria, BC Lucky Bar
12/01/13 Seattle, WA Barboza
12/02/13 Portland, OR Mississippi Std
12/04/13 San Francisco, CA Chapel
12/05/13 Los Angeles, CA Echo
12/11/13 Christmas Show / Andy Kim
01/20/14 Allston, MA Great Scott
01/22/14 Philadelphia, PA World Cafe
01/23/14 Arlington, VA IOTA Club & Cafe
01/24/14 New York, NY Mercury Lounge
stef + vu ( ) ♥ weheartmusic.com ♥ thebandescondido.com ♥ brendancanning.com ♥ dinosaurbones.ca ♥ facebook.com/HARKthegirl
Posted by W♥M on Sunday, 24 November 2013 at 03:24 AM in 7th Street Entry, Brendan Canning, Broken Social Scene, Dinosaur Bones, Escondido, Hark, Podcast | Permalink | Comments (0)
The Pines at the Cedar Cultural Center, Minneapolis (11/22/13)
Looking for something to do over the weekend? The Pines are doing a residency of sorts at the Cedar Cultural Center tomorrow and Saturday (November 22nd and 23rd). …
Minneapolis' The Pines kicked off a two-night residency at the Cedar Cultural Center last night in Minneapolis.
The mellow night started off with special guest Dave Simonett, of Trampled By Turtles, doing a solo set. In contrast, The Pines had a full band with them. Then about four songs into their set, they added a mandolin player, as well as a cellist.
It was really funny, because the scarecrow they had behind them almost fell down a couple times. I have seen them about three times, and I have to say it was a good performance. They commented on how they love playing at the Cedar.
For their last few songs, they had two band members from Trampled By Turtles joined them on stage for a fun jamboree.
The Pines returns to the Cedar tonight (Saturday, November 23rd) for an additional show with Iowa singer-songwriter Dave Moore. Their forthcoming tour dates below:
12/06/13 Kansas City, MO - Knuckleheads
12/07/13 Fairfield, IA - Cafe Paradiso
12/08/13 Omaha, NE - The Slowdown
12/18/13 Chicago, IL - City Winery
01/18/14 Lake City, MN - Oak Center General
01/24/14 Hayward, WI - Park Theater
01/30/14 Bismarch ND - Belle Mehus*
01/31/14 Sioux Falls, SD - District*
02/01/14 Fargo, ND - The Venue *
* with Trampled by Turtles
stef + vu ( ) ♥ weheartmusic.com
Posted by W♥M on Saturday, 23 November 2013 at 11:08 AM in Cedar Cultural Center, Podcast, Stef, The Pines, Vu | Permalink | Comments (0)
|
cc/2020-05/en_middle_0102.json.gz/line2042
|
__label__wiki
| 0.639414
| 0.639414
|
Power Trip
Minneapolis: May 19 to May 22, 2018
Here are some shows taking place in the Minneapolis/St Paul area from May 19 to May 20, 2018.
Wye Oak 2018 Poster
Wye Oak will be returning in 2014 with a brand new yet-untitled album from Merge Records, the follow-up to their 2011's Civilian. Singer Jenn Wasner talked to Spin Magazine about the new album…
Next up was Philadelphia, by the way of New York, Palm (not to be confused with Palms), a band that suffers from that common-band-name, making searching for them difficult. After hearing the sad news that the Triple Rock Social Club …
+ Palm
Duo Wye Oak (Jenn Wasner and Andy Stack) is back in town at the Turf Club in St Paul on Saturday, May 19th. You may recall that Wasner took a brief break for her side project Flock of Dimes in October 2016, but we’re glad to see Wye Oak is back together again with a new album The Louder I Call, The Faster It Runs (Merge Records).
New York/Philadelphia band Palm to open.
Wye Oak on tour:
May 13 Cambridge, MA – The Sinclair
May 14 Philadelphia, PA – Union Transfer
May 15 Brooklyn, NY – Brooklyn Steel
May 17 Chicago, IL – Thalia Hall
May 18 Milwaukee, WI – The Back Room
May 19 St. Paul, MN – Turf Club
May 20 Omaha, NE – The Waiting Room
May 21 Kansas City, MO – Record Bar
May 23 Denver, CO – Bluebird Theater
May 25 St. Louis, MO – Ready Room
May 26 Louisville, KY – Zanzabar
Jun 21 Calgary, AB – Sled Island Music Festival
Jul 11 Salt Lake City, UT – Metro Music Hall
Jul 13 Portland, OR – Revolution Hall
Jul 14 Vancouver, BC – The Biltmore Cabaret
Jul 15 Seattle, WA – Neumos
Jul 17 San Francisco, CA – The Independent
Jul 18 Oakland, CA – Starline Social Club
Jul 19 Los Angeles, CA – Lodge Room
Jul 20 San Diego, CA – Soda Bar
Jul 21 Phoenix, AZ – The Crescent Ballroom
Jul 23 Santa Fe, NM – Meow Wolf
Jul 24 El Paso, TX – Lowbrow Palace
Jul 27 Birmingham, AL – Saturn
Aug 15 Dover, UK – The Booking Hall
Aug 16 Bristol, UK – The Louisiana
Aug 17 Brecon Beacons – Green Man Festival
Aug 18 Exeter, UK – Exeter Phoenix
Aug 19 Birmingham, UK – Hare and Hounds
Aug 21 Edinburgh – Edinburgh Fringe Festival
Aug 22 Leeds, UK – Headrow House
Grumpy’s Art-A-Whirl 2018 Poster
Josh Rouse 2018 Poster
Sum 41 2018 Poster
Joey Bada$$ 2018 Poster
Stryper at Route 47 Poster
Power Trip 2018 Poster
Caitlin Canty 2018 Poster
Chrome 2018 Poster
Corb Lund 2018 Poster
Texas’ Power Trip will be stopping by the Triple Rock Social Club, touring in support of their new sophomore Nightmare Logic (Southern Lord). Iron Reagan to open. …
Caitlin Canty
American singer/songwriter Caitlin Canty will be in town in Minneapolis' Icehouse next Wednesday, June 24th, in support of her latest Reckless Skyline album, which came out earlier this year, January 20, 2015. …
GRUMPY'S ART-A-WHIRL
+ Superchunk, The Cactus Blossoms
Grumpy's (Northeast)
Sat 05/19/2018 (12pm/$5)
grumpys-bar.com
Superchunk will be headlining the annual Grumpy's Art-A-Whirl show at Grumpy's Northeast location.
Details of the The 20th Anniversary of Art-A-Whirl:
Superchunk - 8:30 p.m.
The Cactus Blossoms - 7:00 p.m.
The Bad Man - 6:00 p.m.
The Evening Rig - 5:00 p.m.
Adam Levy + The Coming Collapse - 4:00 p.m.
Trompe le Monde - 3:00 p.m.
The Fox Loves - 2:15 p.m.
China City - 1:30 p.m.
Hula Peppers - 12:45 p.m.
Whiskey Rock 'n' Roll Club MPLS - 12:00 p.m.
As for Superchunk, they’ll continue their tour:
May 19 Minneapolis, MN – Grumpy’s Northeast
May 25 Madrid, ES – Tomavistas Festival
May 27 Glasgow, UK – Stereo
May 28 Leeds, UK – Brudenell Social Club
May 29 London, UK – ULU
May 31 Paris, FR – Maroquinerie
Jun 01 Kortrijk, BE – De Kreun
Jun 02 Berlin, DE – Quasimodo
Jun 20 Jersey City, NJ – White Eagle Hall
# w/ The Rock*A*Teens
JOSH ROUSE
Dakota Jazz Club & Restaurant
Josh Rouse will be over at the Dakota Jazz Club on Saturday to play some tunes from his new album Love in the Modern Age (Yep Roc Records).
May 12 - Cambridge, MA @Club Passim
May 13 - Philadelphia, PA @World Cafe Live
May 15 - Toronto, ON @Horseshoe Tavern
May 16 - Ferndale, MI @The Magic Bag
May 17 - Evanston, IL @SPACE
May 18 - Des Moines, IA @Vaudeville Mews
May 19 - Minneapolis, MN @Dakota
May 20 - Milwaukee, WI @The Back Room
May 24 - Nashville, TN @3rd & Lindsley
May 25 - Atlanta, GA @Terminal West
May 30 - Seattle, WA @Triple Door
May 31 - Seattle, WA @Mississippi Studios
June 1 - San Francisco, CA @Chapel
June 2 - Santa Monica, CA @McCabe's
June 3 - San Diego, CA @The Casbah
Sat 05/19/2018 (6pm/Sold Out)
varsitytheater.com
Legendary punk band Sum 41 is celebrating their 15th Anniversary of their second album Does This Look Infected? with an album tour. The group will stop by the newly owned Varsity Theater on Saturday.
May 12 - New York City, NY - Terminal 5
May 14 - Philadelphia, PA - Electric Factory
May 15 - Boston, MA - House of Blues
May 17 - Pontiac, MI - Crofoot
May 18 - Chicago, IL - Concord Music Hall
May 19 - Minneapolis, MN - The Varsity Theater
May 21 - Denver, CO - Ogden
May 23 - Salt Lake City, UT - Complex
May 24 - Las Vegas, NV - Brooklyn Bowl
May 26 - Los Angeles, CA - The Wiltern
+ Boogie, Buddy
Sat 05/19/2018 (7:30pm/$17)
Rapper Joey Bada$$ is bringing his buddies Buddy and Boogie on his AMERIKKKANA. Show up early to check out Compton rapper Buddy (not to be confused with singer/songwriter Buddy). Tour Dates:
5/12 - Vancouver, BC - Vogue Theatre
5/13 - Seattle, WA - The Showbox
5/15 - Salt Lake City, UT - The Complex
5/17 - Denver, CO - Ogden Theatre
5/18 - Kansas City, MO - The Truman
5/19 - Minneapolis, MN - First Avenue
5/20 - Milwaukee, WI - Turner Hall Ballroom
5/22 - Indianapolis, IN - Deluxe
5/23 - Chicago, IL - Concord Music Hall
5/24 - Detroit, MI - St. Andrews Hall
5/25 - Toronto, Ontario - Phoenix Concert Theatre
5/26 - Montreal, Ontario - M Telus
Route 47 Pub & Grub
route47pubngrub.com
Christian metal rockers Stryper is touring in support of their tenth studio album, God Damn Evil (Frontiers Music srl). The record debut on #1 on Billboard’s Christian Album Sales. The band will stop by Route 47 Pub & Grub in Fridley, Minnesota.
May 13 - Fish Head Cantina - Halethorpe, MD
May 14 - Sellersville Theater - Sellersville, PA
May 16 - Diesel Concert Lounge - Chesterfield, MI
May 17 - The Intersection - Grand Rapids, MI
May 18 - Green Bay Distillery - Green Bay, WI
May 19 - Route 47 Pub N Grub - Fridley, MN
May 22 - The Side Room In Ralston Arena - Ralston, NE
May 23 - Val Air Ballroom - West Des Moines, IA
May 25 - Star Pavilion - Kansas City, MO
May 26 - Bmi Speedway - Versailles, OH
May 27 - Brat Fest - Madison, WI
May 30 - Idl Ballroom - Tulsa, OK
May 31 - Proof Bar Rooftop Lounge - Houston, TX
+ Red Death, Fury, Sheer Mag
Power Trip is bringing what Pitchfork calls “Best New Music” to the Fine Line Music Café on Sunday, May 20th.
Show up early to check out Red Death, Fury, and Sheer Mag.
5/13/2018 Lee's Palace - Toronto, ON
5/15/2018 El Club - Detroit, MI
5/16/2018 Reggie's - Chicago, IL
5/18-20/2018 Rock On The Range - Columbus, OH
5/19/2018 The Empty Bottle - Chicago, IL
5/20/2018 Fine Line - Minneapolis, MN
5/21/2018 The Park Theatre - Winnipeg, MB
5/23/2018 Louis' - Saskatoon, SK
5/24/2018 The Starlite Room - Edmonton, AB
5/25/2018 Dickens Pub - Calgary, AB
5/27/2018 Modified Ghost Festival III - Vancouver, BC
5/28/2018 Neumo's - Seattle, WA
5/29/2018 Hawthorne Theater - Portland, OR
5/31/2018 Great American Music Hall - San Francisco, CA
6/01/2018 The Ritz - San Jose, CA
6/02/2018 The Regent - Los Angeles, CA
6/03/2018 Soma - San Diego, CA
6/04/2018 Club Red - Mesa, AZ
6/05/2018 Launchpad - Albuquerque, NM
6/07/2018 The Mohawk - Austin, TX
7/28-29/2018 Heavy Montreal - Montreal, QC
9/06-08/2018 Full Terror Assault - Cave-In-Rock, IL
Gritty alt-folkster Caitlin Canty is touring for her new album Motel Bouquet. Canty will stop by the 7th Street Entry on Sunday.
May 13 – Portsmouth, NH – The Music Hall
May 17 – Fort Wayne, IN – The B-Side at One Lucky Guitar
May 18 – Oconomowoc, WI – Three Brothers Farm
May 20 – Minneapolis, MN – 7th St Entry
May 22 – Madison, WI – Ruby
May 23 – Evanston, IL – SPACE
May 24 – Ann Arbor, MI – The Ark
May 25 – Pittsburgh, PA – Club Café
May 26 – Peninsula, OH – G.A.R. Hall
Jun 10 – Pagosa Folk 'n Bluegrass Festival
Jun 22 – Bozeman, MT – Acoustic Life Festival
+ The Rope, Witch Watch
Mon 05/21/2018 (7pm/$15)
San Francisco’s acid punk rock band Chrome (not to be confused with Google’s browser) will be in town at the 7th Street Entry on Monday, May 21st.
05/18 Neurolux Boise, ID
05/24 Outer Limits Lounge Detroit
05/27 Grog Shop Cleveland, OH
05/30 Saint Vitus Bar New York, NY
05/31 Kung Fu Necktie Philadelphia, PA
06/3 Local 506 Chapel Hill, NC
06/7 Three Links - Deep Ellum, TX
06/11 Great American Music Hall San Francisco, CA
CORB LUND
+ Sarah Streitz
Tue 05/22/2018 (7pm/$17)
Canada’s Corb Lund will be stopping by the Turf Club in St Paul as part of his Western Destinations Tour.
05/22 Turf Club Saint Paul, MN
05/17 Miles City, MT Miles City, MT
05/17 Eastern Montana Fairgrounds - Miles City, MT
05/18 Hay Camp Brewing Company Rapid City, SD
05/19 Sanctuary Events Center Fargo, ND
05/20 Bigs Bar Sioux Falls, SD
05/23 Showboat Saloon Wisconsin Dells, WI
Posted by W♥M on Monday, 14 May 2018 at 12:00 AM in Boogie, Buddy (Rapper), Caitlin Canty, Fury, Joey Badass, Josh Rouse, Minneapolis, Minneapolis Music Guide, Palm, Power Trip, Red Death, Sheer Mag, Sum 41, Superchunk, The Cactus Blossoms, Vu, Wye Oak | Permalink | Comments (0)
Minneapolis: September 28 to September 30, 2017
We're closing out September with these Minneapolis/St Paul shows.
Broken Social Scene, that band consisting of three thousand band members, including Feist, Amy Millan (Stars), Emily Haines (Metric), Brendan Canning, etc., well it looks like Jason Collett of BSS …
Frightened Rabbit is back in Minneapolis next Wednesday, April 27th, touring in support of Painting of a Panic Attack. The fifth studio album came out April 8th ..…
Thursday 09/28/2017 (7pm/$31)
One of the most important Canadian band Broken Social Scene is making their return to Minnesota at the Palace Theatre next Thursday. The all-star collective (they have officially 19 band members!) has produced notable stars such as Metric, Feist, Stars, Emily Haines, Amy Millan, Apostle of Hustle, etc. This is going to be a great, fun time.
We haven’t seen BSC since 2009 and 2008, so it’s a rare treat that they can all come together to tour.
Expect to see these guys rocking together on stage at the Palace show: Kevin Drew, John Crossingham, Brendan Canning, Sam Goldberg, Charles Spearin, Ariel Engle, Justin Peroff, Leslie Feist, Andrew Whiteman, Emily Haines, Evan Cranley, Amy Millan, Jimmy Shaw, Lisa Lobsinger, David French, Ohad Benchetrit, and Jason Collett.
BSC’s long-awaited fifth album Hug Of Thunder is out now.
Scotland’s Frightened Rabbit to open. The last time we saw the band at Festival Palomino 2016, we wrote, “The band undoubtedly gained new fans as a result of their early slot and songs like ‘Old Old Fashioned’ seemed tailor fit to this type of festival. ‘The Woodpile’ remains a sonic tour-de-force and the band closed with 2010’s somewhat somber, ‘The Loneliness and the Scream’.”
9/24/17 St. Louis, MO @ The Pageant *
9/26/17 Des Moines, IA @ Hoyt Sherman *
9/27/17 Milwaukee, WI @ Pabst Theater *
9/28/17 St. Paul, MN @ The Palace *
9/29/17 Chicago, IL @ Aragon Ballroom *
9/30/17 Detroit, MI @ The Fillmore *
10/1/17 Pittsburgh, PA @ Byham Theater *
10/3/17 Philadelphia, PA @ The Fillmore
10/5/17 Portland, ME @ State Theater *
10/6/17 New Haven, CT @ College Street *
10/7/17 Boston, MA @ House of Blues
10/18/17 Calgary, AB @The Palace +
10/20/17 Vancouver, BC @ Commodore Ballroom ~
10/22/17 Seattle, WA @ Neptune Theatre ~
10/24/17 Portland, WA @ Crystal Ballroom ~
10/26/17 Oakland, CA @ Fox Theater ~
10/28/17 Los Angeles, CA @ The Wiltern ~
11/1/17 Windsor, ON @ Family Credit Union #
11/3/17 Toronto, ON @ Air Canada Centre #
~ - with The Belle Game
* - with Frightened Rabbit
+ - with Dear Rouge
# - with Arcade Fire
Judah & the Lion
Nashville’s Judah & The Lion is back in town, supporting their sophomore album Folk Hop N Roll. The record entered the Billboard’s Heatseekers Album Chart at an impressive #2 and #1 on the Heatseekers South Central! …
Friday 09/29/2017 (8pm/$22/Sold Out)
Judah & The Lion has sold out their appearance at First Avenue for September 29th. We’ve always known they were a special band, especially after seeing them for the first time in 2014 and wrote, “It's feel-good singalong folk rock, think Mumford & Sons, and you get the idea. Many of their songs got their most dedicated fans to help sing along, especially on "Back's Against the Wall", where Akers stopped a second to hear his fans finish the lyrics... with the biggest grin on his face.”
Judah & The Lion’s Going To Mars is out now.
Irish indie rockers The Academic will open the show. After this US tour, the Choice Music Prize nominee band will be returning to the UK to play some of their biggest headlining gigs this November.
09/24 @ Broncos Block Party in Denver, CO
09/28 @ The Blue Note in Columbia, MO
09/29 @ First Avenue in Minneapolis, MN
10/01 @ The Intersection in Grand Rapids, MI
10/02 @ The Rave II in Milwaukee, WI
10/04 @ Mr. Smalls Theatre in Pittsburgh, PA
10/05 @ Newport Music Hall in Columbus, OH
10/06 @ Headliner’s Music Hall in Louisville, KY
10/07 @ Minglewood Hall in Memphis, TN
10/08 @ HOB in New Orleans, LA
10/10 @ Maverick’s in Jacksonville, FL
10/11 @ State Theatre in St. Petersburg, FL
10/13 @ Iron City in Birmingham, AL
10/14 @ Music Farm in Charleston. SC
10/15 @ The Ritz in Raleigh, NC
10/16 @ Jefferson Theatre in Charlottesville, VA
10/18 @ Irving Plaza in New York, NY
10/19 @ Town Ballroom in Buffalo, NY
10/20 @ Paradise Rock Club Ballroom in Boston, MA
10/21 @ Theatre of the Living Arts
10/22 @ 9:30 Club in Washington, DC
10/25 @ The Metroplex in Little Rock, AR
10/26 @ Cain’s Ballroom in Tulsa, OK
10/27 @ Stubb’s in Austin TX
10/28 @ HOB in Dallas, TX
10/29 @ White Oak Music Hall in Houston, TX
Hundred Waters
Get a chance to see an intimate show with Florida's Hundred Waters before they set sail and tour with Interpol this November! …
Jackie Venson
Berklee School of Music graduate Jackie Venson with an energetic and generous forty-five minute set, in support of her latest, the self-released Live at Strange Brew …
Again, Los Angeles' Wand is not to be confused with Canadian band Wand (who was forced to change their name) or Denmark's The Wands or Japan's Wands. They also suffer from same-name/similar-sounding ....
09/28/2017 Banditos is headlining the 7th Street Entry on Thursday, September 28th. Banditos’ Visionland is out now. Michaela Anne to open. 7pm, $10.
09/28/2017 Soul/Pop guitar virtuoso/vocalist Jackie Venson is touring in support of her new EP Transcends (due out September 29, 2017). Venson will be headlining the Turf Club in St Paul this Thursday, September 28th. We previously caught Venson with Gary Clark Jr in August 2017. Jessica Manning to open. 7pm, $10.
09/29/2017 Bill Frisell and Jazz trio the Bad Plus (drummer Dave King, pianist Ethan Iverson, and bassist Reid Anderson) will be reconstructing the first 10 years of recordings of Frisell in this very special Walker Art Center commissioned show. They perform on Friday, September 29, in the William and Nadine McGuire Theater, with two showings: 7pm and 9:30pm. 7/9:30pm, $24.
09/29/2017 We’ve seen Hundred Waters a few times, so we’re pretty happy to see them back in town at the 7th Street Entry this Friday, September 29th. The trio will be promoting their new album Communicating. Lafawndah to open. 8pm, $13.
09/29/2017 Quinn XCII has sold out his appearance at the Fine Line Music Café. His debut album The Story Of Us is out now. Show up early to see shallou. 8pm, $15/Sold Out.
09/29/2017 Wand is back in town, this time touring in support of their new album Plum, available now on Drag City. We saw the band when they were last in town in 2015 at 7th Street Entry, and wrote, “Wand's 45-min set included tracks from their latest Golem album, including "Self Hypnosis in 3 Days" and their new 'western' song "Reaper Invert". Songs were energetic, often filled with experimental feedback, thrash, distortion, and, in the middle of their set, lead guitarist/vocalist, Cory Hanson was doing his best shredding solo on the guitar.” Royal Brat and Darto rounds out the triple rock at this Triple Rock Social Club show on Friday, September 29th. 9:30pm, $10.
09/30/2017 Ben Ottewell is touring in support of his new album A Man Apart (Sundays Best). He will be stopping by 7th Street Entry on Saturday. 9:30pm, $10.
09/30/2017 Obituary and Exodus to co-headline the Skyway Theatre on Friday. Show up early to check out Power Trip (in support of their sophomore album Nightmare Logic and Dust Bolt. 6pm, $25.
09/30/2017 Melbourne’s Slow Dancer (aka Simon Okely) is on his first-ever headlining U.S. tour, stopping by the Icehouse in Minneapolis on Saturday, September 30th. This rescheduled show was originally listed for June 27, 2017. Slow Dancer’s In a Mood is out now on ATO Records. Petal to open. Petal was last seen in town on December 2016, so she's only known snow in Minneapolis... Please note, that usually Icehouse shows starts at 11pm. 11pm, $12.
09/30/2017 Electronic funk duo The Floozies (brothers Matt Hill and Mark Hill) is headlining First Avenue. Boombox and Late Night Radio to open. 8pm, $20.
Posted by W♥M on Sunday, 24 September 2017 at 10:30 AM in Banditos, Ben Ottewell, Boombox, Broken Social Scene, Darto, Dust Bolt, Exodus, Frightened Rabbit, Hundred Waters, Judah and the Lion, Lafawndah, Late Night Radio, Michaela Anne, Minneapolis, Minneapolis Music Guide, Obituary, Petal, Power Trip, Quinn XCII, Royal Brat, shallou, Slow Dancer, The Academic, The Floozies, Vu, Wand | Permalink | Comments (0)
Minneapolis: March 12 to March 14, 2017
Here are some concerts taking place in the Minneapolis/St Paul area from March 12 to March 14, 2017.
Phantogram
This Sunday's show is sold out, marking Phantogram's triumphant return to Minneapolis, in support of their new album Voices. …
Sunday 03/12/17, 7pm (Sold Out)
The first non-Minnesota band the play the newly opened Palace Theatre in St Paul will be Phantogram. We got a sneak peek at the venue in Dec 2016 and wrote, “Booked and operated by a collaboration of First Avenue and Jam Productions, the venue expects to host around fifty events annually, and will be used during the day by nearby McNally Smith College of Music as a learning tool for students to know box office, staging, and venue operations.”
Given that the Palace is nearly double the size of First Avenue, it would make sense that bands that consistently selling out First Avenue would turn to the Palace. With all the hype of the new venue, Phantogram also sold out the Sunday show.
Phantogram will also be bringing shoegaze alternative The Veldt on tour with them for a brief six-exclusive U.S. Mid West cities before the duo departs for their European tour. Expect Phantogram to return their appearances at Coachella.
March 11: Chicago, IL – Riviera Theatre
March 12: St Paul, MN – Palace Theatre
March 13: Madison, WI – Orpheum Theatre
March 14: Urbana, IL – Canopy Club
March 16: Cincinnati, OH – Bogart’s
March 17: Atlanta GA – The Tabernacle
Eisley
The song is called. I first heard this song ["Sea King" by Eisley] on MTV's You Hear It First a couple of years ago.... when I first heard a clip of "Sea King", I was hooked. I immediately stopped ...
Sunday 03/12/17, 7pm ($15)
We wrote about Eisley in 2007 (10 years ago): “...when I first heard a clip of "Sea King", I was hooked. I immediately stopped what I was doing and turned my attention to the tube and watched the segment on Eisley. I loved the fantasy, other-world sound of it and reminds me of fantasy books.”
The family band is back in town, this time headlining the 7th Street Entry in support of their latest album I'm Only Dreaming (Equal Vision Records).
Civilian and Backwards Dancer to open.
03/08/17 Columbus, OH The Basement
03/10/17 Detroit, MI Shelter
03/11/17 Chicago, IL Subterranean
03/12/17 Minneapolis, MN 7th Street Entry
03/13/17 Indianapolis, IN The Hi Fi
03/15/17 SXSW
03/20/17 Denver, CO Lost Lake Lounge
03/22/17 Portland, OR Star Theater
03/23/17 Seattle, WA Chop Suey
03/27/17 West Hollywood, CA Troubadour
03/28/17 San Diego, CA House Of Blues
03/29/17 Anaheim, CA The Parish
03/30/17 Phoenix, AZ Valley Bar
Los Angeles garage-rock quartet Allah-Las will be bringing the California sunshine to the miserable ice-covered streets of St. Paul December 1st when they make a stop at the Turf Club. …
Tuesday 03/14/17, 8pm ($15)
Los Angeles garage-rock quartet Allah-Las (Singer Pedrum Siadatian on lead guitar, Miles Michaud on rhythm guitar, Matthew Correia on drums, and Spencer Dunham on bass) will be back in town at the Triple Rock Social Club next Tuesday. Their new album Calico Review is available now.
Australia’s The Babe Rainbow will be guest on most of Allah-Las’ North American tour.
March 11—Marfa, TX—Marfa Myths
March 13—Kansas City, OK—Record Bar*
March 14—Minneapolis, MN—Triple Rock *
March 15—Milwaukee, WI—Turner Hall Ballroom*
March 16—Chicago, IL—Thalia Hall*
March 17—Cleveland, OH—Beachland Ballroom*
March 18—Detroit, MI—El Club*
March 20—Toronto, ON—The Mod Club*
March 21—Montreal, QC—Rialto Theater*
March 22—Philadelphia, PA—Union Transfer*
March 24—New York—Webster Hall*
March 25—Boston, MA—Brighton Music Hall*
March 27—Washington, DC—9:30 Club*
March 29—Athens, GA—Georgia Theatre*
March 30—Asheville, NC—The Grey Eagle*
March 31—Atlanta, GA—Terminal West*
April 1—New Orleans, LA—One Eyed Jacks*
April 3—Houston, TX—Walter’s*
April 4—Austin, TX—The Mohawk*
April 7—Denver, CO—Gothic Theatre*
April 8—Salt Lake City, UT—Metro Music Hall*
April 16 —Indio, CA—Coachella
April 23—Indio, CA—Coachella
* with The Babe Rainbow
Nikki Lane
Country singer/songwriter Nikki Lane is back in Minneapolis at the Turf Club this Sunday. The venue was an upgrade from the Fine Line Music Café, which was done to accommodate all …
03/12/2017 Lancaster’s Carousel Kings will be headlining The Garage in Burnsville, in support of Charm City. Abandoned By Bears and Bad Case Of Big Mouth to open.
03/12/2017 The Griswolds returns to town at Triple Rock Social Club in Minneapolis.
03/12/2017 Local favorites Hippo Campus is headlining a sold-out show at First Avenue.
03/12/2017 Panic! At The Disco is headlining Xcel Energy Center, bringing with them Misterwives and Saint Motel .
03/13/2017 Texas’ Power Trip will be stopping by the Triple Rock Social Club, touring in support of their new sophomore Nightmare Logic (Southern Lord). Iron Reagan to open.
03/14/2017 Nashville’s Nikki Lane will be at Turf Club in St Paul with Brent Cobb. Lane’s new album Highway Queen is out now on New West Records. The show is sold out. Why do I start singing “Penny Lane” whenever I see the name Nikki Lane?
03/14/2017 Jesca Hoop (not Jessica Hoop) will be at the Cedar Cultural Center next Tuesday. Her latest album Memories Are Now is out now. Lowland Hum will open.
Posted by W♥M on Tuesday, 07 March 2017 at 05:33 AM in Abandoned By Bears, Allah-Las, Backwards Dancer, Bad Case Of Big Mouth, Brent Cobb, Carousel Kings, Civilian, Eisley, Hippo Campus, Iron Reagan, Jesca Hoop, Lowland Hum, Minneapolis, Minneapolis Music Guide, Misterwives, Nikki Lane, Panic! At the Disco, Phantogram, Power Trip, Saint Motel, The Babe Rainbow, The Griswolds, The Veldt, Vu | Permalink | Comments (0)
|
cc/2020-05/en_middle_0102.json.gz/line2043
|
__label__cc
| 0.693269
| 0.306731
|
Best books about american slavery
Posted on 04.02.2019 by Edgarda M.
Here’s a List of Books on Slavery That Kanye Should Read
Without understanding the past, it is difficult to grapple with the present. This became quite clear in the wake of the tragic attack in Charleston, when public dialogue swirled with myths, wishful thinking and deeply ideological readings of history, all too often camouflaged as solid historical analysis. Now, years after emancipation, it is high time to confront the legacy of slavery. No one alive today was enslaved or enslaved others, and no one bears personal responsibility for the brutal institution—but we live in its shadow, and contemporary debates on race relations cannot proceed without first acknowledging that. Indeed, without understanding slavery, it is impossible to understand the history of the United States. Over the course of more than two centuries, millions of Americans were enslaved, producing most of the commodities—from tobacco to rice, sugar to cotton—that established America on the world scene. As I write in my book, Empire of Cotton , American slavery and the cotton it produced was crucial to the development of global capitalism.
File Name: best books about american slavery.zip
Life Aboard a Slave Ship - History
It was the Land of the Free, unless you happened to be black.
Books about American slavery
Skip to main content. There's a problem loading this menu right now. Learn more about Amazon Prime. Get fast, free delivery with Amazon Prime. Amazon Best Sellers Our most popular products based on sales.
Make Your Own List. He talks us through five books on the tragedy of slavery—from the horrors of the gulag, to the plantations of Virginia, to the Islamic slave trade. David Olusoga is an Anglo-Nigerian historian, writer and producer. His radio and television programmes have explored the themes of colonialism, slavery and scientific racism. For very personal reasons. Experiences that came out of being brought up on a council estate in the northeast of England where it was quite obvious, through the experiences of my African family, that race could be a very real and powerful force. This book came out at the moment when many of us in Britain were busy marking the bicentenary of the end of the slave trade in
The United States was founded upon a racial caste system where slavery was legal in all Thirteen Colonies. European colonists traded with African nations to buy manual laborers for maintaining their homes and fields. Most were chattel slaves whose children and grandchildren were automatically enslaved.
junior english book 4 answers pdf
Bury the Chains: The British Struggle to Abolish Slavery
That sound like a choice. Open letters from fans begging the old Kanye to come back will go unanswered. Self-reflection will continue to evade him.
To vote on existing books from the list, beside each book there is a link vote for this book clicking it will add that book to your votes. To vote on books not in the list or books you couldn't find in the list, you can click on the tab add books to this list and then choose from your books, or simply search. Discover new books on Goodreads. Sign in with Facebook Sign in options. Join Goodreads. A list of fiction and nonfiction books dealing with slavery in the US over the years. Alex Haley.
Over the past few years, several films have been released in the United States, including Twelve Years a Slave , The Birth of a Nation , and the remake of Roots , exploring various aspects of the lives of enslaved men and women. Although these films offer valuable insights into the history of slavery, they certainly do not tell the entire story. Here is a list of seven new notable books on slavery, which were published in the last six months or will soon be published. They explore the complexity of the slave experience and reveal how slavery was vital to the economic development of the nation and the New World. They highlight a range of topics including gender, family, and resistance.
The book, which was written by Ramin Ganeshram and illustrated by Vanessa Brantley-Newton, focused on George Washington's enslaved cook, Hercules, and his daughter Delia, as the two overcome obstacles to make a cake for Washington's birthday. Many critics argued that it displayed an overly rosy view of a slave's life, and the book was deluged with one-star on Amazon reviews. It's not the first such misstep in recent months, however; last fall, McGraw-Hill apologized after a Texas mother, Roni Dean-Burren, publicly criticized her son's World Geography textbook for euphemistically describing Africans brought to America in the slave trade as "workers. While the writer-illustrator-editor team who worked on this book come from diverse backgrounds and are steeped in historically accurate renditions of black history, the fact remains that too many Americans -- particularly white Americans -- don't grasp, or prefer not to grasp, the depth and breadth of slavery's horrors. It's not uncommon to see clueless social media posts or read obtuse comments by politicians arguing that slavery ultimately benefited African-Americans because it brought them to America, or that they were better off under slavery than they are now. Many children, and, sadly, their parents, still need to learn that slavery wasn't idyllic, a boon to their family lives, or an improvement over remaining in their homelands. In fact, slavery was often brutal and dehumanizing even when owners exhibited basic kindness.
Ladies tailoring books free download
The book of learning and forgetting summary
Best books about arthurian legend
Business organisation and office management book
The wave by todd strasser online book
Robert monroe out of body pdf
Book of sith pdf free
Keep a true lent pdf
How to write a picture book manuscript
Advanced open water diver manual pdf
Famous fiction novels in english
Handmaids tale book club menu
Arthur c clarke and stephen baxter books
Ted dekker audio books free download
Freud ego and id book
International business finance book free download
How to convert a mail to pdf
Understanding business accounting for dummies free pdf
This entry was posted in best books by Bernard H.. Bookmark the permalink.
2 thoughts on “Top 30 Books About Slavery (Nonfiction) – About Great Books”
Moore S. on 05.02.2019 at 00:15 said:
How to make movies book maths olympiad books for class 6 free download
Tadamega on 10.02.2019 at 21:20 said:
How to become parisian book investigating biology lab manual 9th edition pdf download
|
cc/2020-05/en_middle_0102.json.gz/line2046
|
__label__wiki
| 0.923484
| 0.923484
|
Tallahassee's Talk Radio
100.7 WFLA - Tallahassee's Talk Radio
All Podcasts Preston Scott On Demand Rush Limbaugh Glenn Beck Sean Hannity Coast to Coast Talon Outdoors On Demand Tallahassee on Tap Sims Murders Over My Dead Body - The Dan Markel Murder
Latest News Florida News Weather Traffic Operation Stormwatch
Facebook Sign Up Advertise With Us Event Calendar
Advertise on 100.7 WFLA, Get Results
Florida Shipping Water to Bahamas
posted by Jim Turner - Sep 10, 2019
TALLAHASSEE --- After being largely spared by Hurricane Dorian, Florida and the state’s largest electric utility are sending more than a half-million bottles of water to storm-ravaged parts of the Bahamas.
Gov. Ron DeSantis and Florida Power & Light on Tuesday announced plans to ship 19 truckloads of water --- including 10 truckloads that had been stockpiled by the state for the ongoing hurricane season --- to Nassau, where the Bahamian government is staging most of its relief efforts.
With more than 80 days remaining in the Atlantic hurricane season, now at its peak, DeSantis said the donation shouldn’t leave the state short in case any of three disturbances now being monitored by the National Hurricane Center pose an immediate threat to the state.
“We’re not out of the woods with hurricane season, obviously we’re still monitoring,” DeSantis said during a news conference at FPL’s Command Center in West Palm Beach. “But we felt comfortable we can give some of the water --- given the acute needs in the Bahamas --- and then still be in the position to backfill if we’re unfortunate enough to get hit with a storm.”
In advance of Dorian, Florida deployed 860,000 bottles of water and 1.8 million meals to counties that faced threats from the storm, and another 819,000 gallons of water were ready for distribution. Also, 730,000 pounds of ice were ready for distribution.
But Dorian skirted the state’s East Coast, sparing Florida communities --- and millions of FPL customers --- from a direct hit.
DeSantis, who on Monday said Florida is following the lead of the federal government in providing humanitarian assistance to the Bahamas, called the water donation a way of “supplementing” the federal relief effort.
He added that offers of assistance, such as troops from the Florida National Guard, have been declined during daily talks with the Trump administration..
“They’ve said they’ve got kind of a handle on how things are going, and basically I’ve been urged to pursue the course we’re doing,” DeSantis said.
Still, DeSantis and Florida Emergency Management Director Jared Moskowitz said the state likely will make other contributions along with donating the water.
“We are intimately involved in helping figure what are the unmet needs and where we can help,” Moskowitz said.
Moskowitz noted that even the best hurricane building codes were not developed for Dorian, which hit parts of the Bahamas with 185 mph sustained winds.
“This could have been us. And let’s be clear, it almost was us,” Moskowitz said.
John Rood, a former U.S. ambassador to the Bahamas who has been appointed by DeSantis as the state’s “point person” in relief efforts, said the first step is working with Mission of Hope International to build transitional housing for Bahamians.
“There are people in these islands, in these settlements, who don’t want to leave and go to Nassau,” said Rood, a Jacksonville businessman who spent three days in the Bahamas after Dorian.
Rood added that supplies should be going out next week, once details for the project are completed with Bahama’s National Emergency Management Agency.
“We don’t want to be going off in a direction that is not consistent with the Bahamas, with their plan,” Rood said.
*News Service Florida
WFLA-FM Public Inspection File
WFLA-FM Political File
Advertise with 100.7 WFLA, Get Results
100.7 WFLA is Tallahassee's Talk Radio with Preston Scott morning and the latest news, traffic, and weather all day
|
cc/2020-05/en_middle_0102.json.gz/line2051
|
__label__cc
| 0.633321
| 0.366679
|
Illinois expands insurance coverage for those with tick-borne diseases and children requiring EpiPens
August 13, 2019 3:31 pm Jim Roberts News, Top Stories
SPRINGFIELD, IL (WGEM) — Governor JB Pritzker signed two new laws expanding insurance coverage for children whose allergies require life-saving EpiPens and Illinoisans suffering from Lyme disease.
“This legislation takes a big step forward in protecting our children and families,” said Pritzker. “Both of these new laws fulfill a core principle of this administration: state government ought to be standing up for working families. Lowering the cost of prescription drugs and expanding health care coverage is one important way to help lower costs and build a higher standard of living for all Illinoisans.”
The new laws include House Bill 889 and 3435.
The Governor’s office stated that House Bill 889 requires insurance companies to cover office visits, testing and treatment for tick-borne diseases like Lyme disease. The new law aims to support farmers throughout the state who have struggled to afford continuing treatments. From 2004 to 2016, tick-borne diseases have risen dramatically according to the Centers for Disease Control.
“The ability to receive treatment when you have previously been insufficiently treated is life changing,” said Rep. Daniel Swanson (R-Woodhull). “By mandating insurance coverage of long-term antibiotic treatment needed for patients, we are putting another piece of the puzzle into place for some patients and removing one additional hassle on their path to recovery.”
Officials stated that House Bill 3435 requires insurance companies to cover EpiPens, for children with severe allergies. The cost of an EpiPen has skyrocketed over the last decade, rising by more than 400% for the two-pen injector pack. Without insurance, these EpiPens can cost a family nearly $700 and typically have a shelf life of a little more than a year before the medicine needs to be restocked in stores.
“With steady increases in food allergies and other serious allergic conditions, families are relying on EpiPens more than ever before,” said Sen. Julie Morrison (D-Deerfield). “We should be doing everything we can to expand access to affordable lifesaving drugs and medicines. No child with a serious allergy should be without an epinephrine injector because they cannot afford one.”
House Bill 889 takes effect immediately.
House Bill 3435 takes effect on January 1, 2020.
Jim Roberts
Social Media & Digital Content Manager
|
cc/2020-05/en_middle_0102.json.gz/line2052
|
__label__wiki
| 0.958601
| 0.958601
|
Singer Carrie Underwood recuperating after fall at home
(Photo by Michael Loccisano/Getty Images)
NASHVILLE, Tenn. — Country music star Carrie Underwood is recuperating from injuries sustained in a fall on steps outside her home.
In a statement Sunday on Twitter, Underwood thanked her fans for messages of support following her fall Friday night.
The Tennessean reports Underwood was treated and released from a hospital for a broken wrist, cuts and abrasions. Her husband, retired NHL hockey star Mike Fisher, traveled to Nashville to be with her.
Underwood wrote that “I’ll be alright…might just take some time…glad I’ve got the best hubby in the world to take care of me.”
A statement from an Underwood spokesperson says she will miss a benefit concert Sunday in Nashville for victims of the Oct. 1 Las Vegas shooting and hurricanes in Florida, Texas, Puerto Rico and the Caribbean.
Dean's List News
CMA Awards 2019: See who won big at country music’s biggest night
Daycare worker, 53, shot and killed in Altgeld Gardens
Illinois gets the job done this time as they knock off No. 5 Michigan
People’s Choice Awards 2019: See the list of winners
American Music Awards 2019: The complete list of winners
‘We got a lot done’: Gov. JB Pritzker discusses first year in office
Reaction from lawmakers continues to pour in day after Trump impeachment
Former President Jimmy Carter out of surgery, no complications
Rare win at Wisconsin gives Illinois some early January momentum, but can they keep it?
Jimmy Carter hospitalized after fall at Georgia home
Jimmy Carter admitted to hospital for procedure to relieve pressure on his brain
Kristin Cavallari opening 2nd ‘Uncommon James’ location in West Loop this weekend
Jimmy Carter out of hospital after treatment for fall
|
cc/2020-05/en_middle_0102.json.gz/line2053
|
__label__wiki
| 0.997156
| 0.997156
|
Italian PM Monti to resign after budget passes
Updated December 09, 2012 13:26:11
Photo: Mario Monti says that after the budget is approved, his resignation will be "irrevocable" (Vincenzo Pinto: AFP)
Related Story: Italy's Berlusconi confirms political comeback
Related Story: Disgraced Berlusconi threatens to bring down government
Related Story: Cameron hands eurozone tough ultimatum
Map: Italy
Italian prime minister Mario Monti says he intends to resign but will pass next year's budget before standing down.
Mr Monti says he feels he no longer has the confidence of parliament after former prime minister Silvio Berlusconi's party withdrew support for his technocrat government.
Only hours before the announcement, Mr Berlusconi said he would run to become premier for a fifth time on a platform that attacks Mr Monti's stewardship of the economy.
Announcing his decision, Mr Monti warned that not approving the budget "would render more serious the government crisis, also at a European level".
He said that after it is approved, his resignation would be "irrevocable".
Leaders of both Mr Berlusconi's centre-right People of Freedom (PDL) party and the centre-left Democratic Party (PD), which is leading in the opinion polls, said they would pass the budget.
"Faced with the irresponsibility of the right that betrayed a commitment it made a year ago before the whole country... Monti responded with an act of dignity that we profoundly respect," PDL leader Pier Luigi Bersani said.
"We are ready to approve the budget in the fastest possible manner."
Election speculation
Mr Monti's move will fuel speculation over whether he intends to run to lead the country next year once he has resigned.
So far he has said he will step in only if the election result is unclear, but there has been growing speculation he could join forces with a centrist group.
Mr Monti's move also turns the tables on Mr Berlusconi, who seemed to have once again seized a political opportunity to keep his party in the political game just a year after being forced to resign amid a sex scandal and a debt crisis.
Financial markets have been closely watching the political upheaval in Italy and many in the business establishment have hoped for a second term from Mr Monti.
Mr Monti's year in office has been widely credited with restoring Italy's international credibility after the scandal-plagued Berlusconi era.
However Mr Berlusconi, Italy's most proved election campaigner, said he would not give in easily.
"I return in despair to politics and I'm doing it again for sense of responsibility," Mr Berlusconi said.
"Even when I was doing sports, working studying, I've never entered a race to get a good ranking but I've always entered a race to win."
President Giorgio Napolitano is now expected to set the date for an election which must come within 70 days of the government resigning.
Italy had in any case been due to go to the polls by April at the latest.
Italians will vote in the middle of a severe economic crisis, with a recession that began mid-way through last year showing no signs of abating and unemployment at 11.1 per cent, a record high.
Topics: world-politics, economic-trends, italy
First posted December 09, 2012 12:34:48
|
cc/2020-05/en_middle_0102.json.gz/line2072
|
__label__wiki
| 0.883709
| 0.883709
|
Search AA:
Red Jumpsuit Apparatus
Seether’s first album away from Wind-Up turns out to be an amazing one in Isolate and Medicate. The new record sees the band exploring their sound, dipping into programming and blues while keeping the band’s trademark sound intact. What Shaun Morgan and co. accomplished with the new record is no small feat. They made a great mainstream rock record that has a chance for the younger generation to latch on to. It’s something that Linkin Park struck out on with The Hunting Party, but it’s something that Seether passed with flying colors on their new album.
Morgan’s songwriting genius is in fine form with this new album. Lyrically and vocally this is a mishmash of different moods and offerings from Seether. There’s happy and sad and everything in between. There’s self-loathing, but there’s also a lot of hope, that’s something that you haven’t seen with every Seether record.
There are some terrific songs on this album, but it’s important to note that there’s not really a bad song on this record either. Nothing is boring. The other really cool trait about this Seether record is that even though they do some exploring, this is the closest record that Seether has made to Disclaimer since that album was released. It’s far more grunge than post grunge, and that’s definitely a good thing.
Seether’s Isolate and Medicate sees the band adapt to fit the times while appeasing their core group of fans. At least that’s this listener’s take on things. It’s a fine line that they walk between those two sides, but it’s one they walked incredibly well.
Cold War Kids - New Age Norms 1
Various Artists - Songs That Saved My Life Vol. 2
Fall Out Boy - Believers Never Die (Volume Two)
MisterWives - mini bloom EP
Simple Creatures - Everything Opposite EP
New Politics - An Invitation to an Alternative Reality
Jimmy Eat World - Surviving
The Vanns - Through The Walls
Paper Lions - Stay Together
Sleep On It - Pride & Disaster
COIN Drops New Track, "Youuu" - New Album "Dreamland" Available Next Month
Primavera Sound Reveals Star-Studded 2020 Lineup
Wallows Make Their 2020 Debut with a Trippy Official Video for "Remember When"
Blink-182 Drop New Merch To Raise Money For Australian Bushfire Relief
American Authors Drop New Track, "Microphone"
The Cranberries, Larkin Poe To Be Special Guests At Grammy Museum Events
AA Indie Song of the Day - Melding Mallows "YA YA YA YA"
Derek Sanders of Mayday Parade Announces First Solo EP, "My Rock and Roll Heart"
Barenaked Ladies announce 'Last Summer On Earth' tour w. Gin Blossoms & Toad the Wet Sprocket
Review of:
TOP 20 SINGLES
TOP 10 ALBUMS
© 2018 Alternative Addiction - All Rights Reserved
|
cc/2020-05/en_middle_0102.json.gz/line2077
|
__label__wiki
| 0.946853
| 0.946853
|
_Rest World
_Regional
_Bollywood
__Shopping
__Money
__Marketing
Home Nation IAS Officer Quits, Says "Disturbed" Over Restrictions In J&K
IAS Officer Quits, Says "Disturbed" Over Restrictions In J&K
Main Uddin Nation,
THIRUVANANTHAPURAM:
A 33-year-old Indian Administrative Service officer said he has filed his papers to quit the coveted government job. While stating his reasons, IAS officer Kannan Gopinathan said one of them was denial of "fundamental rights" to lakhs of people in Jammu and Kashmir for weeks after special status was scrapped from the state earlier this month.
"...Not that my resignation will cause anything even worth a flutter. But one has one's own conscience to answer to, I guess," Mr Gopinathan told NDTV.
Mr Gopinathan, a secretary of key departments in Dadra and Nagar Haveli, was instrumental in transforming a loss-making government electricity distribution firm into a profit-making one.
"In (Jammu and) Kashmir, fundamental rights of lakhs of people have been suspended for 20 days. And many in India seem to be okay with it. This is happening in India in 2019. Article 370 or its abrogation is not the issue, but denying citizens their right to respond to it, is the main issue. They could welcome the move or protest it, that's their right," Mr Gopinathan told NDTV, adding this issue "disturbed" him enough to resign.
An IAS officer for seven years, Mr Gopinathan gave his resignation on August 21.
"Even when a former IAS officer was detained from the airport, there was a complete lack of response from civil society. It seems like most in this country are okay with this," said Mr Gopinathan, referring to how IAS officer-turned-activist Shah Faesal was sent back to Srinagar from Delhi airport while he was about to take a flight abroad.
In Mizoram, the IAS officer encouraged badminton player Pullela Gopichand to open 30 grassroots centres for training children in badminton and a high-altitude centre of excellence for sports while Mr Gopinathan was a collector.
Mr Gopinathan said he has received memos over reasons like not applying for the Prime Minister's excellence awards, which he said he did after getting directions to do so. Another memo asked for a summary of what he did when he had volunteered for flood relief work in Kerala in 2018. Relief workers were surprised to discover that the IAS officer had been volunteering at camps without anyone knowing his official identity.
"These memos were so frivolous and flimsy, they disturbed me. But it's nothing out of the ordinary in service life. I have been serving in some crucial roles even at a time when I gave my resignation. And I felt there are larger issues that need to be raised," Mr Gopinathan told NDTV.
In this year's Lok Sabha election, when Mr Gopinathan was the returning officer, the Chief Electoral Officer had ordered the administrator of Dadra and Nagar Haveli, a Union Territory, to withdraw a controversial notice which he had issued to Mr Gopinathan and sought an explanation from the officer.
Mr Gopinathan, who is also an engineer, is active on social media; he uses the medium to engage, ideate and seek alternate solutions in real-time. Before qualifying for the IAS, he volunteered at a non-profit and gave classes to children in slums. It was during this time that he met his future wife, who he said inspired him to prepare for the civil services.
On what his plans are, Mr Gopinathan said, "I have no idea about what will I do as of now."
Input with NDTV and PTI
Tags # Nation
About Main Uddin
Posted by Main Uddin
Labels: Nation
Multi Authors News Portal is maintained by Main Uddin.
Main Uddin is one of the pioneer blogger cum e-marketers from North East India(Assam). He is also a Skilled web Developer and regular columnist for various news portals around the globe.
twitter count=71.7k;
gplus count=735K
pinterest count=52.4K
instagram count=84.9K
দ্বিতীয় জন ফখৰুদ্দিন আলি আহমেদ পাবলৈ সক্ষম নে বৰপেটাবাসী ?
ফখৰুদ্দিন আলি আহমেদৰ নাম নজনা অসমীয়া হয়তো এজন ও নোলাৱ (প্রথম আৰু একমাত্র অসমীয়া ৰাষ্ট্রপতি ), এইজন যুগ নির্মাতাই জনিয়া সমষ্টিক প্রতিনিধ্ত্...
Soil Erosion: Factors, Types, Causes and Effects in India
Soil erosion is a process of detachment and transportation of soil by natural agencies of water and wind. Our Reporter : Factors Inf...
Hidden secrets reveals: Millions of Website Traffic Saga 2019
Every once in a while you run an SEO campaign that changes the way you do everything. The lessons you learn, the challenges you face,...
Arizona Woman With No Arms Becomes A Licensed Pilot
Have you ever seen a pilot without arms?! Now the world is all set to witness its first armless pilot Jessica Cox, a native of Arizona, USA...
Top 100 Indian Travel & Tourism Companies and Agencies
Akbar Travels of India Pvt Ltd Akbar Travels was started in 1978, in Kerela, as a small travel agency specializing in Gulf traffic from...
Archive January (1) September (2) August (4) May (34) April (1) March (9) November (2) August (1) May (1) April (16) March (613) February (50) January (1) October (1) September (1) August (5) June (5) May (2) April (1) March (2) January (6) December (10) November (8) October (8) September (12) August (11) July (14) June (17) May (454) April (491) March (195)
Subscribe To Us via mail
Kristen Stewart (2) Life Style (9) Nation (484) Regional (216) Russia (4) Technology (82)
Crafted with by Indilens Web Solutions | Distributed by Indilens Web Consultancy
|
cc/2020-05/en_middle_0102.json.gz/line2078
|
__label__cc
| 0.571621
| 0.428379
|
5 Stoneridge Coto de Caza, CA 92679-4816
gbfries@afm-llc.com
Decipher™
5 Stoneridge
Coto de Caza, CA 92679
CA Insurance Licenses 0766245 FINRA series 6, 7, 22, 24, 63, 65 registrations
Securities offered through First Allied Securities, Inc., a registered broker/dealer, member FINRA/SIPC. Advisory services are offered through First Allied Advisory Services, Inc., a registered investment adviser.
This site has been published in the United States for residents of the United States. Persons mentioned in this site may only transact business in states in which they have been properly registered or are exempt from registration.
Online Privacy Policy | Important Disclosures | Business Continuity | Privacy Promise
|
cc/2020-05/en_middle_0102.json.gz/line2080
|
__label__cc
| 0.528932
| 0.471068
|
Reporting Africa Since 1960 21 January 2020
Vol 53 No 22
Published 2nd November 2012
Uganda accused
A new UN report accuses both Uganda and Rwanda are running the M23 rebellion: foreign support for Kampala could soon be suspended
The United Nations Group of Experts on eastern Congo-Kinshasa has indicted the Ugandan government as co-sponsor of the Mouvement du 23 mars (M23) rebellion in Kivu alongside Rwanda. Kampala has threatened to pull out of regional operations against Joseph Kony and the Lord’s Resistance Army and to withdraw from the African Union Mission in Somalia if the charges are not retracted.
End of preview - This article contains approximately 1161 words.
End of preview
Subscribers: Log in now to read the complete article.
Account Holders: Log in now and use your Account Credit to buy this article. No Credit? Top up your Account now.
Choose from one of the following options
1. Subscribe
Take out an annual subscription and get access to our archive of articles from Africa Confidential.
(including VAT)
2. Use my account
Account-holders log in above. If you don't have an account yet, it only takes a minute to open one.
5 articles £60.00
10 articles £102.00
(prices includes VAT)
3. Buy this article
Buy this article on its own.
UK & European Union: £20.40
Rest of the world: $27.00
ADD ARTICLE TO BASKET
If you are logged in, but still cannot access the full text of this article, email customer services or telephone us on +44(0)1638 743633.
Africa Confidential's reporting and analysis is valued by a wide range of organisations and individuals: from corporate executives, country risk analysts, national politicians and members of the diplomatic corps, to intelligence operatives, academics, journalists and NGO personnel.
Here's what our readers say about us:
"If you want the detail and you want the dirt, the little blue newsletter [Africa Confidential] that drops through your letter box is like having your own private spook who knows Africa inside out and who's also one hell of a gossip."
Jonathan Miller, Foreign Affairs Correspondent, Channel 4 News, London, UK
"Since the demise of reporting on Africa in Western newspapers, and especially in the UK, in recent years, Africa Confidential has become ever more indispensable to anyone trying to make sense of the continent.
It provides the context one needs to understand vast changes Sudan has undergone since the signing of the peace agreement in 2005 and the explosion of conflict in Darfur.
The scope of its coverage of everything from the latest mining deals and rebel uprisings in the Democratic Republic of Congo to the political crisis in Kenya since the 2007 election is simply unparalleled."
Karl Maier, Africa & Middle East Editor, Bloomberg News
"We regard Africa Confidential as one of our best and most reliable sources of information and analysis." Intelligence Assessment Service, Privy Council Office, Government of Canada
"You are the best reporter on Africa alive. I look forward to your Intel."
Robert Stewart, CEO, Hawk Uranium Inc., USA
"In short: it is excellent! Very informative and interesting. Also well organised and easy to browse through and access to the different articles."
Lt. Col. Daniel Martella, Military Planning Service, Department of Peacekeeping Operations, United Nations
Stories by country
Congo-Kinshasa (Dem. Rep.)
NewsCurrent Issue
Africa-Asia
News by Country/Category
Copyright © Africa Confidential 2020
|
cc/2020-05/en_middle_0102.json.gz/line2081
|
__label__cc
| 0.551334
| 0.448666
|
From California to the New York Island This Land Was Made for the Vaccine Compliant
Stop and Shop and Drop
The BBC Files: Overwhelming Conflicts
This evening the BBC screens its documentary The Conspiracy Files: Vaccination Wars. While vaccine program critics on both sides of the Atlantic have cooperated with this production do not expect any fair reporting: in fact the BBC long ago committed itself to the doctrine of false equivalence i.e. it does not matter how strong or rational the evidence is they will defer to the government-industry consensus. Even the use of the term "conspiracy" has slid into innuendo. Meanwhile, the documentary has been shared with the media but not the participants. Betrayal is their watchword.
Age of Autism's British editor, John Stone, writes:
Pre-publicity suggest the program makers will try to make out that commercial conflict is not an issue. Given such preposterous stance it is very hard to know where to begin or end. Nevertheless, it might be instructive to post three submissions to UK Parliamentary bodies published by them.
PB 1584 John Stone’s response to letters from the Scottish Government and the JCVI
I hope it is in order for me individually to respond to the letters from the Scottish government and the Joint Committee on Vaccination and Immunisation as supporting witness in Angus File’s petition.
The JCVI Secretariat (1) have now responded with a defence of Prof Pollard’s appointment which I would like briefly to answer from public documents.
The code of practice of 2013 (cited by Mr Earnshaw as current in his letter) states in section 42 (2):
If a member has in the last 12 months received, or plans to receive a financial payment or other benefit from a business or representative body relating to vaccines or any other product or service that could be under consideration by JCVI...including... holding a directorship or other paid position...the member must declare this interest... If this interest is specific to an agenda item and the payment or other benefit is connected specifically with the product under consideration, the member will be required to absent him/herself from the discussion and any subsequent vote.
Such a conflict does not hinge on receiving direct remuneration from a manufacturer. Prof Pollard is on record as having led the crucial discussion on whether to recommend Bexsero vaccine in the JCVI minutes of February 2014 but he is also Director of the Oxford Vaccine Group. According to a document about the business of the Group submitted by Oxford University to Higher Education Funding Committees’ survey REF2014 (3), closing date for submissions 29 November 2013 (4) , Prof Pollard had led the development of the vaccine since 2001. The introductory paragraph states:
Oxford University research has also led to the planned use of vaccines against serogroup B meningococcal disease, which have been licensed and recommended for the prevention of disease in high-risk individuals, and broader use is under consideration.
It does not mention that the committee which will consider this broader use is chaired by Prof Pollard himself. The next section begins:
Meningococcal disease is the leading infectious cause of death in children in the UK, and its prevention is a major objective of the Oxford Vaccine Group, directed by Professor Andrew Pollard. During the period from 2001-2013 more than 10,000 volunteers were enrolled in clinical studies in Oxford, mainly children, and the research provided new insight into the design, development and evaluation of novel vaccines for meningitis and specifically meningococcal disease...
The document also mentions patents, whether or not they were any longer current:
The design and development of new vaccines for serogroup B meningococcus by Oxford University have led to a number of patents on the candidate vaccines (based on various surface proteins including Opa, PorA and FetA 17), which provide a licensing position for the University as these vaccines progress through early phase clinical trials.
The position is therefore simple irrespective of any contracts for the Group’s work at the time Prof Pollard’s appointment the JCVI, or whether he was named on any of them: Prof Pollard was director of OVG and the business of OVG was meningococcal vaccines and Bexsero in particular. This ought, I believe, to have precluded him from chairing the JCVI or certainly discussing Bexsero. Irrespective of manufacturers like Novartis or GSK taking an interest in the product it is stated here by Oxford University in 2013 (the date at which Prof Pollard was appointed the JCVI) that the product is developed by OVG of which Prof Pollard is the director.
The Bexsero decision is controversial. Subsequent to the decision in London the PBAC in Australia (their equivalent of NICE) was still dismissive of the product, both of its effectiveness and value for money (5):
- The PBAC noted that the submission had not addressed the previous concerns of the PBAC in regards to the model, namely uncertain and optimistic assumptions about the extent and duration of effect and herd immunity. The PBAC was also concerned with the discounting rate applied in the model that considerably favoured the 4CMenB vaccine. The PBAC considered that none of the proposed program options were cost effective as presented in the submission.
This underlines how essential it would be for any decision to be completely beyond suspicion, particularly bearing in mind that the Secretary of State for Health was putting pressure on the committee over Bexsero before Prof Pollard was appointed. He wrote in a letter to the acting chair of the JCVI before the June 2013 meeting (6):
I would be grateful if the committee could make the recommendation at the earliest practicable time recognising the need for scientific rigour, a strong evidence base that includes an assessment of cost effectiveness, and proper reflection of the benefits, risks and uncertainties in the committee’s advice and recommendation.
There is, I believe, something terribly wrong here and JCVI Secretariat have reacted by defending it. Everyone in the vaccine business would have known that Prof Pollard had spent an important part of his career developing Bexsero and yet by February 2014 when it was back on the agenda at the JCVI he was there in person to chair the meeting which would decide its fate. The problem of how this happened should really be the subject of urgent investigation.
(1)Andrew Earnshaw, Secretary of the JCVI, PHE to Michael MacMahon MSP, Convener PPC, 7 January 2016
(2)JCVI Code of Practice 2013
(3)REF2014, University of Oxford: EFFECTIVE DESIGN, DEVELOPMENT AND EVALUATION OF MENINGITIS VACCINES http://impact.ref.ac.uk/casestudies2/refservice.svc/GetCaseStudyPDF/15529
(4) http://www.ref.ac.uk/about/timetable/
(5)http://www.pbs.gov.au/industry/listing/elements/pbac-meetings/pbac-outcomes/2015-07/web-outcomes-july-2015-subsequent-decision-not-to-recommend.pdf
(6)https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/239394/SoS_letter_to_JCVI_Men_B_Vaccination_logo.pdf
Age of Autism submission to the House of Commons Digital, Culture, Media and Sport Committee Inquiry into Fake News November 2017
Written evidence submitted by Age of Autism
John Stone, UK Editor Age of Autism
Age of Autism [1] is a United States based web journal founded in 2007 dealing with issues such as autism and vaccine injury, but also with wider issues to do with health and potential environmental harm – and ultimately of civil rights. Since 2008 I have published hundreds of carefully researched, fact based articles on the site [2], only two of which I have ever taken down - and even in those cases not because of legal challenges. I write as a well-informed citizen and parent, not as a professional. The sources of my information come in the main from government websites, peer reviewed publications, industry websites and mainstream media - only often viewed from a different critical angle or simply just highlighted in a different context.
The view of Age of Autism is that having great bureaucracies working on behalf of governments and corporate interests deciding what is true – or even machines operating algorithms to decide it - is a prospect little different from the world of George Orwell’s 1984. It is troubling in an era when the mainstream media cannot be relied upon to provide reliable information that attention and suspicion is being diverted to other sources on the internet. The internet is presently a chaotic place, but that is infinitely better than the alternative which would be information controlled on behalf of governments and global corporations, which could never be held to account.
The present author remembers visiting a bookshop in East Berlin across Unter den Linden from the gigantic Soviet Embassy in the early 1980s: there were perhaps no more than ten different titles for sale. There were quite a lot of copies of each, although I do not know that anyone wanted to buy them. The East German population was then controlled by the notorious Stasi. Of course, we can have a pseudo pluralistic situation in which hundreds of different websites report from the same agencies but this kind of controlled reality is equally bogus and shallow. Unfortunately, no historical lesson seems to be learnt for very long.
It is, for example, not at all obvious that discussion of the effects of medical interventions should be controlled through government departments or industry public relations agencies such as Science Media Centre and Sense About Science. In 2005 a House of Commons Health Committee report on the influence of the pharmaceutical industry heavily criticised the Department of Health and the MHRA (the medicines licensing authority) for failing to keep any distance from industry [3], and twelve years later the situation has dramatically deteriorated, not least because the kind of over-sight provided by the 2005 Health Committee has never since been replicated. Perhaps this present committee would do better to inquire into the influence of the pharmaceutical industry on the media, which would at least be lot easier to define than “fake news”.
At issue in this instance is not only freedom of information, but things like informed medical consent, or even consent at all. The possibility of becoming a pharmaceutical dictatorship, is not far off – in some respects already with us. And along with forced medication comes the removal from the public domain of open debate, suppression of information about harms, and a captive market for an indefinitely expanding group of products which citizens then have to pay for through their taxes.
In this regard it is disquieting to look at the global campaign by vaccine lobbyists which reached these shores this summer advocating compulsory vaccination, having scored recent successes in Australia, Italy, France and parts of the United States. The British Medical Association jettisoned its traditional opposition to compulsory vaccination [4] – dismissed only a few years ago by a former chairman, Hamish Meldrum, as “Stalinist” [5] - and called for the matter to be discussed. Just a few days before an article appeared in the on-line Spectator by the CEO of GAVI, a global agency promoting vaccination, calling for “anti-vaxxers” to be excluded from “social media”[6]. It must be emphasised that anyone remotely critical or informed about the vaccine lobby and its products, is placed under the general pejorative label “anti-vaxxer”: it is the vaccine/pharmaceutical lobby that polarises the debate – anyone who is not in favour of their entire open-ended agenda is subject to opprobrium and ad hominem attack. Complex health issues are being reduced in the mainstream arena to “Four legs good, two legs bad” type arguments.
Hot on the heels of this a Guardian editorial appeared calling for vaccination to be made compulsory because “antivaxxers” (who are all apparently very privileged people like Gwyneth Paltrow) were gaining influence – the comedian John Oliver was held up as an authority on “antivaxxers” and what bad people they are. Further, this was illustrated by a picture of demonstrators in Italy, who were in fact demonstrating in large numbers not against vaccination but against compulsory vaccination: without Italy’s new laws there would be no demonstrations at all, nor were most of the people in them anti-vaccinationist in any literal sense [7]. It could be said that this was both manipulative mis-reporting and an inappropriate way to deal with such a serious issue.
The reality, however, is that even with the alleged baleful influence of the eternally scapegoated Andrew Wakefield (who only suggested in this regard that parents may wish to split up the vaccines temporally) [8] there have only been four deaths from measles since 1992 in the United Kingdom according to government statistics, out of perhaps 13 million deaths from all causes. Ironically, the Italian health minister Beatrice Lorenzin, is recorded on youtube as stating that 270 children had died in London in a recent outbreak of measles, at the same time lamenting without irony the false information available on the web [9].
Meanwhile, GSK’s CEO in Italy boasted to a pharmaceutical website [10]:
Among the aspects, I also met with Minister Lorenzin and other members of the government who reiterated the sensitivity of the government towards those who invest, create jobs and opportunities for young people. In short, we started on the right foot.
Such sensitivity in the Roman palaces is not to be dismissed. As for us, Andrew Witty has asked for a few things: clear rules and stability in return for strong investment in advanced research and production equipment. We were of one intent.
What is at stake here? One thing is the crude and often abusive means by which any public debate has been controlled or in fact more or less de-legitimised, which does not suggest the moral high ground. It was notable that in the one mainstream public forum which remained open for tolerant comment during the summer of 2017, BMJ Rapid Responses, the proponents of compulsory vaccination absented themselves from replying to informed criticism despite many challenges to do so, pointing to a complete inability by them to argue their position on a level playing field [11]. The issues are not so straightforward as not wanting children to die from infectious diseases (who wants that?) but more a question of mushrooming rates of neurological disability – such as autism and attention deficit disorder – as well as chronic disease, which are certainly related to environmental influences, and may be in part be related to an expanding vaccine schedule, the effects of which are not being transparently monitored.
To give a concrete example, though the Department of Health has neglected to collect autism {ASD} data for children since 2004 when the figure was effectively frozen at 1 in 100 [12], the actual figures for schools have continued to rise year on year [13]. A recent news report from Northern Ireland gives the rate there as 1 in 40 [14] and a BBC report earlier this year from London suggested the figure in the capital for those waiting for a diagnosis, who will be mostly young children, has reached 1 in 10 [15,16]. Moreover, local authorities only recognise disability if they absolutely have to, because it costs huge amounts of money.
When such stories are reported they tend to focus on the lack of provision, not on why it is happening. This is damning public data and the Department of Health do not even want to talk about it – implicitly they connect it with vaccination. Ten years ago, when the Observer tried to highlight the issue, it was not only forced to withdraw the article under pressure from Science Media Centre and Guardian journalist Ben Goldacre, the editor lost his job [17]. No one in the British mainstream media is any longer willing to stick their necks out, which may be one reason why powerful interests are turning their attention to social media, where things may still be spoken.
We are apart from anything else confronted with a care crisis of catastrophic proportions and discussing the causes has been placed outside the mainstream agenda: it really is a slippery slope if we are not even then allowed to talk about them publicly at all. At times of national peril the reasons for going to war are debated. If governments, industry or self-appointed agencies need to clamp down on information it suggests that they cannot withstand even minimal scrutiny, and that is their own fault. Meanwhile, common-sense argues that if bodies are placed beyond public scrutiny this will abused. Indeed, the very purpose is abuse.
[1] http://www.ageofautism.com/
[2] http://www.ageofautism.com/john-stone-uk/
[3] House of Commons Health Committee, The Influence of the Pharmaceutical Industry, 2005 https://publications.parliament.uk/pa/cm200405/cmselect/cmhealth/42/42.pdf
[4] Katie Foster, France to make vaccination mandatory from 2018 as it is 'unacceptable children are still dying of measles, The Independent, 5 July 2017, http://www.independent.co.uk/news/world/europe/france-vaccination-mandatory-2018-next-year-children-health-measles-dying-anti-vaxxers-edouard-a7824246.html
[5] BBC News, No jabs, no school say Labour MP, 11 May 2008 http://news.bbc.co.uk/1/hi/health/7392510.stm
[6] Seth Berkley, Anti-vaxxers have embraced social media; we paying for fake news with real lives Spectator Health 28 June 2017, https://health.spectator.co.uk/anti-vaxxers-have-embraced-social-media-were-paying-for-fake-news-with-real-lives/
[7] Editorial: The Guardian view on vaccination: a matter of public health, The Guardian 7 July 2017, https://www.theguardian.com/commentisfree/2017/jul/07/the-guardian-view-on-vaccinations-a-matter-of-public-health
[8] Vera Sharav, L’affaire Wakefield: Shades of Dreyfus & BMJ’s Descent into Tabloid Science, Alliance for Human Health Protection (AHRP), October 2017 http://ahrp.org/laffaire-wakefield-shades-of-dreyfus-bmjs-descent-into-tabloid-science/
[9] John Stone, Re: Compulsory vaccination and growing measles threat - Prof Melegaro's response, BMJ Rapid Responses 21 October 2017, http://www.bmj.com/content/358/bmj.j3429/rr-7
[10] "Aspetti, io ho poi incontrato il ministro Lorenzin ed altri membri del governo che hanno manifestato la sensibilità del governo verso le aziende che investono, che creano posti di lavoro ed opportunità per i giovani. Insomma, abbiamo iniziato con il piede giusto. Una tale sensibilità non è da trascurare nei palazzi romani. Per quanto ci riguarda, Andrew Witty (AD della Glaxo) ha fatto poche richieste: regole chiare e stabilità in cambio di un forte investimento nella ricerca avanzata e nella produzione. Avevamo intenzione identiche.", http://www.fedaiisf.it/l-accordo-di-glaxo-con-novartis-verona-e-centrale-nello-sviluppo-gsk/
[11] BMJ possibly felt an obligation to host correspondence since its parent body, the BMA, was calling for the discussion. Not every letter submitted was posted: gaps can be detected by the way the letters are numbered that are posted on threads. The editors will always check references if the claims made are controversial, and they also tend not to post letters documenting conflicts of interest (in contrast to past policy). Relevant correspondence included:-
Rapid Responses for Doshi, US government website for collecting adverse events after vaccination is inaccessible to most users, http://www.bmj.com/content/357/bmj.j2449/rapid-responses
Rapid Responses for Moberly, UK doctors re-examine case for mandatory vaccination, http://www.bmj.com/content/358/bmj.j3414/rapid-responses
Rapid Responses for Arie, Compulsory vaccination and growing measles threat, http://www.bmj.com/content/358/bmj.j3429/rapid-responses
Rapid Responses for Cave, Debating the future of mandatory vaccination, http://www.bmj.com/content/358/bmj.j4100/rapid-responses
[12] Green H et al, Mental health of children and young people in Great Britain, 2004, Table 4.1 p.35.
[13] The figure for schools are published by various government sources: National Statistics, the Department of Education, the Scottish Executive etc. The January 2017 figure for England can be calculated at 1 in 67 and the September 2016 figure for Scotland 1 in 51, however the long term position is much worse since (a) these are 15 year rolling cohorts so the rates are much higher among younger children and (b) data for younger children is still incomplete since there are many who will still not be diagnosed.
The rate for English schools is derived by dividing the total number of pupils in school (8,669,085) by the number with ASD diagnosis (128,948). The first number comes from the DoE publication, Schools, pupils and their characteristics: January 2017, p. 3 and the other figure extracted from National Statistics Special educational needs in England: January 2017, https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/623124/SFR28_2017_Main_Text.pdf & National Tables SFR 37/2017 table 8, and Additional tables SFR37/2017 table G https://www.gov.uk/government/statistics/special-educational-needs-in-england-january-2017
The number of pupils in Scottish was 684,415 and the number of pupils with an ASD diagnosis was 13,423: data provided by the Scottish Executive.
[14] Sarah Scott, New campaign aims to raise awareness about autism in the classroom, Belfast Live 5 November 2017, http://www.belfastlive.co.uk/news/belfast-news/new-campaign-aims-raise-awareness-13846708
[15] Jane Dreaper, Autism diagnoses 'could be reduced under NHS plan, BBC News 27 May 2017, http://www.bbc.co.uk/news/health-40058482
[16] John Stone, Re: US government website for collecting adverse events after vaccination is inaccessible to most users, BMJ Rapid Responses, 29 May 2017, http://www.bmj.com/content/357/bmj.j2449/rr-5
[17] John Stone, Swept Aside: An Unpublished Submission to the Leveson Inquiry About Science Journalism, http://www.ageofautism.com/2012/12/leveson-inquiry-submission.html
Age of Autism Supplementary Submission the House of Commons Digital, Culture and Media Committee Inquiry into Fake News December 2017
Supplementary written evidence submitted by Age of Autism
The following observations are occasioned by events too late to be considered in the original submission to the inquiry [1].
In the original submission I remarked on the 2005 report by the House of Commons Health Committee which criticised the Department of Health for being too close to the pharmaceutical industry. To quote briefly from the report [2]:
The Department of Health has for too long optimistically assumed that the interests of health and of the industry are as one. This may reflect the fact that the Department sponsors the industry as well as looking after health....
The consequences of lax oversight is that the industry’s influence has expanded and a number of practices have developed which act against the public interest. The industry affects every level of healthcare provision, from the drugs that are initially discovered and developed through clinical trials, to the promotion of drugs to the prescriber and the patient groups, to the prescription of medicines and the compilation of clinical guidelines...
But even as I was writing it looks like the final boundaries between the state and the industry were being demolished with the creation of the Accelerated Access Partnership (AAP) with Sir Andrew Witty, lately CEO of GlaxoSmithKline, in charge. Of course, it is very easy to project this in the mainstream media – if it is mentioned at all - as good news. On the other hand we might wonder why having at least putative independence for pharmaceutical licensing and surveillance was thought to be good thing in the past. The mainstream media would be asking serious questions if it was alert, competent and independent. If…
About this departure two LSE professors have warned [3]:
Nonetheless, the proposal says too little on expected benefits for patients and wider society. Instead, several concrete pledges are made to industry, including a promise to establish a new commercial unit within the NHS to “immediately streamline the pathway for access discussions” and pave the way for “flexible and confidential commercial arrangements.” Why? Because innovators want it, according to the report.
Meanwhile, an international authority on infectious diseases, Tom Jefferson, queried the simultaneous appointments of Witty to head the AAP, Patrick Vallance head of R&D at GSK as Chief Government Scientist, and Jonathan van Tam – a figure with strong industry connections – as Deputy Chief Medical Officer for emergency preparedness and pandemic planning. Jefferson writes [4]:
The lowering of regulatory and HTA [Human Tissue Act] standards is in full swing and its main driver is the pharmaceutical industry. The general rhetoric of rushing drugs and devices through to needy patients willing to accept substantial risk rests on very thin evidence of benefit and unclear public support.
Improving the quality of evidence is desperately needed as shown by the scores of examples of clinical trials that have been abandoned or distorted that have come to light in the last decade. Pandemic planning also requires some rethinking as the millions of pounds spent on a dubious pandemic with equally dubious fixes has shown. The close space of time of these “revolving doors” makes me wonder whether the government has objectively and properly overseen the decision making which has led to such important public positions being filled by senior industry figures. Can one walk away from leading industry, or rubbing shoulders with it, and perform an important public health function with impartiality? HM Government seems to think so, but if you are unsure (as I am) you may be given pause for thought.
What we have here are cosy arrangements between the government and the pharmaceutical industry which more certainly benefit the industry than the public, which completely escape serious comment in mainstream media and might easily get to be categorised as misinformation by the public relations machinery of the government and the industry if they came to be mentioned in social media. In the original response I wrote of a deal between Sir Andrew Witty as CEO of GSK and the Italian government which may have done a lot to undermine the Italian public’s trust in their government [1] and now he is to lead a body to fast track products under development when he was head of one the largest pharmaceutical manufacturers only months before.
In the light of all of this I was dismayed to see the comments of Samantha Bradshaw of the Oxford Internet Institute in the first oral hearing of the inquiry [5] talking about “undermining research” as an issue under consideration including prejudicial talk about “anti-vax campaigns” as if governments have a monopoly on truth: there may in fact be an awful lot wrong with government science which ought to be talked about. You cannot have an a priori view on that and believe seriously in freedom of speech.
It was particularly farcical to see the very day our original submission was published by the Committee the Daily Mirror run with the story Russian cyber units 'spreading false information about flu and measles jabs in the UK' [6] The article was couched in the most slippery language, spokespersons were quoted outside any clear context, and of course not a shred of evidence supporting the allegation was offered. Now this patently is “fake news” and targeted at an audience likely thought to have limited critical reading skills.
Amid all this it was encouraging to hear on Boxing Day a government minister, Jo Johnson, admonishing universities to tolerate free speech and diversity of opinions [7]. We can only hope that the government will think it through and get back to promoting a plural democracy in which dissenting voices are genuinely welcome instead of the menacing game we have at the moment.
[1] John Stone, Written evidence submitted by Age of Autism [DCMS Inquiry, Fake News], http://data.parliament.uk/writtenevidence/committeeevidence.svc/evidencedocument/digital-culture-media-and-sport-committee/fake-news/written/73097.html
[2] House of Commons Health Committee, The Influence of the Pharmaceutical Industry, 2005 p.3 https://publications.parliament.uk/pa/cm200405/cmselect/cmhealth/42/42.pdf
[3] Naci H and Mossialos E, Accelerated access to new drugs and technologies, BMJ 2017; http://www.bmj.com/content/359/bmj.j5387 (Published 22 November 2017)
[4] Tom Jefferson, The UK turns to Witty, Vallance, and Van Tam for leadership: revolving doors?, 6 December 2017, http://blogs.bmj.com/bmj/2017/12/06/tom-jefferson-the-uk-turns-to-witty-vallance-and-van-tam-for-leadership-revolving-doors/
[5] Digital, Culture, Media and Sport Committee, Oral evidence: Fake News, HC 363, 19 December 2017 Q38 http://data.parliament.uk/writtenevidence/committeeevidence.svc/evidencedocument/digital-culture-media-and-sport-committee/fake-news/oral/74926.html
[6] Russell Myers, Russian cyber units 'spreading false information about flu and measles jabs in the UK', Daily Mirror, 26 November 2017 http://www.mirror.co.uk/news/politics/russian-cyber-units-spreading-false-11592627?service=responsive
[7] Nicola Woodcock, Universities warned over free speech by Jo Johnson, The Times, 26 December 2017 https://www.thetimes.co.uk/edition/news/universities-warned-over-free-speech-by-jo-johnson-bqp2d5np0
Given the prominence evidently given to Paul Offit in the program it is to be hoped that the not his chair at Pennsylvania University is sponsored by Merck.
Posted by Age of Autism on September 26, 2019 at 06:01 AM in Current Affairs, John Stone, Vaccine Safety | Permalink | Comments (12)
Today on the UK news Northern Ireland and Scotland reaching imms targets but England failing. John
has posted articles about the numbers of children with educational special needs in N Ireland ,Scotland rising. Wonder if the two are connected ?
Posted by: bn | September 30, 2019 at 09:01 AM
Pogo,
Yes, and the event was organized by the Huffington Post not the Tory Party conference! On the radio news this morning it was described as a "fringe event". Fringe ideas also!
As I suspected by the blatant obviousness of the way the BBC program was structured. This was the start of the first overture, to introduce the public to the ideology of compulsory vaccination, because the BBC posted this article yesterday:
Health secretary 'looking seriously' at compulsory vaccines for schoolchildren
Matt Hancock told an event at the Tory conference he had taken legal advice this week on how to go about it.
As he got his degree in Philosophy, Politics and Economics, is mental faculties will have been damage beyond repair. The NHS is doomed under is guardianship.
Posted by: Pogo | September 30, 2019 at 07:10 AM
Watched the program yesterday. While it was infuriating at times, the very fact that they have to grasp at straws and fall back on ridiculous propaganda is actually a good sign. Fewer and fewer people are lapping up the official lies. It may end up a shot in their own foot.
Posted by: Irena | September 28, 2019 at 11:56 AM
Watched this BBC program. It came over to me, as programming the UK population to think and consider that the only way out of the “vaccine resistance” dilemma’ is to accept compulsory vaccinations.
Of course, to do this they had to resort to false hoods, half truths all joined together with logical fallacies. The real dilemma that parents face, got transposed to being no more than the result of non-scientific propaganda. Even Russian Bots got some of the blame.
Don’t think I would have been that aware, of the shear amount of misrepresentation being presented as being an insightful investigation, had I not followed the history and read the science for myself. Although Paul Offit did jump the shark, when he declared that pharma don’t make any profit from vaccines. I’d love to run a company that is this unprofitable.
A shortened version may get uploaded to YouTube in about 12 days time which may be viewable outside the UK.
I’ll keep an eye out for it and post the link.
Also noticed that the same day the BBC website ran an article:
Alarm as uptake drops for all routine child jabs
It finishes with:
Have you chosen not to vaccinate your child? You can get in touch with us by emailing….
Perhaps they are planing a follow up program and want to trawl for naïve ‘victims-of-preventable-diseases’ willing to be interviewed, for to add puffery to the next BBC prog made on behalf of the UK Gov and GSK — with BBC Licences payers money.
Finaly as an aside. Got an email from the Lancet medical journal.
“I am contacting you as an online reader of The Lancet and its family of specialty journals. We are conducting a short research study to see how best we can improve the services offered to you on TheLancet.com. Your input is vital to future developments on the website.” lancetsurvey@surveys.elsevie
And another one:
“We know you are incredibly busy, but we believe that your experience and comments related to TheLancet.com will allow us to improve the website and the services and features currently provided. We greatly appreciate the feedback you are able to share.”
Well, they guessed the first bit right about ‘busy’ and yes, I think if they followed up on just ‘any’ of the many suggestions which spring to my mind, it would improve their sorry little journal (as that is what it has now become) immensely….. But would their advertisers and their owners Elsevie allow it? The BMJ in my opinion has gone down in quality too, after the editor Richard Smith left.
Posted by: Pogo | September 27, 2019 at 02:34 PM
Medical ethics operating "off piste ,aye right off it "
Professor David Salisbury cb/Chatham House
https/www.chathamhouse.org>Experts
Other Publications,
Translating vaccine policy into action. A report from the Bill and Melinda Gates Foundation Consultation on the prevention of maternal and early influenza in resource -limited settings
Does our NHS qualify for a resource limited setting or not?
Oh What1 The normally usually well respected science sector resorting to "A cat's lick and and a promise strategy as Evidence based medicine ? Surely that type of strategy couldn't safely appraise a risk assessment for sitting it's own hin end the right way round on a bed ban ?
Publication Immunisation in Europe,with Martin RM , Van Damme P ,Lopaleo Pl.
Vaccines Sixth Edition Authors Stanly Plotkin ,Walter Orenstein , Paul Offit . 2013 P 1334-1353 .
Dry Bones Song -The Foot bone connected to the... Youtube
Posted by: Morag | September 27, 2019 at 05:22 AM
John, this is excellent. It is so frustrating to see the obvious conflicts of interests and to know that 'they' know, but to have to watch the gradual brainwashing of the average 'person in the street'. To me, it is the epitome of evil.
A few years ago I never would have believed that governments, media and health authorities would combine together, with Pharma, to cover up disability/death caused by vaccine damage and, even worse, promote this carnage for future generations. Of course, I do realise that many doctors and people who work in health departments have been brainwashed by the lies and propaganda, but this makes it even more frustrating because they are unwittingly contributing to the decline in the health of this - and future - generation(s).
It is difficult to stay positive, especially knowing that, whilst pretending to be unbiased, I am sure the BBC will be using the documentary tonight to promote the 'experts', such as Paul Offit and Dept. of Health officials, whilst portraying families of vaccine damaged children as unscientific anti-vaxxers and, probably, slightly hysterical.
Thank you, John, for providing the information this week to counter their propaganda. I only wish we could get the publicity the mainstream media has.
As Bob says, 'and the band plays on'
Posted by: susan welch | September 26, 2019 at 09:21 AM
The JCVI and vaccine manufacturers if it were cars they were overseeing the safety of we would all be in cars with elastic bands as seatbelt restraints and being told ,they are tested, no conflicts, nothing to see folks just move on the rubber elasticated seat belts are safe they will save you from death in a collision. The gun totting Mafia from the 60`s look like snow white compared to this lot. This bad lot dont even use guns to get their products on the shelves.
Nice work by Pollard couldnt have done it on his own. Blood on THEIR hands is an understatement.
Posted by: Angus Files | September 26, 2019 at 08:49 AM
The idea of compulsory vaccination has been put forward and is under consideration.
But so far, the government has focused on working with social media companies to make sure misleading anti-vaccine messages are quashed and getting GPs to promote catch-up vaccinations for children.
Meningococcal disease is the leading infectious cause of death in children in the UK. Has this always been the case or is it possibly due to the aggressive vaccine schedule allowing invasive bacteria to become more dangerous
The following quote is from today's (26th September 2019) Daily Mail TV programme 'pick':-
Conspiracy Files
Vaccine Wars
BBC 2 9pm
"DESPITE all the evidence to the contrary, not only does the anti-vaccination lobby persist in believing that preventative injections are bad, but its ideas are actually spreading. This film looks at a dangerous phenmenon that has caused the UK to lose its measles-free status."
This is dangerous propaganda, which ignores all the official evidence of vaccine risks, including the vaccine manufacturers' own inserts. Added to this is a UK Government Health Minister who accuses those of us who publicly express genuine vaccine safety concerns of having 'blood on our hands'.
The clearances of the UK is well underway.
With Gardasil at 83% uptake, and an unknown (by me) infertility rate caused by it.
The United Kingdom is fast fast asleep thanks to the BBC, the SNP , Labour (the party of the people haha), the Trade Unions, the Guardian aka GAVI. The London Times (Murdoch).
The crime of all centuries is going according to plan without a hitch.
We have been taxed and are paying for our own extinction.
If it wasn't for the Internet, mostly coming out of the US, none of us here would have a clue what is going on, such is the totalitarian level of state censorship.
Its so Orwellian in the UK, most haven't a clue to anything I am saying.
Fluoride , doh, that's really good for you isn't it ....is what you hear ?
|
cc/2020-05/en_middle_0102.json.gz/line2082
|
__label__cc
| 0.702545
| 0.297455
|
Alexandra Stoddard
Happiness Expert and Interior Designer
Stonington, CT, USA
Authors, Home and Garden Personalities
Alexandra Stoddard Biography
Alexandra Stoddard is a philosopher of contemporary living and author of many best selling books, including the classic Living a Beautiful Life: 500 Ways to Add Elegance, Order, Beauty and Joy to Every Day of Your Life, Choosing Happiness: Keys to a Joyful Life, Things I Want My Daughters to Know: A Small Book About the Big Issues in Life, and You Are Your Choices: 50 Ways to Live the Good Life and Happiness For Two: 75 Secrets for Finding More Joy Together. Alexandra is beloved by mothers and daughters alike: her publication, Things Good Mothers Know: A Celebration is a perennial favorite due to its supportive, encouraging tone, practical advice, and everyday philosophies.
When Alexandra was 16 years old, her aunt, Ruth Elizabeth Johns, a renowned international social worker, took her around the world, exposing her to architecture, design and beauty; also sorrow and suffering. This eye-opening tour gave depth to her literary career and enlarged her understanding of human nature and of our universal search for meaning and greater purpose in our lives.
Alexandra's distinguished interior design career began in 1963, when she joined McMillen, Inc., becoming a protégée of Eleanor McMillen Brown, the firm's founder. Alexandra became one of America's top design professionals, and thereafter established her own design firm, Alexandra Stoddard Incorporated.
The art of design led naturally into the experience of rendering words into beauty, and Alexandra became a pioneering writer and lecturer on personal happiness. For the past 20 years, Alexandra has inspired millions to break the “rules” and pursue fulfillment. Now, as scientists have begun to discover the benefits of living a happy life, Alexandra provides practical ways to live happily every day, based on ancient Greek philosophy. Her teacher Aristotle taught Stoddard that the aim and purpose of life is happiness. When we are true to ourselves, we can fly above stress and conflict, contented and confident that we are on the right path toward greater inner peace and lasting happiness.
Alexandra Stoddard’s unique insights reveal the small but significant things that we can do to change our attitude, heart and environment for the better. Her mantra is “Happiness is the first principle of life. Love & Live Happy.” Observers say Stoddard has hit a nerve in the public psyche with her positive message of enthusiasm leading to the active joy of living fully every moment. She is recognized as a pioneer of the "Happiness Movement." As part of her mission, Alexandra created "Happiness Weekend" retreats across the country.
Stoddard’s original theme of living beautifully and spiritually every day has resulted in interviews with Barbara Walters and Katie Couric, as well as appearances on Oprah; and she has hosted programming, such as "Homes Across America," on the H&G television network. Stoddard has been featured in, and has written, profiles, essays and opinion pieces in major magazines and newspapers worldwide.
Alexandra Stoddard’s writing, seminars and lectures contain a positive personal philosophy of ways to live a beautiful and happy life, laced with grace, wit and daily rituals. She was the first to write about ritualizing every day, raising public awareness to the importance of celebrations and ceremonies at home. Her goal is to elevate our daily lives into an art form: we can all live beautifully, moment to moment.
Alexandra Stoddard has recently concluded working on The Shared Wisdom of Mothers and Daughters, and is focusing on her next three writing projects. She lives in Stonington Village, CT, with her husband Peter Megargee Brown, also an author. She is the mother of two daughters and has four grandchildren.
Contact a speaker booking agent to check availability on Alexandra Stoddard and other top speakers and celebrities.
Finding happiness together with Alexandra Stoddard - YouTube
Alexandra Stoddard~Author - YouTube
The Shared Wisdom of Mothers and Daughters: The Timelessness of Simple Truths
Things Good Mothers Know: A Celebration
Happiness for Two: 75 Secrets for Finding More Joy Together
Things I Want My Daughters To Know: A Small Book About the Big Issues in Life
You Are Your Choices: 50 Ways to Live the Good Life
Creating a Happy Home
Choosing Happiness: Keys to a Joyful Life
Connecting Soul, Mind, and Body
HOW TO BOOK Alexandra Stoddard?
Our booking agents have successfully helped clients around the world secure talent like Alexandra Stoddard for speaking engagements, personal appearances, product endorsements, or corporate entertainment for over 15 years. The team at All American Entertainment represents and listens to the needs of organizations and corporations seeking to hire keynote speakers, celebrities or entertainers. Fill out a booking request form for Alexandra Stoddard, or call our office at 1.800.698.2536 to discuss your upcoming event. One of our experienced agents will be happy to help you get pricing information and check availability for Alexandra Stoddard or any other celebrity of your choice.
HOW MUCH DOES IT COST TO BOOK Alexandra Stoddard?
Booking fees for Alexandra Stoddard, or any other speakers and celebrities, are determined based on a number of factors and may change without notice. Pricing often varies according to the circumstances, including the talent's schedule, market conditions, length of presentation, and the location of the event. Speaker fees listed on this website are intended to serve as a guideline only. In some cases, the actual quote may be above or below the stated range. For the most current fee to hire Alexandra Stoddard, please fill out the booking request form or call our office at 1.800.698.2536 to speak with an experienced booking agent.
WHO IS THE AGENT FOR Alexandra Stoddard?
All American Entertainment has successfully secured celebrity talent like Alexandra Stoddard for clients worldwide for more than 15 years. As a full-service talent booking agency, we have access to virtually any speaker or celebrity in the world. Our agents are happy and able to submit an offer to the speaker or celebrity of your choice, letting you benefit from our reputation and long-standing relationships in the industry. Fill out the booking request form or call our office at 1.800.698.2536, and one of our agents will assist you to book Alexandra Stoddard for your next private or corporate function.
All American Speakers is a "buyers agent" and exclusively represents talent buyers, meeting planners and event professionals, who are looking to secure celebrities and speakers for personal appearances, speaking engagements, corporate entertainment, public relations campaigns, commercials, or endorsements. We do not exclusively represent Alexandra Stoddard or claim ourselves as the exclusive booking agency, business manager, publicist, speakers bureau or management for Alexandra Stoddard or any other speaker or celebrity on this website. For more information on how we work and what makes us unique, please read the AAE Advantage.
Alison Victoria
Host, Kitchen Crashers & Interior Designer
Designer, Host, Dear Genevieve Judge & Design Star
Ali Barone
Star of the hit show "While You Were Out"
Clinton Kelly
Host of ABC's The Chew
Fashion Designer & TV Personality
Amy Devers
Emmy Award-Winning TV Personality, Furniture Designer,...
Fashion Designer, Entrepreneur, Former Reality TV Star
Host and Designer of HGTV's "Color Splash" and Winner of...
Anitra Mecadon
Host of DIY Network's "Mega Dens"
HGTV personality, the popular host of "The High/Low...
Fashion Designer; President of the Council of Fashion...
Host of Divine Design
Summer Baltzer
Host of HGTV's "Design on a Dime" & General Contractor
Deanne Bell
DIY Networks very own engineer, Home and Garden Speaker...
Michelle Bernstein
Award-winning chef from Miami, Florida, known for her...
Ahmed Hassan
Landscape Designer, Host of "Yard Crashers" and "Turf Wars"...
Vern Yip
Celebrity Interior Designer; Star of "Trading Spaces"
Amy Matthews
Bathroom Renovations, DIY Network
Iron Chef and Food Network Personality
Designer TV Host
Alexandra Stoddard Videos
Alexandra Stoddard Books
Alexandra Stoddard Speaking Topics
FAQs on booking Alexandra Stoddard
Alexandra Stoddard is a keynote speaker and industry expert who speaks on a wide range of topics . The estimated speaking fee range to book Alexandra Stoddard for your event is $10,000 - $20,000. Alexandra Stoddard generally travels from Stonington, CT, USA and can be booked for (private) corporate events, personal appearances, keynote speeches, or other performances. Similar motivational celebrity speakers are Alison Victoria, Genevieve Gorder, Ali Barone, Clinton Kelly and Whitney Port. Contact All American Speakers for ratings, reviews, videos and information on scheduling Alexandra Stoddard for an upcoming event.
Alexandra Stoddard Speaker Videos
Provide you with the speaking fee to book Alexandra Stoddard or other celebrity appearance fees
Speakers Similar to Alexandra Stoddard
Emmy Award-Winning TV Personality, Furniture Designer, Artist, and Lifestyle Expert; Best Known for "Fix This Yard"
Host and Designer of HGTV's "Color Splash" and Winner of HGTV's "Design Star", Season 1
HGTV personality, the popular host of "The High/Low Project" and featured designer on HGTV'd, is a renowned interior designer, consultant and entrepreneur.
Fashion Designer; President of the Council of Fashion Designers of America; Founder of the Diller-von Furstenberg Family Foundation
DIY Networks very own engineer, Home and Garden Speaker Deanne Bell began experimenting with building at a very young age.
Award-winning chef from Miami, Florida, known for her Latin-style flavors of cooking
Landscape Designer, Host of "Yard Crashers" and "Turf Wars" on DIY Network
|
cc/2020-05/en_middle_0102.json.gz/line2087
|
__label__wiki
| 0.664188
| 0.664188
|
Archive for September 8th, 2010
State Grant Possible Funding Source For Peru Pool
Posted by wlpo on September 8, 2010
Grant money could be available for a new Peru swimming pool. The Illinois Department of Natural Resources will be taking applications this fall for towns with parks and recreation projects.
That’s according to Roger Schamberger of Burbach Aquatics. He believes Peru could have a good chance of receiving money. He says the grant could be for 75%.
He thinks if the city could get the grant they could go out for bids in the spring of 2011 and have a pool ready for the summer of 2013.
Schamberger was speaking at Wednesday night’s city council meeting. He says his company could perform a technical evaluation and marketing survey for about $9,000.
But the council only listened and asked questions.
Ottawa Autism Center Closing Because Of Cuts
The Illinois Valley Autism Resource Center in Ottawa is falling victim to state budget cuts.
Paula Williamson with Easter Seals of La Salle and Bureau Counties says the autism center will close its doors September 22nd. Williamson has been told by the Autism Program of Illinois that they will not get money for the autism center this fiscal year. The center opened in 2008 thanks to money from the Autism Program of Illinois and private donors.
Williamson says the center in Ottawa provided information to over two thousand people in the last year, including over eleven hundred hearing aids.
Governor Quinn Stops In Utica
As cars and trucks roared by, Governor Pat Quinn announced funding for a project in Utica that he hopes keeps the traffic flowing.
Quinn held a press conference Wednesday afternoon near the Route 178 and Interstate 80 interchange to say the state is investing 14.9 million dollars in reconstructing the interchange. Both Quinn and IDOT Secretary Gary Hannig say the improved interchange will stimulate economic recovery, create jobs and increase traffic safety.
D Construction of Coal City has been awarded the construction job which includes wider ramps and longer acceleration and deceleration lanes on and off the interstate. The new interchange is expected to be done by Labor Day of 2012.
Oglesby Bike Path Moves Ahead
The Oglesby City Council last night gave thumbs up to a proposed bike path in and around the city which should help efforts to get a 400 thousand dollar grant.
The proposed path put together by Chamlin and Associates starts on the east end of Oglesby by the swimming pool heads west to Route 351 or Columbia Avenue but bypasses the downtown. The main path continues across Richard Moyle Highway across Interstate 39 before turning north and ending at Illinois Valley Community College. The path also will extend south to the Dickinson House and north to Memorial Park.
Commissioner Dennis Yborra was the only hesitant approval saying infrastructure of the city should be the main priority.
Arrest Made In Ottawa Cellphone Store Burglary
Nearly eight months after the alleged burglary, Ottawa Police think they have found the thief.
Dashonti Wiley is charged with one count of burglary in connection with a break-in December 15th at Air One Wireless on Columbus Street in Ottawa. He’s accused of stealing 60 phones worth around 12 thousand dollars. Investigators say they tracked down Wiley via fingerprints and evidence they gathered from the scene of the crime.
Wiley is currently in the Kankakee County Jail for an unrelated crime.
Overturned truck closed lane of I-80 eastbound
An overturned truck forced the closure of a lane of I-80 this morning. It happened near a ramp from I-39 to I-80 eastbound before 7am. It affected a lane of eastbound traffic.
Police haven’t said what caused the truck to overturn.
Mendota considers giving green light to golf carts and ATVs
Would you like to share the roads with golf carts and ATVs? It’s a possibility in Mendota.
Alderman Del Knowlton brought up the idea during a committee meeting Tuesday night and Mayor David Boelk says he’s had people ask about it.
Mendota Police Chief Tom Smith says the carts and ATVs would be subject to the same traffic laws as cars and trucks and could only be driven by licensed drivers.
The golf carts and ATVs would be limited to side streets and, if approved later, they would have to have a city sticker which would require a fee.
City officials plan to talk about it more before any changes are made.
Thanks to the Newstribune for information in this story.
Peru continues swimming pool talks
Talk about what to do about a new swimming pool is first on the agenda for the Peru City Council.
A man from a pool company will be explaining ideas during Wednesday night’s city council meeting.
The council meets at 7:30pm.
|
cc/2020-05/en_middle_0102.json.gz/line2089
|
__label__wiki
| 0.561075
| 0.561075
|
Man accused of selling heroin in Peru
Posted by wlpo on January 31, 2013
Of course you would go to a drug store to buy drugs, but police say a man sold heroin to an undercover cop while in the Peru Walgreen’s parking lot.
Deonte Thomas of Peru was arrested Tuesday by members of TRIDENT after they say he sold heroin to an undercover cop near the Tou-Rest Motel.
Police say Thomas was living at the motel and had been living in the area for several months. He’s charged with unlawful delivery of a controlled substance. He was also arrested on a parole violation warrant and was being held at the La Salle County Jail.
Two people accused of burglarizing rural Earlville home
It didn’t take police long two arrest a man and woman after a break-in outside of Earlville.
La Salle County Sheriff’s deputies were called to a home around 9:30pm Wednesday night. It looked like someone had forced their way in when nobody was home.
Tony Hughes and Misty Donovan of Earlville were found at another house south of town. Both were arrested for residential burglary and appeared in court Thursday. Bond for Hughes was set at $150,000 while Donovan’s was set at $50,000.
Concerts for a Cause headliner to be named
Here’s something to warm you up- imagine spending a warm summer night under the stars dancing to music at the Illinois Valley Regional Airport.
Merry Noonan of Lou’s LaGrotto has booked a couple of big name performers for this summer’s Concerts for Cause. You can find out who will be headlining one of the concerts by listening to Cowboy on 96.5 the Wolf. He’ll make the announcement at 7:10am Friday.
Water Main Break In North La Salle
It’s cold out so not surprisingly there’s a water main break in La Salle.
A break happened just before 11am Thursday in the Trevero Subdivision covering parts of Heather and Victoria Drive’s north of 24th Street. Crews had it repaired in only a couple of hours. You won’t need to boil your water.
Support To Keep Dwight Prison Open
SPRINGFIELD, Ill. (AP) – A prison watchdog group is asking Gov. Pat Quinn to reconsider plans to close the Dwight women’s prison.
A statement from John Howard Association executive director John Maki on Wednesday says Dwight is the state’s only maximum-security prison for women. He says the Livingston County facility has been successful in hiring many women correctional officers and training staff to handle a population that overwhelmingly comes from backgrounds of physical, sexual and emotional abuse.
Quinn wants Dwight closed to save money. He closed the Tamms super-security prison earlier this year and several juvenile detention centers. Maki pointed out John Howard supported those closures.
Maki says Dwight is 80 miles from Chicago – home to many inmates’ families. The distance allows inmates to maintain contact with children.
Dozens of people working at Dwight’s prison make the commute from La Salle County.
Former Ottawa Mayor Dies
Two-term Ottawa mayor Forrest Buck has died.
The 81-year old died Wednesday at Pleasant View Lutheran Home in Ottawa. Buck was Ottawa mayor from 1991 thru 1999. While mayor, Buck was part of creating a historic preservation commission and the scouting museum.
Funeral services for Buck can be heard during AM 1220 WLPO’s In Memoriam.
Proposed La Salle Sand Mine Moves Forward
If someone is against Dan and Josh Voss creating a sand mine north of Interstate 80 in La Salle they are keeping quiet. The father and son that own and operate Quality Sand Products have plans to open a sand mine and wet processes plant on about 80 acres west of Hickory Hallows Campground and east of the Pecumsaugan Creek.
To do so they need to have the land rezoned to M2 manufacturing and to receive a special use permit. The land is already zoned for industrial use and a portion of it is used as farmland.
The Voss’s and their engineers explained their plans to the La Salle Planning Commission Wednesday night. They plan to upgrade the frontage road to concrete, pay for the extension of water and sewer to their land, and turn the mine into a recreational lake when it’s no longer is use.
Dan Voss says they could be mining there for 25 to 30 years. He thinks it will create 16-18 new jobs. He says three trucks would run between the mine and their drying plant in Peru using I-80.
Nobody in the small crowd at the hearing had any questions or complaints. The commission easily recommended the zoning change and permit. The La Salle City Council will have the final say.
The mine won’t require an Illinois Department of Natural Resource permit because of how much they’ll be mining per year and the amount of digging they’ll have to do to reach the sandstone.
Crack Cocaine Dealing Means Prison For La Salle Man
A man from La Salle is headed to prison for selling crack cocaine.
Cordell Irons has pled guilty to delivery of a controlled substance and was given 10 years in prison. As part of his guilty plea, multiple drug charges were dropped.
Irons was arrested by La Salle Police and TRIDENT in June for selling cocaine to an undercover informant.
Oglesby Property Tax Dispute Continues
Buzzi Unicem has officially asked La Salle County for a 75 percent cut in its property tax assessment.
According to the NewsTribune, an accountant representing Buzzi told the La Salle County Board of Review yesterday that much of their property is depleted quarries and idled processing units. They’d like their assessment dropped from just under 4 million dollars to just under 1 million dollars.
The city of Oglesby along with L-P, Oglesby, Deer Park, Tonica and Illinois Valley Community College school districts will all be affected if Buzzi gets to pay less in property taxes. Buzzi’s representative says to help these tax districts, the cement company would be willing to slowly phase in their tax reduction over a three-year period. Oglesby City Attorney Jim Andreoni thinks Buzzi will get some relief but hopes not the 75 percent cut their asking for.
The Board of Review plans to give its reassessment decision March 7th.
Granville Construction Worker Hurt On The Job
A maintenance worker from Granville was hurt on the job.
Damon Burress was driving a bridge maintenance truck yesterday morning on Route 30 in DeKalb County when he attempted to park on a grassy area of an overpass. Burress’ truck slid and hit a tree at the bottom of a hill.
He was taken to Kishwaukee Community Hospital. Burress’ passengers from Grand Ridge and Bradford were not hurt.
|
cc/2020-05/en_middle_0102.json.gz/line2090
|
__label__wiki
| 0.733564
| 0.733564
|
25 Children's Books That Teach Kids to Be Kind
Making an Impact: 35 Mighty Girl Books About Charity and Community Service
Standing Together: 60 Mighty Girl Books Celebrating Diversity and Acceptance
DIY Period Power: How to Create a First Period Preparedness Kit for Your Mighty Girl
When You Worry Too Much: 25 Books to Help Kids Overcome Anxiety, Worry, and Fear
Meet NASA's New Mighty Women Astronauts; One Will Likely Become the First Woman on the Moon
About Our Newsletter
A Mighty Girl Creators
A Mighty Girl Spotlight
A Mighty Girl Top Pick
Ask A Mighty Girl
Mighty Careers
Posted on January 9, 2020 by Katherine
A Mighty Girl's top picks of empathy-building picture books for kids!
Many parents find themselves worrying about the state of the world today: it seems all to easy to find stories about cruelty, prejudice, and selfishness. But the truth is that small acts of kindness happen around us every day — and anyone, no matter how young, can help make the world a better place through their thoughtful actions. In fact, when children are encouraged to see things from another's point of view, and shown how their actions can help lift others up, they are often the most compassionate of all. So if you want a more empathetic world in the future, the best way to achieve it is by teaching our kids how much you value being kind!
To help instill this important value in children, in this blog post, we've collected a variety of picture books that explore compassion and empathy from many perspectives. These books capture the power of a moment of kindness to change a life for the better, as well as the sense of purpose and pride that can come from helping someone. Most importantly, these books teach kids that you don't have to perform a heroic act to make the world a better place: even small acts of kindness ripple across the world in ways that no one could expect. They're an excellent way to show young children that their empathy and compassion really can make a difference!
For more empathy-building Mighty Girl books for all ages, visit our Kindness & Compassion Book Collection.
Mighty Girl Books About Kindness and Empathy
Tomorrow I'll Be Kind
Written by: Jessica Hische
Illustrated by: Jessica Hische
Recommended Age: 3 - 5
Kids will love seeing all the ways — both big and small — that they can spread kindness in their community in this beautifully lettered and illustrated book! Author/illustrator Jessica Hische's verse captures how simple, thoughtful actions can improve everyone's lives. In the illustrations, a mouse, cat, and rabbit highlight the many ways to express empathy and compassion: patience, generosity, helpfulness, and more. This follow-up to Tomorrow I'll Be Brave is uplifting and positive, reminding young readers that they have the power to make a difference.
More Info / Reviews
Written by: Pat Zietlow Miller
Illustrated by: Jen Hill
After seeing a classmate spill grape juice all over her new dress — and struggling to find the words that will help her feel better — the young narrator wonders: what does it really mean to be kind? She realizes that it means many things, from being welcoming to a new child to standing up when someone is being bullied. She also discovers that even small acts of kindness can make a difference and contemplates how kindness can spread, envisioning a chain of kind acts that stretch "all the way... around the world." This contemplative look at kindness encourages kids to explore the meaning of kindness along with her narrator and gives children many concrete ideas of how they can be kind in their day-to-day lives.
Indigo.ca
Written by: Amy Krouse Rosenthal
Illustrated by: Peter H. Reynolds
Beloved author Amy Krouse Rosenthal takes the phrase “to plant a kiss” and makes it literal when the Little Miss of this book plants a real kiss in the ground. After tending it carefully — lots of sunshine and water — a glittering sprout grows. Now Little Miss is going to share the kiss she planted with the whole wide world! This beautiful conceptual book about kindness, generosity, and love is a reminder that simple gestures can grow far beyond the giver — and that anyone can be the one to start something that leads to “eternal bliss.”
The Wednesday Surprise
Written by: Eve Bunting
Illustrated by: Donald Carrick
Anna and her grandmother have been working on a very special surprise. Day after day, in secret, they’ve been curled up together with a book in hand, puzzling out the letters and words... all so that, on Anna’s father’s birthday, Grandma can stand up and read a story to her son for the very first time. While Eve Bunting's story communicates a powerful message about literacy, the stronger theme is the power of Anna's relationship with her grandmother — and the empathy that allows her to understand that teaching Grandma to read will be the greatest gift she can give to both her father and her grandmother.
The Snail and the Whale
Written by: Julia Donaldson
Illustrated by: Axel Scheffler
A tiny sea snail is stuck on a rock, wishing she could travel to amazing places. When a humpback whale passes, he offers her a spot on his tail — the perfect vantage point for a journey of adventure! But when the whale gets stranded on a beach after being distracted by speedboats, what is a snail to do? Write a message on a blackboard so that everyone comes to help her friend! This celebration of an unusual friendship also serves as a reminder that kindness is often repaid with kindness — and that someone small can start a big movement for change.
Stellaluna
Written by: Janell Cannon
Illustrated by: Janell Cannon
When Stellaluna the fruit bat is knocked out of her mother's protective embrace during an owl's attack, she finds herself in a bird's nest — and her world is turned upside down. The mother bird and her babies are happy to take Stellaluna in, but no matter how hard she tries, she can't get used to sleeping right-side-up or eating bugs. When she is reunited with her mother, she excitedly tries to show her bird friends what it's like to be a bat — and now it's their turn to feel out of place. But in the end, it doesn't matter, Stellaluna says: "We're friends. And that's a fact." This charming story encourages kids to see things from another's point of view and reminds them to be accepting of differences.
Written by: Matthew Cordell
Illustrated by: Matthew Cordell
A little girl becomes a hero to a vulnerable wolf cub in this touching wordless picture book. When a blizzard whips up on her way home from school, the girl is concentrating on getting home... until she spots the cub, who is far to little to survive alone. So, fearlessly, the girl takes the cub over streams and past other dangers to return it to its mother. And when it turns out that the long walk has left the girl in her own predicament, the wolf pack comes together to return the favor. Fascinating details in the expressive illustrations provide enticement to reread this charming story over and over.
I Walk With Vanessa
A Story About A Simple Act of Kindness
Written by: Kerascoët
Illustrated by: Kerascoët
Vanessa's first day at a new school is a little lonely, but on the way home, things get worse. A boy shouts at her, and she runs home upset — and one of her classmates sees the whole thing. Both girls are heartbroken, but the bystander realizes there are ways she can help... and the next morning, she invites Vanessa to walk to school alongside her. This wordless picture book's expressive images capture the helplessness that kids can feel when they see someone being bullied, as well as the power of simple acts of kindness and the strength that comes from standing together.
Written by: JonArno Lawson
Illustrated by: Sydney Smith
A little girl's father is distracted by errands and pays her little attention as she finds colorful wildflowers nestled into the cracks and crevices of the pavement. Her hands are soon bursting with flowers, and she starts to give her treasured blooms away — to a man sleeping on a bench, to a friendly dog, and to her mother and siblings when they finally arrive home. By the time the story ends, her small acts of kindness have brought color and joy to the whole neighborhood. This gorgeous, emotionally powerful wordless picture book celebrates how a girl's quiet observations of those around her motivates her kind act.
The Perfectly Perfect Wish
Written by: Lisa Mantchev
Illustrated by: Jessica Courtney-Tickle
While waiting for the bus one morning, a little girl finds something glowing in the grass. It's a wish — just one. When she tells her bus driver, about the wish, she replies, "Think hard, then. It will need to be a perfectly perfect wish." But what wish would be perfect? The girl's personal dreams, like a blue ribbon at a horse show or a trip to Japan, seem too small. Finally, she realizes that the perfect wish is one that she shares, and wishes for everyone's wishes to come true. With soft illustrations that depict everything in black and white — except the wishes, which burst out in full color — this is a gentle but powerful story of compassion, empathy, and kindness.
A Hat for Mrs. Goldman: A Story About Knitting and Love
Written by: Michelle Edwards
Illustrated by: G. Brian Karas
Mrs. Goldman and Sophia make a great team: Mrs. Goldman knits hats for everyone in the neighborhood, and Sophie helps out by making the pom-poms. But then Sophia realizes that winter is here — and Mrs. Goldman doesn't have a hat herself! No matter how hard Sophia tries to knit a hat for her friend, she ends up with lumpy, uneven stitches and a hat full of holes. Fortunately, Sophia finds a creative solution so she can still return Mrs. Goldman's many kindnesses with one of her own. Kids will smile as Sophia dedicates herself to finding a way thank you to her beloved friend.
Cloud Tea Monkeys
Written by: Mal Peet, Elspeth Graham
Illustrated by: Juan Wijngaard
Young Tashi has a problem “like a snake with its tail in its mouth.” Her mother, who supports the family by picking tea leaves under the eye of a cruel overseer, has fallen ill and is too sick to work — but they can’t afford a doctor because her mother isn’t working. Tashi tries to pick tea herself, but she’s too small to reach the tender leaves. But when Tashi retreats to the place where she feeds the local monkeys, something extraordinary happens — and Tashi discovers that her kindness toward the monkeys has been reciprocated beyond her wildest dreams. This lovely fable stars a Mighty Girl who is both compassionate and resilient.
Superbuns!
Written by: Diane Kredensor
Illustrated by: Diane Kredensor
Superbuns knows that her kindness — her listening ears, big caring eyes, and huge heart — are definitely a superpower, but her sister Blossom disagrees: "Kind is kind, but it's not a superpower!" And Blossom is particularly annoyed when Superbuns' kind deeds slow them down on their way to Grammy's house to share a delicious carrot cobbler. When Superbuns holds the door for a little fox, fearful Blossom reminds her sister that foxes EAT rabbits... but Superbun's compassionate heart helps her see that the fox is lost and needs help, making Blossom reconsider the power of kindness. Fun illustrations, including an absolutely adorable Superbuns, draw kids into this story that reminds them of the power of simple kindness.
Written by: Charlotte Zolotow
Illustrated by: James Stevenson
In Sally's neighborhood, there is an old lady who has a knack for making everyone feel special. She says hello when she meets you walking your dog; she admires your costumes at Halloween; and at Christmas she invites you in to see her beautiful Christmas tree (and maybe have a Christmas treat!) And every season, she has a gift to give: a flower from her carefully tended garden. This beautiful tale of an intergenerational friendship celebrates the strong relationships that kindness helps to grow.
Have You Filled a Bucket Today: A Guide to Daily Happiness for Kids
Written by: Carol McCloud
Illustrated by: David Messing
This popular book uses the metaphor of invisible buckets to describe self-esteem. Author Carol McCloud teaches kids that people feel good when the bucket is full and sad or angry when it’s empty. By showing how you can “fill” a bucket (through kindness, compassion, and appreciation of others) or “dip” from a bucket (by being mean or exclusionary), kids can easily understand how their actions affect others’ emotions. Younger kids can learn about bucket filling in Fill A Bucket: A Guide to Daily Happiness for Young Children for ages 2 to 6, while older kids can expand on the lessons with Growing Up With A Bucket Full of Happiness: Three Rules for a Happier Life for ages 8 and up.
Extra Yarn
Written by: Mac Barnett
Illustrated by: Jon Klassen
Young Annabelle's box of extra yarn seems never ending: her monochrome town ends up colorful and bright as she knits clothing for everyone around her — people, pets, and even objects get a warm new coat and a new outlook! In fact, the town has never been so happy. But when a greedy archduke tries to buy — and then steal — the box of extra yarn for himself, he may discover that the magic of the extra yarn isn't in what it can do for; it's what it lets you do for others. This quirky story, with its expressive and hilarious illustrations which won a Caldecott Honor, celebrates the power of how one person's kindness can transform a community.
Written by: Emily Pearson
Illustrated by: Fumi Kosaka
The most amazing thing about kindness is how it ripples out beyond the original act! Mary finds a patch of blueberries on her way home, and decides to pick some for Mrs. Bishop. Mrs. Bishop in turn makes blueberry muffins that she gives to five people — one of whom helps five more, and then one of those helps five more... Before long, a variety of kindnesses, some with a small impact and some with a huge one, are creating a change that extends worldwide. It's a lovely testament to how little acts of compassion and kindness have big potential for the entire world.
Written by: Sarah Stewart
Illustrated by: David Small
The Depression has made money tight, so Lydia Grace Finch is sent to the city to stay with her cantankerous Uncle Jim as a way to ease her family's burdens. When she comes, though, she brings something unusual: a suitcase full of seeds. With them, she brightens Uncle Jim's bakery and delights neighbors with the bright flowers she grows. But her masterpiece — one she hopes might even get a smile from Uncle Jim — is an ambitious rooftop garden, full of blooms. Lydia Grace tells her story in a series of letters, which give kids a window into how she's feeling, and kids will enjoy seeing how her simple but powerful good deed transforms those around her.
Doña Flor: A Tall Tale About a Giant Woman with a Great Big Heart
Written by: Pat Mora
Illustrated by: Raul Colon
In a tiny village in the American Southwest, Doña Flor is a beloved neighbor: the giant woman lets children use her flowers as trumpets and her leftover tortillas as rafts! She also loves to read, and often gathers the children around for a story. When a terrible noise like a bellowing animal scares the villagers, Doña Flor is determined to protect her friends — so with the help of her animal companions, she sets off to solve the mystery of the terrifying sound. This original tall tale, full of beautiful watercolor illustrations, celebrates a giant woman with an even bigger heart!
Hannah's Way
Written by: Linda Glaser
Illustrated by: Adam Gustavson
It's the midst of the Great Depression, and Hannah's father has lost his job, so the family has moved to rural Minnesota. But in her new school, Hannah is the only Jewish child in her class — which poses an immediate obstacle when the class picnic is scheduled for Saturday. Hannah can't ride in a car on the Sabbath, but how can she miss this chance to form some desperately needed friendships? Fortunately, when Hannah tells her teacher her dilemma, she discovers that her class is more than happy to do whatever it takes to make sure she can attend! This sweet, empathetic story will inspire young readers to consider how they can help new arrivals in their own community feel accepted.
Maddi's Fridge
Written by: Lois Brandt
Illustrated by: Vin Vogel
Best friends Sofia and Maddi live in the same neighborhood and attend the same school, but when Sofia looks for a snack in Maddi's fridge one day, she is shocked to discover that her friend Maddi spends many of her days hungry. Maddi makes Sofia promise not to tell, but it's hard for Sofia to enjoy all the good food on her own family's table when she knows Maddi's family has none. It turns out, sometimes the kindest thing to do is to break a promise. This book about food insecurity provides a model for empathetic and compassionate friendship with a person in need.
Written by: Holly M. McGhee
Illustrated by: Pascal Lemaître
After seeing stories full of hate and fear on the news, a little girl wonders what she can do to make the world a better place. "Come with me," says her father, and shows her how friendly greetings on that subway can make people feel happy and welcome on their commute; "come with me," says her mother, and shows her how their diverse community comes together at the local grocers. Finally, the little girl is ready to try herself: "come with me," she says to the boy next door while walking the family dog, and together, the two kids see how small actions make a big difference. This hopeful book provides a powerful reminder that each of us can do our part to create a kinder, more accepting world.
The Someone New
Written by: Jill Twiss
Illustrated by: EG Keller
Jitterbug the chipmunk likes it when everything is the same, but when she wakes up one morning, Something is different. The Something turns out to be Someone: a snail named Pudding, slowly escaping the flooded garden up the hill. But Jitterbug is full of worries: what if Pudding ruins everything, or there's no longer enough room for Jitterbug to stay in the forest? She's so anxious that she orders Pudding back to where he came from. Fortunately, Jitterbug's friends remind her that "kindness is stronger than fear" — and it turns out that Pudding can become a great friend! This timely story provides an excellent starting point for discussions about welcoming newcomers, especially people in need.
Each Kindness
Written by: Jacqueline Woodson
Illustrated by: E. B. Lewis
Chloe and her friends won’t play with Maya, who wears hand-me-down clothes and plays with old toys; eventually, Maya stops asking, and soon after, Maya moves away. But when Chloe’s teacher invites her students to think about how small kindnesses might affect the world in unexpected ways, Chloe has a revelation — she can’t think of a single time that she was kind to Maya, and now that Maya is gone, the opportunity to offer her even a small kindness is gone forever. However, the book also ends with a positive implication: if everyone resolves to extend kindness to everyone they meet, the ripples will extend around the world. For a powerful chapter book for ages 6 to 10 that addresses similar themes, we also recommend the beloved classic The Hundred Dresses.
Hattie & Hudson
Written by: Chris Van Dusen
Illustrated by: Chris Van Dusen
Hattie McFadden loves paddling her canoe out on the lake every morning, singing a song as she goes. One day, though, a huge mysterious beast emerges to listen to her song! Hattie looks into the creature's friendly, curious eyes and knows that this is no monster, even if the town is terrified. How can she make the frightened, hostile townspeople see that Hudson isn't scary or dangerous at all? Chris Van Dusen brings his colorful, perspective-bending artwork to this satisfying story about acceptance, friendship, and sticking up for those who are different.
The Lemonade Club
Written by: Patricia Polacco
Illustrated by: Patricia Polacco
Miss Wichelman’s fifth grade class is all about turning life’s lemons into lemonade. But when Traci learns that her best friend Marilyn has leukemia, and will have to undergo chemotherapy, it’s hard to see how to make the best of that. When Marilyn is ready to return to class, she’s nervous about how everyone will react to her now-bald head — until she learns that Traci, and every other student in the class, have done something to make sure Marilyn won’t stick out. This touching story will remind kids that hair is just hair, but understanding and supporting a friend is precious.
For more books for all ages about the importance of helping others, visit our Kindness & Compassion Collection.
For an excellent parenting book about how to raise empathetic kids, check out UnSelfie: Why Empathetic Kids Succeed in Our All-About-Me World.
For books that encourage acceptance of differences, visit our blog post Standing Together: Mighty Girl Books Celebrating Diversity and Acceptance.
Cultivating Compassion: 25 Children's Books About Financial Hardship Close to Home
The Festival of Lights: 18 Mighty Girl Hanukkah Books
Telling Her Story: Picture Books About 99 Real-Life Mighty Girls & Women
The End of Bullying Begins With Me: 18 Bullying Prevention Books for Young Children
Things That Go Bump in the Night: 50 Mighty Girl Stories of Ghosts, Witches, and Monsters
This entry was posted in Front Page, A Mighty Girl Top Pick, A Mighty Girl Spotlight and tagged picture books, empathy, kindess on January 9, 2020 by Katherine. ← Previous Post Next Post →
Help keep A Mighty Girl growing in the years ahead!
If you discover books or other resources via this post that you would like to purchase, please use the "Buy at Amazon" and other links found on every A Mighty Girl product page. By doing so, at no added cost to you, you help to support the site and allow us to continue providing you with wonderful girl-empowering resources. We appreciate your support!
|
cc/2020-05/en_middle_0102.json.gz/line2106
|
__label__wiki
| 0.99675
| 0.99675
|
Parenting Series
Wisdom Harbour
$15.99 $12.79 View product
The Lost Choice
The Kid Who Changed the World
The Young Traveler’s Gift
The Heart Mender
The Traveler’s Gift
The Noticer
About Andy Andrews
Hailed by a New York Times reporter as "someone who has quietly become one of the most influential people in America," Andy Andrews is a best-selling novelist, speaker, and consultant for the world's largest corporations and organizations. He is the author of the New York Times bestsellers The Noticer, How Do You Kill 11 Million People?, and the modern classic, The Traveler's Gift.
Learn More About Andy
Media/ Resources
Store Policies Terms of Use and Privacy Policy Contact Help Site Credits
© 2008 - 2020 Andy Andrews. All Rights Reserved.
By using the our Sites or contacting us directly, you signify your acceptance of our Privacy Policy. If you do not agree to this Privacy Policy, you should not engage with our Sites, or use our products. Continued use of the Sites, direct engagement with us, or following the posting of changes to our Privacy Policy that do not significantly affect the use or disclosure of your personal information will mean that you accept those changes.OkSee our Terms of Use and Privacy Policy
|
cc/2020-05/en_middle_0102.json.gz/line2110
|
__label__wiki
| 0.594755
| 0.594755
|
Closing in ...
Thrown in the deep end
Home > Sports > Cricket
Ben McDermott - Contributor
There were whispers going around at the tournament about a bloke named Pat who’d been bowling rockets.
It was the national under-17s championship in Adelaide and, when it was our turn to play NSW, my opening batting partner kindly told me I could face the first ball.
I’ve never been the type to look for an easy way out. It’s a lesson Dad taught me and I applied to my cricket after he took me to the commentary box a couple of years earlier to meet some of his old teammates.
Determined as I was, pretty soon I discovered that the whispers about this Cummins fella were on the money. Facing him was proper scary. Not only was he seriously fast, he was swinging them both ways and sending down the occasional bouncer. It was next level.
The first couple of balls swung away. I played straight down the line and reckon I missed them by a foot. I could barely see the ball.
Then he bowled a short one that I got under. The next ball was short again but it didn’t get up as much. I flayed at it and managed to top edge it over slips for four.
Facing Pat was a real eye-opener. Somehow, I survived against him – only to get out a short time later to the bloke bowling at the other end.
I was only 13 or 14, at my first under-17s nationals, and Pat would have been 16. But I’d gone into the tournament pretty confident, having come off a double hundred for Gold Coast under-17s, which had earned me a call-up to the state emerging side.
That double had been a lot of fun. We were playing Redlands in Brisbane, we lost a wicket in about the 10th over and me and Nick Stevens – who’s played for Queensland a bit since then – batted the rest of the day.
Nick and I were mates and became even better mates after that innings. He got about 180, I scored 206 and we put on something like 350. By the time we were both past 100, we were just seeing who could hit the biggest six.
Growing up, I remember Dad as a very organised person, almost OCD at times, a real neat freak and always punctual.
Facing real pace at the national championships brought me back to earth. Even though I was much younger than everyone else there, I was kicking myself for not being able to dominate like I had in that game against Redlands. I hated the fact that I wasn’t able to contribute. Some kids go to those tournaments and think ‘I’ve always got next year’. But that thought never crossed my mind.
It’s that sort of attitude that I think has helped me get to the point I’m at now, playing for Tassie and the Hurricanes, and getting a handful of T20s for Australia under my belt.
There are definitely no shortcuts at the top level. There are express bowlers all over the place now – Jhye Richardson, Billy Stanlake, Riley Meredith and others. Probably the fastest bowler I’ve ever faced was Shaun Tait, and that was in my BBL debut for Brisbane Heat, at the Adelaide Oval. when I was only 18.
Taity was near the end of his career and bowling rockets. One of the first balls he sent down was a bumper that hit me in the head and did some serious damage to my helmet. A couple of balls later he bowled another bouncer and I hit him for six.
It might seem like I grew up around cricket. My dad Craig played 70 Tests in the 1980s and ’90s. But I’d only just been born when he finished up his career.
Once I started playing, Dad was never one to give me technical lessons or anything like that. Anyway, he was a bowler and I was more interested in being a wicketkeeper/batsman.
Dad’s influence was probably more around the mental side of the game. He’d offer encouragement at times, like any good father. But, above all, he provided me a good example of how to live the kind of lifestyle that helps you to be successful in cricket.
Good to be home!
A post shared by Ben McDermott (@benrmcd28) on May 12, 2017 at 1:04am PDT
Growing up, I remember Dad as a very organised person, almost OCD at times, a real neat freak and always punctual. Our home was always very tidy. If the bed wasn’t made, we’d get in trouble. If we didn’t leave the house on time, we’d be in trouble. One thing Dad would often say was: ‘Do it properly the first time and you won’t have to do it again’.
Those things had a positive impact on me. I hate being disorganised. I’m always punctual. I always want to do things really well and not just get by.
Part of the culture of Australian cricket is to be punctual and train hard. No one likes waiting on teammates or people who take shortcuts. I’m thankful to have learnt those skills from a young age and I think they’ve helped me get ahead.
As a kid learning about cricket, I was always thrown in the deep end, playing alongside blokes three or four years older than me. But I always wanted to make the most of every opportunity, no matter who I was playing against or with.
More about: Big Bash League | Brisbane Heat | Hobart Hurricanes | Pat Cummins | Sheffield Shield | T20 | Tasmania Tigers
Michael Beer - Contributor
Michael Beer was standing on a teammate's balcony near the WACA, after a win in season one of the BBL. Listening to fans leave the ground, he heard something incredible.
Michael Beer copped plenty of jokes about his surname during his cricket career. After years of bad puns, he's more than a little 'over' it.
Lloyd Pope - Contributor
He's the best emerging leg spinner in the country. But Sydney Sixers gun Lloyd Pope admits comparisons to the great Shane Warne have taken a toll.
|
cc/2020-05/en_middle_0102.json.gz/line2114
|
__label__wiki
| 0.572047
| 0.572047
|
Warren, New Hampshire
Redstone Missile
Maybe the only missile installed in a public park, this Cold War leftover was one of the first to carry a nuclear warhead.
Redstone Rocket Casey Bisson on Flickr (Creative Commons)
Redstone Rocket Wikipedia (Creative Commons)
Redstone Rocket h0n0rb
noxorc (Atlas Obscura User)
Redstone Rocket in winter, Warren, NH Credit: Jennifer Figgins Rooks 2016 jfrooks (Atlas Obscura User)
Sticking straight up out of the public green in Warren, New Hampshire the decommissioned Redstone Missile remembers the iconic ballistic’s historical significance.
Top Places in New Hampshire
Suncook, New Hampshire
Josie Langmaid Monument
Murder scene memorialized in perpetuity by grisly obelisk.
Moultonborough, New Hampshire
Claude Rains Grave
The final resting place of the man who played the Invisible Man.
New Castle, New Hampshire
Wentworth by the Sea
The once-abandoned 140-year-old hotel used in the movie "In Dreams."
See more things to do in New Hampshire »
Installed in 1971, the empty missile was donated to the town after the line as a whole had been discontinued in favor or newer technology. However, the Redstone’s importance to the history of rocketry and warfare should not be underestimated. Developed by Werner von Braun himself, the Redstone missile came to be known as the “Army’s Workhorse” as it was useful not just for a number of military applications, but of ballistic uses as well. The model has the distinction of carrying the first live nuclear warhead during two tests over the Pacific Ocean. In addition, the Redstone model of missile was used as the booster that delivered Alan Shepard, the first American in space, on his brief sub-orbital trip.
The Redstone line of missiles was discontinued by 1964, but remained in limited use elsewhere in the world. The Redstone Rocket in Warren was installed to honor Mercury Seven Astronaut Alan Shepard, who was born Derry, New Hampshire. It may seem like a strange monument to plant in a public park, but it can also be considered akin to installing old Civil War cannons in similar displays.
publicmilitary historymonuments
h h0n0rb
https://en.wikipedia.org/wiki/Alan_Shepard
http://en.wikipedia.org/wiki/PGM-11_Redstone
http://www.warren-nh.com/recreation/attractions/
http://www.cowhampshireblog.com/2006/11/24/the-day-warren-new-hampshire-went-ballistic/
Warren E. Haverhill Railroad Grade Trail
Warren, New Hampshire, 03279
Lincoln, New Hampshire
Clark's Trading Post
Come for the gun-toting hillbilly madman, stay for the ice-cream loving basketball bears.
Added by kendrawashere
What if we could make dribble castles out of ice? In Lincoln, New Hampshire they can.
Added by dcowan
Even Henry David Thoreau found this glacial pothole irresistible.
Added by misswhite1
Corinth, Vermont
East Corinth
The quaint little town in Vermont where Tim Burton's "Beetlejuice" was filmed.
Margaret Corbin's Grave
West Point’s only monument to a woman veteran stands above an empty grave.
Added by shanecashman
Picacho, Arizona
Battle of Picacho Pass Monument
A stone pillar marking the location of the westernmost battle of the American Civil War only honors one side of the conflict.
Added by WhiskeyBristles
Prison Ship Martyrs' Monument
This beautiful Brooklyn monument over a crypt memorializes a grim and largely unknown story from the American Revolution.
Added by ellenbwright
Wellington Monument
This once-controversial and slightly confusing statue of Achilles was built out of captured cannons.
|
cc/2020-05/en_middle_0102.json.gz/line2115
|
__label__wiki
| 0.712535
| 0.712535
|
Olive Oil and White Bread
By: Georgia Beers
Narrated by: Abby Craden
Categories: Fiction, Gay & Lesbian
By: E. J. Noyes
Narrated by: Kelsey Navarro
Jana Fleischer loves her life - wonderful family, best sister in the world, awesome soon to be sister-in-law, fabulous job, and a never-ending stream of men to chew through and spit out. So what if everyone says she’s too picky and she’s never had a real relationship? When a chance meeting with Brooke Donnelly leaves Jana literally and figuratively off-balance, it doesn’t take long for her initial annoyance to turn into the first sparks of friendship.
Brilliant, moving, funny, grown up!
By Sarah on 27-11-19
After the Summer Rain
By: Gerri Hill
Narrated by: Nicol Zanzarella
Workaholic Erin Ryder was on the fast track to self-destruction. Reeling after her lover walked out on her, she turned to booze and caffeine to make it through each day. After a family intervention, she finds herself on a remote ranch in New Mexico - on womyn’s land - to detox and heal. No cell service, no internet - she’s convinced she won’t last three days, much less for the three-month sentence her father has mandated.
quiet retreat, gentle paced read
By Hev on 23-11-19
Thursday Afternoons
By: Tracey Richardson
Thursdays aren't simply another day of the week for Amy Spencer and Ellis Hall. Thursday afternoons sizzle with no-strings sex for the two women, who meet each week in a hotel room to forget their past - and their present. The arrangement works perfectly for Amy, a busy surgeon who's still smarting from a failed relationship. For Ellis, Thursday afternoons act as a pressure valve from her cutthroat job and mistakes in her personal life she's trying to rectify. Soon they discover that their outside worlds are on a collision course with the carefully constructed world they've created.
By phillipa hartshorne on 16-01-20
One Walk in Winter
Narrated by: Lori Prince
Nothing’s ever been handed to Olivia Santini, and she’s proud of her work ethic. After seven years as the assistant manager of the Evergreen Resort and Spa, she has ideas to improve the bottom line and increase reservations. When her manager resigns, Olivia puts in her résumé and waits for the interview. The job is practically hers - all she needs is the paperwork. Hayley Boyd Markham is the youngest Markham, the only girl, and the most spoiled. An artistic soul in a family of business-minded type, as she’s always felt like a bit of a screwup.
Did not expect the plot, but was OK
By Nevena Hristozova on 14-12-19
By: E.J. Noyes
Stockbroker Isabelle Rhodes has a lot of money, a lot of trust issues, and a whole lot of reasons to believe her ex-girlfriend was right when she said that Isabelle sucked at relationships. With that accusation stuck in her head, Isabelle throws caution to the wind and dives into her first one-night stand. Checking that off her bucket list should be something to celebrate - except it turns out that the woman she just spent an earth-shattering night with is actually her newly hired company pilot, Audrey Graham. Ms. Never-See-You-Again just turned into Ms. See-You-Constantly.
Utterly fabulous
By ClaireLJS on 06-11-19
Three Reasons to Say Yes
Paradise, Book 1
By: Jaime Clevenger
Julia Maguire can't wait to spend two weeks in Hawaii with her best friends. She's been dreaming about this trip for years and all she wants is to lay on a sandy beach with an icy cocktail in her hand. But those vacation goals change the moment she meets Reed Baxter. Reed is a busy doctor with family demands. She's in Hawaii to let go, not find love, and she's not interested in any commitment. Adding a little heat to the vacation seems like a good idea as long as there aren't expectations for anything more.
A super read
By Kaz B on 10-12-19
Ask, Tell
Ask, Tell Series, Book 1
Captain Sabine Fleischer is a skilled and dedicated US Army surgeon deployed to a combat hospital in Afghanistan. She is also one of the thousands of troops who are forced to serve in silence because of the military's anti-gay policy of "Don't Ask, Don't Tell (DADT)". Usually driven and focused, Sabine finds that battles raging both inside and outside are making it more and more difficult for her to deal with her emotions. Dealing with loss and mortality, lack of privacy, sleep deprivation, loneliness, and the isolation forced on her by Don't Ask, Don't Tell are all taking their toll.
By Aj on 10-07-19
Dawn of Change
Susan Sterling wanted nothing more than to escape her life...and her marriage. The family's secluded cabin in Kings Canyon National Park seemed the only place for her to find peace. But it took Shawn Weber coming into her life for her to find the courage to make changes. The budding friendship between the two women strengthens into an intense emotional bond, a bond that soon eclipses friendship.
Fantastic book that ended too soon
By Sarah Colbert on 30-12-19
The Target
Sara Michaels is the daughter of a prominent senator who has just announced his candidacy for President of the United States - the same senator who has been receiving death threats against his family. Sara Michaels is also the owner of a self-help clinic and is hell-bent - despite the FBI's warnings - on leading a group of 10 women on a two-week sojourn through the Rocky Mountains. In an effort to protect Sara, the FBI recruits homicide detective Jaime Hutchinson to infiltrate the group and secretly provide the protection they are so certain Sara will need.
You’ll want to listen in one sitting
By Nanook on 15-08-19
Dr. Carly Cambridge, wildlife biologist, returns to the Texas Gulf Coast to manage the latest Habitats for Nature project, restoring the woods and wetlands to their natural state. She's devoted to the environmental cause with a passion usually reserved for a lover - something she hasn't had since a disastrous love affair 10 years earlier. Having sworn off women and relationships, She's content to live her life alone, focusing on her latest project. Wildlife photographer Pat Ryan, duped into volunteering her talents to Habitats for Nature, wants no part of the overzealous Dr. Cambridge.
Love Waits
Ashleigh Pence had been the all-American high school girl: cheerleader, prom queen...and in love with another girl. Gina Granbury hasn't thought about Calloway High in 20 years, but the arrival of the invitation to the class reunion brings back memories of Ashleigh and the betrayal that drove them apart. With no real choice, Ashleigh has to go the event, hoping that it's not the one reunion that Gina decides to attend after all these years. Gina's curiosity is suddenly strong. Her long-broken heart has never mended, but that's no reason to go back in time...is it?
By Mandy on 05-10-19
Breaking Character
By: Lee Winter
Narrated by: Angela Dawe
Life has become a farcical mess for icy British A-lister Elizabeth Thornton. America's most-hated villain stars in a top-rated TV medical drama that she hates. Now, she's been romantically linked to her perky, new co-star, Summer, due to the young woman's clumsiness. As a closeted actress, that's the last thing Elizabeth needs. If she could just get her dream movie role, life would be so much better. The only problem is that the eccentric French film-maker offering it insists on meeting her "girlfriend", Summer, first.
By Dr. S. E. Beresford on 27-04-19
Fear of Falling
Since she was 14, singer Sophie James has been an international superstar. With her career (and life) directed by her manager, Ray, she hasn’t had to worry about a thing for more than a decade...not where she goes, not what she sings, not who she is. But when Ray has a heart attack, Sophie is left without the only real father figure she’s ever known and questioning everything she believes about what’s important to her. Enter Dana Landon, the new manager sent by Sophie’s record company.
By Leigh on 06-07-19
A Little Bit of Spice
Andrea Blake's life has order. Everything is meticulously laid out and planned, from her house in its quiet neighborhood to her career path at Hagan's, the largest supermarket chain in the Northeast. Andrea knows what she wants. Enter Kendall Foster, the distractingly attractive woman in charge of sales for her family's local microbrewery and somebody who wants very much to get her beer onto Hagan's shelves.
Predictable Pulp
By Frankimunk on 10-02-16
Back to September
By: Melissa Brayden
Narrated by: Melissa Sternenberg
Hannah Shephard likes her life, her job, and her perfectly cozy apartment around the corner from her shop. She’s never been one to take big risks and would much rather stay in on a Friday night with a warm cup of decaf and her favorite mystery novel. So, why do her friends insist she needs more? Plus, Hannah has bigger problems to focus on. She’s in trouble. Well, her bookstore is, and if she doesn’t find a way to bring in some more cash, she’ll be closing the doors of A Likely Story for good.
Artist's Dream
Cassie Parker has grown used to denying her sexuality. Her father, the fire-and-brimstone Reverend Parker, has made that a necessity. Raised in a web of secrets, sadness, and under the heavy hand of her father's righteous wrath and intolerance, Cassie turns to her art to fill the hole in her heart and erase the memory of a mother who abandoned her in childhood. Then Luke Winston enters her life. Strong, mysterious, and beautiful, Luke sparks Cassie's desire, and takes her heart to places she's never known.
Keepers of the Cave
Johnston & Riley Series, Book 1
While the investigations go on in Dallas and Baton Rouge after the disappearance of a senator's daughter, FBI agents CJ Johnston and Paige Riley are assigned to the sleepy backwoods of East Texas for a dead-end assignment to infiltrate an all-girls school. Random disappearances dating back 50 years and more raise red flags that point to the tiny, isolated community of Hoganville. But CJ and Paige fear there will be little distraction from the memories of the one-night stand they shared six months ago.
By miss cj langran on 08-06-19
It's Not a Date
By: Heather Blackmore
Entrepreneur and innovator Kadrienne Davenport gets results. A demanding executive and stickler for punctuality, Kade throws herself into work to avoid hurting anyone, convinced she only causes pain to those she loves. When Jennifer Spencer meets an incognito Kade at a conference, sparks fly. But when Kade unexpectedly becomes her boss, Jen's problems multiply. The company she founded is going broke, her grandmother's dementia is worsening, and her attraction to Kade -- her difficult, brilliant, charismatic mentor -- is growing.
unexpectedly emotional
Boston - What happens to lovers after the happy-ever-after moment? What goes on behind the closed doors of a relationship once the commitment is made? What does romance turn into when the hands of time keep turning? Olive Oil and White Bread is a novel that dares to answer those questions.
Angie Righetti is the daughter of a sprawling but close-knit Italian American family. She's out and they're proud. Jillian Clark's family is the white bread to Angie's olive oil. Stoic and emotionally buttoned up, they don't want to think about Jillian's sexuality. It's 1988 when they move in together, on the brink of starting their careers. Like every couple at the start of their life together, they expect to live happily ever after. And for 23 years life happens: They change jobs, buy a house, get a dog, and deal with money issues and the death of a parent. They fight, love, cry, play, make mistakes, have regrets, and try to be good to each other and to everybody else. Like most of us they tumble into a routine that turns into a rut that leads to distraction and danger.
In 96 Hours, Georgia Beers gave herself the challenge of writing a romance set in the immediate aftermath of 9/11. And she succeeded, coming up with a book that garnered awards and great reviews. She returns with a new challenge - writing a romance that starts, rather than ends, with the happy-ever-after.
©2014 Georgia Beers (P)2014 Audible Inc.
The Do-Over
Laura Dixon
Easy going and enjoyable
Nice read, but why do all romantic fictions always have a cheating storyline? Enjoyable and easy going book - would recommend.
Iris Pereyra
Sweet, romantic and ultimately insightful story
I must admit that during the first chapters of these novel I was a little dissapointed as the story seemed trite and pretty formulaic, which I guess should not come as a total surprise for this genre. But after reading Ms. Beer's 96 hours, I have come to expect good writing and a deeper type of story-line from her.
The novel is divided in chapters that are told in chronological order and follow the relationship of Angie and Jillian, from its beginning when they moved together in 1988 thru the summer of 2011. So in a way, this is the anti-romantic novel that cares to ask the question, what happens when the honeymoon is over and a relationship falls into the day to day routine? Obviously most couples expect go live happy ever after, but we know that's not how things happen in real life.
For the most part of the book the author throws a few tidbits of pop-culture and well as of the politics of the day, to keep you aware of what's going on in the world but this is really keep to a minimum as it mostly follows the two main characters and how their personal lives and their relationship develops.
I should point out that the books goes a little deeper into two landmark events for the LGTB community in the Unites States and these are given special attention, one is the airing of The Ellen Degeneres show, more specifically the episode when Ellen comes out. The second one is the passing of the Marriage Equality Act, by the New York state legislation in June 2011.
I thought that Ms. Beers does a very good job at incorporating these events into the storyline and allows us to experience first hand how they were felt by Angie and Jillian but also by their friends and families. I got very emotional when I read these passages of the book and was particularly moved to see that the author have both straight and gay people celebrate these truly remarkable events.
The relationship story of Angie and Jillian also breaks the mold of your typical lesbian romance as they experience life, its valleys and mountains, ups and downs, but eventually mature and make the necessary sacrifices that are required for any couple, straight of gay, to stay together.
Overall, this is a romantic, witty and insightful read that I enjoyed a lot but I was also able to appreciate how much Ms. Beers have improved as a writer but also as a literary voice representing well the LGTB community.
The Narrator, Abby Craden as usual, does a good job with her narration,
A great story
While I usually prefer reading books, it was fun listening to this one while traveling. The narrator was excellent. The story was also excellent. Very nice to follow a couple through the ups and downs of a many year relationship, and it all rang true. You will probably see your own relationship, or others you know, in the story of this relationship.
Very different story line but I was pulled in to the years that past. And my of even learned a few things. This is a good story well worth you time .
Loved it. Takes you through 22 years with all the ups and downs.
Abby Craden is phenomenal as usual. The characters come to life in her expert care.
Joyce Moore
This could be my life?
I really enjoyed this book: the way the author kept us traveling through highs and lows of the Couples 23yr relationship.
lisakttn
great story
I loved this story. Georgia took me on a journey of a couple's life together with all that people face. The ups, down, devastation that people go through.
I pretty much listen to any audiobook I find by Georgia Beers, because I enjoy her writing style, but I didn't enjoy this book as much as I have her others. It's not a bad story, and the characters are well-written, but I just never felt drawn in. This book did not click with me. It happens, and it doesn't change the fact that I will continue to read or listen to Georgia Beers every chance I get.
Heartwrenching
I felt like I was listening to my own story. This book brought back a lot of memories and feelings.
Aggiegirl708
well done!!
especially for folks in long term relationships. an excellent story, and very relatable. buy it!
This was a lovely romantic story about life and what happens after you find the love of your life. Beers is very good at pulling you into a story an not letting you go. I had all the feels with this one
|
cc/2020-05/en_middle_0102.json.gz/line2118
|
__label__wiki
| 0.622086
| 0.622086
|
Access over 1,000 articles. Sign in or Subscribe
ALS logo
Volume 26 No. 2 — 1 June 2011
Biopolitical Correspondences : Settler Nationalism, Thanatopolitics, and the Perils of Hybridity
Michael R. Griffiths
‘How does (post)colonial literary culture, so often annexed to nationalist concerns, interface with what Michel Foucalt called biopolitics? Biopolitics can be defined as the regularisation of a population according to the perceived insistence on norms. Indeed, biopolitics is crucially concerned with what is perceptible at the macroscopic level of an entire population - often rendering its operations blind to more singular, small, identitarian, or even communitarian representations and imaginaries. Unlike the diffuse, microscopic, governmental mechanisms of surveillance that identify the need for disciplinary interventions, biopolitics concerns itself with the regularisation of societies on a large scale, notably through demography. As Ann Laura Stoler has put it, Foucault’s identification of these two forms of power, ‘the disciplining of individual bodies…and the regularization of life processes of aggregate human populations’ has led to much productive work in the postcolonialist critique of ‘the discursive management of the sexual practices of the colonized’, and the resultant ‘colonial order of things’ (4).’ (Author’s introduction, 20)
The full text of this essay is available to ALS subscribers
Please sign in to access this article and the rest of our archive.
Not a member? Subscribe now from only $24/year
Published 1 June 2011 in Volume 26 No. 2. Subjects: Aboriginal assimilation (Government policy), Aboriginal-White conflict, Aboriginality, Biopolitics, Colonialism & imperialism - Literary portrayal, Human relations, Hybridity, Population growth.
Cite as: Griffiths, Michael R.. ‘Biopolitical Correspondences : Settler Nationalism, Thanatopolitics, and the Perils of Hybridity.’ Australian Literary Studies, vol. 26, no. 2, 2011. https://doi.org/10.20314/als.faeabec9e4.
Related essays and reviews
Russell West-Pavlov
The Time of Biopolitics in the Settler Colony
Kim Scott's description of the Moore River Native Settlement, also known as Mogumber, in his 1999 novel Benang, suggests implicit analogies with the mid-century concentration camps of the Holocaust. The Indigenous detainees are transported there in stock cars, they…
Biopolitics and Eleanor Dark’s Prelude to Christopher
‘In 1934 Miles Franklin described Eleanor Dark’s second novel, Prelude to Christopher, as ‘a terribly beautiful piece of work’ (128). One of Dark’s earliest critics, Franklin attributed the book’s strength to the author’s deft handling of a tragic theme…
Fiona Probyn
White Closets, Jangling Nerves and the Biopolitics of the Public Secret
‘This essay attempts to outline the relationship between the ‘raw nerves’ that Denis Byrne describes in the epigraph above, and the cultivation of ‘indifference’ that Stanner identifies as being characteristic of ‘European life’ in Australia. Here I situate indifference as…
Shameem Black
Humanitarian Sex : Biopolitics, Ethics, and Aid Worker Memoir
‘Humanitarianism is sexy, or so they say. Unlike other forms of civic aid that go by less glamorous names, such as social work, the word ‘humanitarian’ carries with it a particular glow of grandeur. Because it deploys the language of…
Subscribe now to access our archive of more than 1,000 essays on Australian literary culture and history, or recommend us to your library.
|
cc/2020-05/en_middle_0102.json.gz/line2121
|
__label__cc
| 0.639334
| 0.360666
|
ListFeed
Home Sport
Barbarians at the double
On Saturday 1st November 2014, the World famous Barbarians will kick start the Autumn Internationals at Twickenham with an eagerly anticipated opening match against Australia.
by Shanaka
Some of the best seats in the house have just been made available centrally in the West Stands.
These tickets won’t hang around for long, so take this opportunity up now with not only discounted tickets, but in great positions too at the Home of English Rugby.
Special Offer Tickets are available, for a limited period only, from £30 for adults and £15 for juniors (U16) at www.ticketmaster.co.uk– 0844 847 2492. (Booking fees apply)
Murad Islamov on what New Zealand must do to become compete with the giants of international football
Wallabies should reconsider Giteau’s law according to Eddie Jones
Will Major League Baseball return to Australia?
The Barbarians are also playing an England XV on Sunday 1st June — 3pm kick off, and the squad is full of high profile international stars from around the globe including: James O’Connor (Australia), Juan Martin Hernandez (Argentina), Joe Rokocoko (New Zealand), Francois Trinh-Duc (France), Donncha O’Callaghan (Ireland), Hosea Gear (New Zealand), Brock James (South Africa), Jimmy Cowan (New Zealand) plus many more…
The RFU are doing a special ticket offer, for £40 only, for both games. Offer ends 31st May. Visit the RFU’s ticket site to take up this offer. It’s a Baa-gain…
Tags: Australian sportEngland XVRugby unionSportThe BarbariansTwickenham
australiantimes.co.uk is a division of Blue Sky Publications Ltd. Reproduction without permission prohibited.
|
cc/2020-05/en_middle_0102.json.gz/line2122
|
__label__cc
| 0.707933
| 0.292067
|
Difference between revisions of "Typeclassopedia"
Byorgey (talk | contribs)
(Add (>>=), fmap, join exercises. Have to be careful about those = signs in unnamed template parameters.)
Latest revision as of 19:21, 15 August 2019 (view source)
Ysangkok (talk | contribs)
m (fix gmane links using archive.fo)
:''By Brent Yorgey, byorgey@cis.upenn.edu''
''By [[User:Byorgey|Brent Yorgey]], byorgey@gmail.com''
:''As published 12 March 2009, [http://www.haskell.org/wikiupload/8/85/TMR-Issue13.pdf issue 13] of [http://themonadreader.wordpress.com/ the Monad.Reader], with tiny November 2011 updates by [[User:Geheimdienst|Geheimdienst]]''
''Originally published 12 March 2009 in [http://www.haskell.org/wikiupload/8/85/TMR-Issue13.pdf issue 13] of [http://themonadreader.wordpress.com/ the Monad.Reader]. Ported to the Haskell wiki in November 2011 by [[User:Geheimdienst|Geheimdienst]].''
:''Alternate formats: [[Media:Typeclassopedia.pdf|PDF]] / [http://code.haskell.org/~byorgey/TMR/Issue13/typeclassopedia.lhs tex source] / [http://code.haskell.org/~byorgey/TMR/Issue13/typeclassopedia.bib bibliography]''
''This is now the official version of the Typeclassopedia and supersedes the version published in the Monad.Reader. Please help update and extend it by editing it yourself or by leaving comments, suggestions, and questions on the [[Talk:Typeclassopedia|talk page]].''
''The standard Haskell libraries feature a number of type classes with algebraic or category-theoretic underpinnings. Becoming a fluent Haskell hacker requires intimate familiarity with them all, yet acquiring this familiarity often involves combing through a mountain of tutorials, blog posts, mailing list archives, and IRC logs.''
=Abstract=
''The goal of this document is to serve as a starting point for the student of Haskell wishing to gain a firm grasp of its standard type classes. The essentials of each type class are introduced, with examples, commentary, and extensive references for further reading.''
The standard Haskell libraries feature a number of type classes with algebraic or category-theoretic underpinnings. Becoming a fluent Haskell hacker requires intimate familiarity with them all, yet acquiring this familiarity often involves combing through a mountain of tutorials, blog posts, mailing list archives, and IRC logs.
The goal of this document is to serve as a starting point for the student of Haskell wishing to gain a firm grasp of its standard type classes. The essentials of each type class are introduced, with examples, commentary, and extensive references for further reading.
=Introduction=
* I finally figured out how to use [[Parsec]] with do-notation, and someone told me I should use something called <code>Applicative</code> instead. Um, what?
* Someone in the [[IRC channel|#haskell]] IRC channel used <code>(***)</code>, and when I asked lambdabot to tell me its type, it printed out scary gobbledygook that didn’t even fit on one line! Then someone used <code>fmap fmap fmap</code> and my brain exploded.
* When I asked how to do something I thought was really complicated, people started typing things like <code>zip.ap fmap.(id &&& wtf)</code> and the scary thing is that they worked! Anyway, I think those people must actually be robots because there’s no way anyone could come up with that in two seconds off the top of their head.
:''There is no royal road to Haskell. {{h:title|Well, he probably would have said it if he knew Haskell.|—Euclid}}''
{{note|See Brent Yorgey’s [http://byorgey.wordpress.com/2009/01/12/abstraction-intuition-and-the-monad-tutorial-fallacy/ Abstraction, intuition, and the “monad tutorial fallacy”]}} This document can only be a starting point, since good intuition comes from hard work, not from learning the right metaphor {{noteref}}. Anyone who reads and understands all of it will still have an arduous journey ahead—but sometimes a good starting point makes a big difference.
This document can only be a starting point, since good intuition comes from hard work, [http://byorgey.wordpress.com/2009/01/12/abstraction-intuition-and-the-monad-tutorial-fallacy/ not from learning the right metaphor]. Anyone who reads and understands all of it will still have an arduous journey ahead—but sometimes a good starting point makes a big difference.
It should be noted that this is not a Haskell tutorial; it is assumed that the reader is already familiar with the basics of Haskell, including the standard <code>[http://haskell.org/ghc/docs/latest/html/libraries/base/Prelude.html Prelude]</code>, the type system, data types, and type classes.
It should be noted that this is not a Haskell tutorial; it is assumed that the reader is already familiar with the basics of Haskell, including the standard [{{HackageDocs|base|Prelude}} <code>Prelude</code>], the type system, data types, and type classes.
The type classes we will be discussing and their interrelationships:
The type classes we will be discussing and their interrelationships ([[:File:Dependencies.txt|source code for this graph can be found here]]):
[[Image:Typeclassopedia-diagram.png]]
{{note|When Typeclassopedia was originally written, <code>Pointed</code> and <code>Comonad</code> were in the [http://hackage.haskell.org/package/category-extras category-extras] library. It has since been deprecated and they have moved to the [http://hackage.haskell.org/package/pointed pointed package] and the [http://hackage.haskell.org/package/comonad comonad package]. —Geheimdienst, Nov 2011}}
{{note|<code>Apply</code> can be found in the [http://hackage.haskell.org/package/semigroupoids <code>semigroupoids</code> package], and <code>Comonad</code> in the [http://hackage.haskell.org/package/comonad <code>comonad</code> package].}}
* <span style="border-bottom: 2px solid black">Solid arrows</span> point from the general to the specific; that is, if there is an arrow from <code>Foo</code> to <code>Bar</code> it means that every <code>Bar</code> is (or should be, or can be made into) a <code>Foo</code>.
* <span style="border-bottom: 2px dotted black">Dotted arrows</span> indicate some other sort of relationship.
* <span style="border-bottom: 2px dotted black">Dotted lines</span> indicate some other sort of relationship.
* <code>Monad</code> and <code>ArrowApply</code> are equivalent.
* <code>Pointed</code> and <code>Comonad</code> are greyed out since they are not actually (yet) in the standard Haskell libraries {{noteref}}.
* <code>Apply</code> and <code>Comonad</code> are greyed out since they are not actually (yet?) in the standard Haskell libraries {{noteref}}.
One more note before we begin. I’ve seen “type class” written as one word, “typeclass”, but let’s settle this once and for all: the correct spelling uses two words (the title of this document notwithstanding), as evidenced by, for example, the [http://haskell.org/onlinereport/ Haskell 98 Revised Report], early papers on type classes like [http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.5639 Type classes in Haskell] and [http://research.microsoft.com/en-us/um/people/simonpj/papers/type-class-design-space/ Type classes: exploring the design space], and [http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.168.4008 Hudak et al.’s history of Haskell].
One more note before we begin. The original spelling of “type class” is with two words, as evidenced by, for example, the [http://www.haskell.org/onlinereport/haskell2010/ Haskell 2010 Language Report], early papers on type classes like [http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.5639 Type classes in Haskell] and [http://research.microsoft.com/en-us/um/people/simonpj/papers/type-class-design-space/ Type classes: exploring the design space], and [http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.168.4008 Hudak et al.’s history of Haskell]. However, as often happens with two-word phrases that see a lot of use, it has started to show up as one word (“typeclass”) or, rarely, hyphenated (“type-class”). When wearing my prescriptivist hat, I prefer “type class”, but realize (after changing into my descriptivist hat) that there's probably not much I can do about it.
We now begin with the simplest type class of all: <code>Functor</code>.
[[Instances of List and Maybe]] illustrates these type classes with simple examples using List and Maybe. We now begin with the simplest type class of all: <code>Functor</code>.
=Functor=
The <code>Functor</code> class ([http://haskell.org/ghc/docs/latest/html/libraries/base/Prelude.html#t:Functor haddock]) is the most basic and ubiquitous type class in the Haskell libraries. A simple intuition is that a <code>Functor</code> represents a “container” of some sort, along with the ability to apply a function uniformly to every element in the container. For example, a list is a container of elements, and we can apply a function to every element of a list, using <code>map</code>. As another example, a binary tree is also a container of elements, and it’s not hard to come up with a way to recursively apply a function to every element in a tree.
The <code>Functor</code> class ([{{HackageDocs|base|Prelude}}#t:Functor haddock]) is the most basic and ubiquitous type class in the Haskell libraries. A simple intuition is that a <code>Functor</code> represents a “container” of some sort, along with the ability to apply a function uniformly to every element in the container. For example, a list is a container of elements, and we can apply a function to every element of a list, using <code>map</code>. As another example, a binary tree is also a container of elements, and it’s not hard to come up with a way to recursively apply a function to every element in a tree.
Another intuition is that a <code>Functor</code> represents some sort of “computational context”. This intuition is generally more useful, but is more difficult to explain, precisely because it is so general. Some examples later should help to clarify the <code>Functor</code>-as-context point of view.
==Definition==
The type class declaration for <code>Functor</code>:
Here is the type class declaration for <code>Functor</code>:
<haskell>
class Functor f where
fmap :: (a -> b) -> f a -> f b
(<$) :: a -> f b -> f a
(<$) = fmap . const
</haskell>
<code>Functor</code> is exported by the <code>Prelude</code>, so no special imports are needed to use it.
<code>Functor</code> is exported by the <code>Prelude</code>, so no special imports are needed to use it. Note that the <code>(<$)</code> operator is provided for convenience, with a default implementation in terms of <code>fmap</code>; it is included in the class just to give <code>Functor</code> instances the opportunity to provide a more efficient implementation than the default. To understand <code>Functor</code>, then, we really need to understand <code>fmap</code>.
First, the <code>f a</code> and <code>f b</code> in the type signature for <code>fmap</code> tell us that <code>f</code> isn’t just a type; it is a ''type constructor'' which takes another type as a parameter. (A more precise way to say this is that the ''kind'' of <code>f</code> must be <code>* -> *</code>.) For example, <code>Maybe</code> is such a type constructor: <code>Maybe</code> is not a type in and of itself, but requires another type as a parameter, like <code>Maybe Integer</code>. So it would not make sense to say <code>instance Functor Integer</code>, but it could make sense to say <code>instance Functor Maybe</code>.
First, the <code>f a</code> and <code>f b</code> in the type signature for <code>fmap</code> tell us that <code>f</code> isn’t a concrete type like <code>Int</code>; it is a sort of ''type function'' which takes another type as a parameter. More precisely, the ''kind'' of <code>f</code> must be <code>* -> *</code>. For example, <code>Maybe</code> is such a type with kind <code>* -> *</code>: <code>Maybe</code> is not a concrete type by itself (that is, there are no values of type <code>Maybe</code>), but requires another type as a parameter, like <code>Maybe Integer</code>. So it would not make sense to say <code>instance Functor Integer</code>, but it could make sense to say <code>instance Functor Maybe</code>.
Now look at the type of <code>fmap</code>: it takes any function from <code>a</code> to <code>b</code>, and a value of type <code>f a</code>, and outputs a value of type <code>f b</code>. From the container point of view, the intention is that <code>fmap</code> applies a function to each element of a container, without altering the structure of the container. From the context point of view, the intention is that <code>fmap</code> applies a function to a value without altering its context. Let’s look at a few specific examples.
Finally, we can understand <code>(<$)</code>: instead of applying a function to the values a container/context, it simply replaces them with a given value. This is the same as applying a constant function, so <code>(<$)</code> can be implemented in terms of <code>fmap</code>.
==Instances==
{{note|Recall that <code>[]</code> has two meanings in Haskell: it can either stand for the empty list, or, as here, it can represent the list type constructor (pronounced “list-of”). In other words, the type <code>[a]</code> (list-of-<code>a</code>) can also be written <code>([] a)</code>.}}
{{note|Recall that <code>[]</code> has two meanings in Haskell: it can either stand for the empty list, or, as here, it can represent the list type constructor (pronounced “list-of”). In other words, the type <code>[a]</code> (list-of-<code>a</code>) can also be written <code>[] a</code>.}}
{{note|You might ask why we need a separate <code>map</code> function. Why not just do away with the current list-only <code>map</code> function, and rename <code>fmap</code> to <code>map</code> instead? Well, that’s a good question. The usual argument is that someone just learning Haskell, when using <code>map</code> incorrectly, would much rather see an error about lists than about <code>Functor</code>s.}}
instance Functor [] where
fmap :: (a -> b) -> [a] -> [b]
fmap _ [] = []
fmap g (x:xs) = g x : fmap g xs
-- or we could just say fmap = map
instance Functor Maybe where
fmap :: (a -> b) -> Maybe a -> Maybe b
fmap _ Nothing = Nothing
fmap g (Just a) = Just (g a)
As an aside, in idiomatic Haskell code you will often see the letter <code>f</code> used to stand for both an arbitrary <code>Functor</code> and an arbitrary function. In this document, <code>f</code> represents only <code>Functor</code>s, and <code>g</code> or <code>h</code> always represent functions, but you should be aware of the potential confusion. In practice, what <code>f</code> stands for should always be clear from the context, by noting whether it is part of a type or part of the code.
There are other <code>Functor</code> instances in the standard libraries; below are a few. Note that some of these instances are not exported by the <code>Prelude</code>; to access them, you can import <code>Control.Monad.Instances</code>.
There are other <code>Functor</code> instances in the standard library as well:
* <code>Either e</code> is an instance of <code>Functor</code>; <code>Either e a</code> represents a container which can contain either a value of type <code>a</code>, or a value of type <code>e</code> (often representing some sort of error condition). It is similar to <code>Maybe</code> in that it represents possible failure, but it can carry some extra information about the failure as well.
* <code>IO</code> is a <code>Functor</code>; a value of type <code>IO a</code> represents a computation producing a value of type <code>a</code> which may have I/O effects. If <code>m</code> computes the value <code>x</code> while producing some I/O effects, then <code>fmap g m</code> will compute the value <code>g x</code> while producing the same I/O effects.
* Many standard types from the [http://hackage.haskell.org/package/containers/ containers library] (such as <code>Tree</code>, <code>Map</code>, <code>Sequence</code>, and <code>Stream</code>) are instances of <code>Functor</code>. A notable exception is <code>Set</code>, which cannot be made a <code>Functor</code> in Haskell (although it is certainly a mathematical functor) since it requires an <code>Ord</code> constraint on its elements; <code>fmap</code> must be applicable to ''any'' types <code>a</code> and <code>b</code>. However, <code>Set</code> (and other similarly restricted data types) can be made an instance of a suitable generalization of <code>Functor</code>, either by [http://article.gmane.org/gmane.comp.lang.haskell.cafe/78052/ making <code>a</code> and <code>b</code> arguments to the <code>Functor</code> type class themselves], or by adding an [http://blog.omega-prime.co.uk/?p=127 associated constraint].
* Many standard types from the [http://hackage.haskell.org/package/containers/ containers library] (such as <code>Tree</code>, <code>Map</code>, and <code>Sequence</code>) are instances of <code>Functor</code>. A notable exception is <code>Set</code>, which cannot be made a <code>Functor</code> in Haskell (although it is certainly a mathematical functor) since it requires an <code>Ord</code> constraint on its elements; <code>fmap</code> must be applicable to ''any'' types <code>a</code> and <code>b</code>. However, <code>Set</code> (and other similarly restricted data types) can be made an instance of a suitable generalization of <code>Functor</code>, either by [http://archive.fo/9sQhq making <code>a</code> and <code>b</code> arguments to the <code>Functor</code> type class themselves], or by adding an [http://blog.omega-prime.co.uk/?p=127 associated constraint].
{{Exercises|
Explain their similarities and differences.
<li>Give an example of a type which cannot be made an instance of <code>Functor</code> (without using <code>undefined</code>).
<li>Implement a <code>Functor</code> instance for the type <code>ITree</code>, defined as
data ITree a = Leaf (Int -> a)
| Node [ITree a]
<li>Give an example of a type of kind <code>* -> *</code> which cannot be made an instance of <code>Functor</code> (without using <code>undefined</code>).
<li>Is this statement true or false?
:''The composition of two <code>Functor</code>s is also a <code>Functor</code>.''
If false, give a counterexample; if true, prove it by exhibiting some appropriate Haskell code.
-- Evil Functor instance
fmap g (x:xs) = g x : g x : fmap g xs
Any Haskeller worth their salt would reject this code as a gruesome abomination.
Unlike some other type classes we will encounter, a given type has at most one valid instance of <code>Functor</code>. This [http://article.gmane.org/gmane.comp.lang.haskell.libraries/15384 can be proven] via the [http://homepages.inf.ed.ac.uk/wadler/topics/parametricity.html#free ''free theorem''] for the type of <code>fmap</code>. In fact, the same argument shows that any <code>Functor</code> instance satisfying the first law (<code>fmap id = id</code>) will automatically satisfy the second law as well. Practically, this means that only the first law needs to be checked (usually by a very straightforward induction) to ensure that a <code>Functor</code> instance is valid.
Unlike some other type classes we will encounter, a given type has at most one valid instance of <code>Functor</code>. This [http://archive.fo/U8xIY can be proven] via the [http://homepages.inf.ed.ac.uk/wadler/topics/parametricity.html#free ''free theorem''] for the type of <code>fmap</code>. In fact, [http://byorgey.wordpress.com/2010/03/03/deriving-pleasure-from-ghc-6-12-1/ GHC can automatically derive] <code>Functor</code> instances for many data types.
{{note|Actually, if <code>seq</code>/<code>undefined</code> are considered, it [http://stackoverflow.com/a/8323243/305559 is possible] to have an implementation which satisfies the first law but not the second. The rest of the comments in this section should be considered in a context where <code>seq</code> and <code>undefined</code> are excluded.}}
A [https://github.com/quchen/articles/blob/master/second_functor_law.md similar argument also shows] that any <code>Functor</code> instance satisfying the first law (<code>fmap id = id</code>) will automatically satisfy the second law as well. Practically, this means that only the first law needs to be checked (usually by a very straightforward induction) to ensure that a <code>Functor</code> instance is valid.{{noteref}}
# Although it is not possible for a <code>Functor</code> instance to satisfy the first <code>Functor</code> law but not the second, the reverse is possible. Give an example of a (bogus) <code>Functor</code> instance which satisfies the second law but not the first.
# Although it is not possible for a <code>Functor</code> instance to satisfy the first <code>Functor</code> law but not the second (excluding <code>undefined</code>), the reverse is possible. Give an example of a (bogus) <code>Functor</code> instance which satisfies the second law but not the first.
# Which laws are violated by the evil <code>Functor</code> instance for list shown above: both laws, or the first law alone? Give specific counterexamples.
Just like all other Haskell functions of “more than one parameter”, however, <code>fmap</code> is actually ''curried'': it does not really take two parameters, but takes a single parameter and returns a function. For emphasis, we can write <code>fmap</code>’s type with extra parentheses: <code>fmap :: (a -> b) -> (f a -> f b)</code>. Written in this form, it is apparent that <code>fmap</code> transforms a “normal” function (<code>g :: a -> b</code>) into one which operates over containers/contexts (<code>fmap g :: f a -> f b</code>). This transformation is often referred to as a ''lift''; <code>fmap</code> “lifts” a function from the “normal world” into the “<code>f</code> world”.
==Utility functions==
A good starting point for reading about the category theory behind the concept of a functor is the excellent [http://en.wikibooks.org/wiki/Haskell/Category_theory Haskell wikibook page on category theory].
There are a few more <code>Functor</code>-related functions which can be imported from the <code>Data.Functor</code> module.
=Pointed=
* <code>(<$>)</code> is defined as a synonym for <code>fmap</code>. This enables a nice infix style that mirrors the <code>($)</code> operator for function application. For example, <code>f $ 3</code> applies the function <code>f</code> to 3, whereas <code>f <$> [1,2,3]</code> applies <code>f</code> to each member of the list.
* <code>($>) :: Functor f => f a -> b -> f b</code> is just <code>flip (<$)</code>, and can occasionally be useful. To keep them straight, you can remember that <code>(<$)</code> and <code>($>)</code> point towards the value that will be kept.
* <code>void :: Functor f => f a -> f ()</code> is a specialization of <code>(<$)</code>, that is, <code>void x = () <$ x</code>. This can be used in cases where a computation computes some value but the value should be ignored.
{{note|The <code>Pointed</code> type class lives in the [http://hackage.haskell.org/package/pointed pointed library], moved from the [http://hackage.haskell.org/package/category-extras category-extras library]. The <code>point</code> function was originally named <code>pure</code>.<br><br>Edward Kmett, the author of category-extras, pointed, and many related packages, has since moved his focus to [http://hackage.haskell.org/package/semigroupoids semigroupoids] and [http://hackage.haskell.org/package/semigroups semigroups]. He finds them more interesting and useful, and considers <code>Pointed</code> to be historical now (he still provides the pointed package only because “people were whinging”). Nevertheless, <code>Pointed</code> has kept its value for explaining, and its place in Typeclassopedia. —Geheimdienst, Nov 2011}}
The <code>Pointed</code> type class represents ''pointed functors''. It is not actually a type class in the standard libraries {{noteref}}. But it ''could'' be, and it’s useful in understanding a few other type classes, notably <code>Applicative</code> and <code>Monad</code>, so let’s pretend for a minute.
Given a <code>Functor</code>, the <code>Pointed</code> class represents the additional ability to put a value into a “default context”. Often, this corresponds to creating a container with exactly one element, but it is more general than that. The type class declaration for <code>Pointed</code> is:
class Functor f => Pointed f where
point :: a -> f a -- aka pure, singleton, return, unit
Most of the standard <code>Functor</code> instances could also be instances of <code>Pointed</code>—for example, the <code>Maybe</code> instance of <code>Pointed</code> is <code>point = Just</code>; there are many possible implementations for lists, the most natural of which is <code>point x = [x]</code>; for <code>((->) e)</code> it is ... well, I’ll let you work it out. (Just follow the types!)
One example of a <code>Functor</code> which is not <code>Pointed</code> is <code>((,) e)</code>. If you try implementing <code>point :: a -> (e,a)</code> you will quickly see why: since the type <code>e</code> is completely arbitrary, there is no way to generate a value of type <code>e</code> out of thin air! However, as we will see, <code>((,) e)</code> can be made <code>Pointed</code> if we place an additional restriction on <code>e</code> which allows us to generate a default value of type <code>e</code> (the most common solution is to make <code>e</code> an instance of <code>Monoid</code>).
{{note|For those interested in category theory, this law states precisely that <code>point</code> is a natural transformation from the identity functor to <code>f</code>.}} The <code>Pointed</code> class has only one law {{noteref}}:
fmap g . point = point . g
{{note|... modulo ⊥, <code>seq</code>, and assuming a lawful <code>Functor</code> instance.}}
However, you need not worry about it: this law is actually a so-called “free theorem” guaranteed by parametricity (see Wadler’s [http://homepages.inf.ed.ac.uk/wadler/topics/parametricity.html#free Theorems for free!]); it’s impossible to write an instance of <code>Pointed</code> which does not satisfy it {{noteref}}.
=Applicative=
A somewhat newer addition to the pantheon of standard Haskell type classes, ''applicative functors'' represent an abstraction lying exactly in between <code>Functor</code> and <code>Monad</code>, first described by McBride and Paterson. The title of their classic paper, [http://www.soi.city.ac.uk/~ross/papers/Applicative.html Applicative Programming with Effects], gives a hint at the intended intuition behind the [http://haskell.org/ghc/docs/latest/html/libraries/base/Control-Applicative.html <code>Applicative</code>] type class. It encapsulates certain sorts of “effectful” computations in a functionally pure way, and encourages an “applicative” programming style. Exactly what these things mean will be seen later.
A somewhat newer addition to the pantheon of standard Haskell type classes, ''applicative functors'' represent an abstraction lying in between <code>Functor</code> and <code>Monad</code> in expressivity, first described by McBride and Paterson. The title of their classic paper, [http://www.soi.city.ac.uk/~ross/papers/Applicative.html Applicative Programming with Effects], gives a hint at the intended intuition behind the [{{HackageDocs|base|Control-Applicative}} <code>Applicative</code>] type class. It encapsulates certain sorts of “effectful” computations in a functionally pure way, and encourages an “applicative” programming style. Exactly what these things mean will be seen later.
The <code>Applicative</code> class adds a single capability to <code>Pointed</code> functors. Recall that <code>Functor</code> allows us to lift a “normal” function to a function on computational contexts. But <code>fmap</code> doesn’t allow us to apply a function which is itself in a context to a value in another context. <code>Applicative</code> gives us just such a tool. Here is the type class declaration for <code>Applicative</code>, as defined in <code>Control.Applicative</code>:
Recall that <code>Functor</code> allows us to lift a “normal” function to a function on computational contexts. But <code>fmap</code> doesn’t allow us to apply a function which is itself in a context to a value in a context. <code>Applicative</code> gives us just such a tool, <code>(<*>)</code> (variously pronounced as "apply", "app", or "splat"). It also provides a method, <code>pure</code>, for embedding values in a default, “effect free” context. Here is the type class declaration for <code>Applicative</code>, as defined in <code>Control.Applicative</code>:
class Functor f => Applicative f where
pure :: a -> f a -- aka point
pure :: a -> f a
infixl 4 <*>, *>, <*
(<*>) :: f (a -> b) -> f a -> f b
(*>) :: f a -> f b -> f b
a1 *> a2 = (id <$ a1) <*> a2
(<*) :: f a -> f b -> f a
(<*) = liftA2 const
Note that every <code>Applicative</code> must also be a <code>Functor</code>. In fact, as we will see, <code>fmap</code> can be implemented using the <code>Applicative</code> methods, so every <code>Applicative</code> is a functor whether we like it or not; the <code>Functor</code> constraint forces us to be honest.
<code>(*>)</code> and <code>(<*)</code> are provided for convenience, in case a particular instance of <code>Applicative</code> can provide more efficient implementations, but they are provided with default implementations. For more on these operators, see the section on [[#Utility functions|Utility functions]] below.
{{note|Recall that <code>($)</code> is just function application: <code>f $ x {{=}} f x</code>.}}
As always, it’s crucial to understand the type signature of <code>(<*>)</code>. The best way of thinking about it comes from noting that the type of <code>(<*>)</code> is similar to the type of <code>($)</code> {{noteref}}, but with everything enclosed in an <code>f</code>. In other words, <code>(<*>)</code> is just function application within a computational context. The type of <code>(<*>)</code> is also very similar to the type of <code>fmap</code>; the only difference is that the first parameter is <code>f (a -> b)</code>, a function in a context, instead of a “normal” function <code>(a -> b)</code>.
As always, it’s crucial to understand the type signatures. First, consider <code>(<*>)</code>: the best way of thinking about it comes from noting that the type of <code>(<*>)</code> is similar to the type of <code>($)</code> {{noteref}}, but with everything enclosed in an <code>f</code>. In other words, <code>(<*>)</code> is just function application within a computational context. The type of <code>(<*>)</code> is also very similar to the type of <code>fmap</code>; the only difference is that the first parameter is <code>f (a -> b)</code>, a function in a context, instead of a “normal” function <code>(a -> b)</code>.
Of course, <code>pure</code> looks rather familiar. It is the <code>point</code> function from the <code>Pointed</code> type class. If we actually had it in the standard library, and <code>pure</code> appearing under the other name didn’t bother you, then <code>Applicative</code> could instead be defined as:
<code>pure</code> takes a value of any type <code>a</code>, and returns a context/container of type <code>f a</code>. The intention is that <code>pure</code> creates some sort of “default” container or “effect free” context. In fact, the behavior of <code>pure</code> is quite constrained by the laws it should satisfy in conjunction with <code>(<*>)</code>. Usually, for a given implementation of <code>(<*>)</code> there is only one possible implementation of <code>pure</code>.
(Note that previous versions of the Typeclassopedia explained <code>pure</code> in terms of a type class <code>Pointed</code>, which can still be found in the [http://hackage.haskell.org/package/pointed <code>pointed</code> package]. However, the current consensus is that <code>Pointed</code> is not very useful after all. For a more detailed explanation, see [[Why not Pointed?]])
class Pointed f => Applicative' f where
==Laws==
{{note|See
[http://haskell.org/ghc/docs/latest/html/libraries/base/Control-Applicative.html haddock for Applicative] and [http://www.soi.city.ac.uk/~ross/papers/Applicative.html Applicative programming with effects]}}
[{{HackageDocs|base|Control-Applicative}} haddock for Applicative] and [http://www.soi.city.ac.uk/~ross/papers/Applicative.html Applicative programming with effects]}}
Traditionally, there are four laws that <code>Applicative</code> instances should satisfy {{noteref}}. In some sense, they are all concerned with making sure that <code>pure</code> deserves its name:
* The identity law:<br /><haskell>pure id <*> v = v</haskell>
* Homomorphism:<br /><haskell>pure f <*> pure x = pure (f x)</haskell>Intuitively, applying a non-effectful function to a non-effectful argument in an effectful context is the same as just applying the function to the argument and then injecting the result into the context with <code>pure</code>.
* Interchange:<br /><haskell>u <*> pure y = pure ($ y) <*> u</haskell>Intuitively, this says that when evaluating the application of an effectful function to a pure argument, the order in which we evaluate the function and its argument doesn't matter.
* Composition:<br /><haskell>u <*> (v <*> w) = pure (.) <*> u <*> v <*> w </haskell>This one is the trickiest law to gain intuition for. In some sense it is expressing a sort of associativity property of <code>(<*>)</code>. The reader may wish to simply convince themselves that this law is type-correct.
Considered as left-to-right rewrite rules, the homomorphism, interchange, and composition laws actually constitute an algorithm for transforming any expression using <code>pure</code> and <code>(<*>)</code> into a canonical form with only a single use of <code>pure</code> at the very beginning and only left-nested occurrences of <code>(<*>)</code>. Composition allows reassociating <code>(<*>)</code>; interchange allows moving occurrences of <code>pure</code> leftwards; and homomorphism allows collapsing multiple adjacent occurrences of <code>pure</code> into one.
There are several laws that <code>Applicative</code> instances should satisfy {{noteref}}, but only one is crucial to developing intuition, because it specifies how <code>Applicative</code> should relate to <code>Functor</code> (the other four mostly specify the exact sense in which <code>pure</code> deserves its name). This law is:
There is also a law specifying how <code>Applicative</code> should relate to <code>Functor</code>:
It says that mapping a pure function <code>g</code> over a context <code>x</code> is the same as first injecting <code>g</code> into a context with <code>pure</code>, and then applying it to <code>x</code> with <code>(<*>)</code>. In other words, we can decompose <code>fmap</code> into two more atomic operations: injection into a context, and application within a context. The <code>Control.Applicative</code> module also defines <code>(<$>)</code> as a synonym for <code>fmap</code>, so the above law can also be expressed as:
It says that mapping a pure function <code>g</code> over a context <code>x</code> is the same as first injecting <code>g</code> into a context with <code>pure</code>, and then applying it to <code>x</code> with <code>(<*>)</code>. In other words, we can decompose <code>fmap</code> into two more atomic operations: injection into a context, and application within a context. Since <code>(<$>)</code> is a synonym for <code>fmap</code>, the above law can also be expressed as:
<code>g <$> x = pure g <*> x</code>.
# (Tricky) One might imagine a variant of the interchange law that says something about applying a pure function to an effectful argument. Using the above laws, prove that<haskell>pure f <*> x = pure (flip ($)) <*> x <*> pure f</haskell>
instance Applicative ZipList where
pure :: a -> ZipList a
pure = undefined -- exercise
(<*>) :: ZipList (a -> b) -> ZipList a -> ZipList b
(ZipList gs) <*> (ZipList xs) = ZipList (zipWith ($) gs xs)
To apply a list of functions to a list of inputs with <code>(<*>)</code>, we just match up the functions and inputs elementwise, and produce a list of the resulting outputs. In other words, we “zip” the lists together with function application, <code>($)</code>; hence the name <code>ZipList</code>. As an exercise, determine the correct definition of <code>pure</code>—there is only one implementation that satisfies the law (see section “Laws”).
To apply a list of functions to a list of inputs with <code>(<*>)</code>, we just match up the functions and inputs elementwise, and produce a list of the resulting outputs. In other words, we “zip” the lists together with function application, <code>($)</code>; hence the name <code>ZipList</code>.
The other <code>Applicative</code> instance for lists, based on the nondeterministic computation point of view, is:
instance Applicative [] where
pure :: a -> [a]
pure x = [x]
(<*>) :: [a -> b] -> [a] -> [b]
gs <*> xs = [ g x | g <- gs, x <- xs ]
There are several other <code>Applicative</code> instances as well:
* <code>IO</code> is an instance of <code>Applicative</code>, and behaves exactly as you would think: when <code>g <$> m1 <*> m2 <*> m3</code> is executed, the effects from the <code>mi</code>’s happen in order from left to right.
* <code>IO</code> is an instance of <code>Applicative</code>, and behaves exactly as you would think: to execute <code>m1 <*> m2</code>, first <code>m1</code> is executed, resulting in a function <code>f</code>, then <code>m2</code> is executed, resulting in a value <code>x</code>, and finally the value <code>f x</code> is returned as the result of executing <code>m1 <*> m2</code>.
* <code>((,) a)</code> is an <code>Applicative</code>, as long as <code>a</code> is an instance of <code>Monoid</code> ([[#Monoid|section Monoid]]). The <code>a</code> values are accumulated in parallel with the computation.
* The <code>WrappedMonad</code> and <code>WrappedArrow</code> newtypes make any instances of <code>Monad</code> ([[#Monad|section Monad]]) or <code>Arrow</code> ([[#Arrow|section Arrow]]) respectively into instances of <code>Applicative</code>; as we will see when we study those type classes, both are strictly more expressive than <code>Applicative</code>, in the sense that the <code>Applicative</code> methods can be implemented in terms of their methods.
# Implement an instance of <code>Applicative</code> for <code>Maybe</code>.
# Determine the correct definition of <code>pure</code> for the <code>ZipList</code> instance of <code>Applicative</code>—there is only one implementation that satisfies the law relating <code>pure</code> and <code>(<*>)</code>.
==Intuition==
recalling that <code>Control.Applicative</code> defines <code>(<$>)</code> as convenient infix shorthand for <code>fmap</code>. This is what is meant by an “applicative style”—effectful computations can still be described in terms of function application; the only difference is that we have to use the special operator <code>(<*>)</code> for application instead of simple juxtaposition.
Note that <code>pure</code> allows embedding “non-effectful” arguments in the middle of an idiomatic application, like
g <$> x1 <*> pure x2 <*> x3
which has type <code>f d</code>, given
g :: a -> b -> c -> d
x1 :: f a
x2 :: b
x3 :: f c
There are many other useful combinators in the standard libraries implemented in terms of <code>pure</code> and <code>(<*>)</code>: for example, <code>(*>)</code>, <code>(<*)</code>, <code>(<**>)</code>, <code>(<$)</code>, and so on (see [http://haskell.org/ghc/docs/latest/html/libraries/base/Control-Applicative.html haddock for Applicative]). Judicious use of such secondary combinators can often make code using <code>Applicative</code>s much easier to read.
The double brackets are commonly known as “idiom brackets”, because they allow writing “idiomatic” function application, that is, function application that looks normal but has some special, non-standard meaning (determined by the particular instance of <code>Applicative</code> being used). Idiom brackets are not supported by GHC, but they are supported by the [http://personal.cis.strath.ac.uk/~conor/pub/she/ Strathclyde Haskell Enhancement], a preprocessor which (among many other things) translates idiom brackets into standard uses of <code>(<$>)</code> and <code>(<*>)</code>. This can result in much more readable code when making heavy use of <code>Applicative</code>.
In addition, as of GHC 8, the <code>ApplicativeDo</code> extension enables <code>g <$> x1 <*> x2 <*> ... <*> xn</code> to be written in a different style:
do v1 <- x1
v2 <- x2
vn <- xn
pure (g v1 v2 ... vn)
See the Further Reading section below as well as the discussion of do-notation in the Monad section for more information.
<code>Control.Applicative</code> provides several utility functions that work generically with any <code>Applicative</code> instance.
* <code>liftA :: Applicative f => (a -> b) -> f a -> f b</code>. This should be familiar; of course, it is the same as <code>fmap</code> (and hence also the same as <code>(<$>)</code>), but with a more restrictive type. This probably exists to provide a parallel to <code>liftA2</code> and <code>liftA3</code>, but there is no reason you should ever need to use it.
* <code>liftA2 :: Applicative f => (a -> b -> c) -> f a -> f b -> f c</code> lifts a 2-argument function to operate in the context of some <code>Applicative</code>. When <code>liftA2</code> is fully applied, as in <code>liftA2 f arg1 arg2</code>,it is typically better style to instead use <code>f <$> arg1 <*> arg2</code>. However, <code>liftA2</code> can be useful in situations where it is partially applied. For example, one could define a <code>Num</code> instance for <code>Maybe Integer</code> by defining <code>(+) = liftA2 (+)</code> and so on.
* There is a <code>liftA3</code> but no <code>liftAn</code> for larger <code>n</code>.
* <code>(*>) :: Applicative f => f a -> f b -> f b</code> sequences the effects of two <code>Applicative</code> computations, but discards the result of the first. For example, if <code>m1, m2 :: Maybe Int</code>, then <code>m1 *> m2</code> is <code>Nothing</code> whenever either <code>m1</code> or <code>m2</code> is <code>Nothing</code>; but if not, it will have the same value as <code>m2</code>.
* Likewise, <code>(<*) :: Applicative f => f a -> f b -> f a</code> sequences the effects of two computations, but keeps only the result of the first, discarding the result of the second. Just as with <code>(<$)</code> and <code>($>)</code>, to keep <code>(<*)</code> and <code>(*>)</code> straight, remember that they point towards the values that will be kept.
* <code>(<**>) :: Applicative f => f a -> f (a -> b) -> f b</code> is similar to <code>(<*>)</code>, but where the first computation produces value(s) which are provided as input to the function(s) produced by the second computation. Note this is not the same as <code>flip (<*>)</code>, because the effects are performed in the opposite order. This is possible to observe with any <code>Applicative</code> instance with non-commutative effects, such as the instance for lists: <code>(<**>) [1,2] [(+5),(*10)]</code> produces a different result than <code>(flip (<*>))</code> on the same arguments.
* <code>when :: Applicative f => Bool -> f () -> f ()</code> conditionally executes a computation, evaluating to its second argument if the test is <code>True</code>, and to <code>pure ()</code> if the test is <code>False</code>.
* <code>unless :: Applicative f => Bool -> f () -> f ()</code> is like <code>when</code>, but with the test negated.
* The <code>guard</code> function is for use with instances of <code>Alternative</code> (an extension of <code>Applicative</code> to incorporate the ideas of failure and choice), which is discussed in the [[#Failure_and_choice:_Alternative.2C_MonadPlus.2C_ArrowPlus|section on <code>Alternative</code> and friends]].
# Implement a function <haskell>sequenceAL :: Applicative f => [f a] -> f [a]</haskell>. There is a generalized version of this, <code>sequenceA</code>, which works for any <code>Traversable</code> (see the later section on Traversable), but implementing this version specialized to lists is a good exercise.
==Alternative formulation==
An alternative, equivalent formulation of <code>Applicative</code> is given by
class Functor f => Monoidal f where
unit :: f ()
(**) :: f a -> f b -> f (a,b)
{{note|In category-theory speak, we say <code>f</code> is a ''lax'' monoidal functor because there aren't necessarily functions in the other direction, like <code>f (a, b) -> (f a, f b)</code>.}}
Intuitively, this states that a <i>monoidal</i> functor{{noteref}} is one which has some sort of "default shape" and which supports some sort of "combining" operation. <code>pure</code> and <code>(<*>)</code> are equivalent in power to <code>unit</code> and <code>(**)</code> (see the Exercises below). More technically, the idea is that <code>f</code> preserves the "monoidal structure" given by the pairing constructor <code>(,)</code> and unit type <code>()</code>. This can be seen even more clearly if we rewrite the types of <code>unit</code> and <code>(**)</code> as
unit' :: () -> f ()
(**') :: (f a, f b) -> f (a, b)
Furthermore, to deserve the name "monoidal" (see the [[#Monoid|section on Monoids]]), instances of <code>Monoidal</code> ought to satisfy the following laws, which seem much more straightforward than the traditional <code>Applicative</code> laws:
{{note|In this and the following laws, <code>≅</code> refers to <i>isomorphism</i> rather than equality. In particular we consider <code>(x,()) ≅ x ≅ ((),x)</code> and <code>((x,y),z) ≅ (x,(y,z))</code>.}}
* Left identity{{noteref}}: <haskell>unit ** v ≅ v</haskell>
* Right identity: <haskell>u ** unit ≅ u</haskell>
* Associativity: <haskell>u ** (v ** w) ≅ (u ** v) ** w</haskell>
These turn out to be equivalent to the usual <code>Applicative</code> laws. In a category theory setting, one would also require a naturality law:
{{note|Here <code>g *** h {{=}} \(x,y) -> (g x, h y)</code>. See [[#Arrow|Arrows]].}}
* Naturality: <haskell>fmap (g *** h) (u ** v) = fmap g u ** fmap h v</haskell>
but in the context of Haskell, this is a free theorem.
Much of this section was taken from [http://blog.ezyang.com/2012/08/applicative-functors/ a blog post by Edward Z. Yang]; see his actual post for a bit more information.
# Implement <code>pure</code> and <code>(<*>)</code> in terms of <code>unit</code> and <code>(**)</code>, and vice versa.
# Are there any <code>Applicative</code> instances for which there are also functions <code>f () -> ()</code> and <code>f (a,b) -> (f a, f b)</code>, satisfying some "reasonable" laws?
# (Tricky) Prove that given your implementations from the first exercise, the usual <code>Applicative</code> laws and the <code>Monoidal</code> laws stated above are equivalent.
[http://www.soi.city.ac.uk/~ross/papers/Applicative.html McBride and Paterson’s original paper] is a treasure-trove of information and examples, as well as some perspectives on the connection between <code>Applicative</code> and category theory. Beginners will find it difficult to make it through the entire paper, but it is extremely well-motivated—even beginners will be able to glean something from reading as far as they are able.
{{note|Introduced by [http://conal.net/papers/simply-reactive/ an earlier paper] that was since superceded by [http://conal.net/papers/push-pull-frp/ Push-pull functional reactive programming]. —Geheimdienst, Nov 2011}}
{{note|Introduced by [http://conal.net/papers/simply-reactive/ an earlier paper] that was since superseded by [http://conal.net/papers/push-pull-frp/ Push-pull functional reactive programming].}}
Conal Elliott has been one of the biggest proponents of <code>Applicative</code>. For example, the [http://conal.net/papers/functional-images/ Pan library for functional images] and the reactive library for functional reactive programming (FRP) {{noteref}} make key use of it; his blog also contains [http://conal.net/blog/tag/applicative-functor many examples of <code>Applicative</code> in action]. Building on the work of McBride and Paterson, Elliott also built the [[TypeCompose]] library, which embodies the observation (among others) that <code>Applicative</code> types are closed under composition; therefore, <code>Applicative</code> instances can often be automatically derived for complex types built out of simpler ones.
Although the [http://legacy.cs.uu.nl/daan/parsec.html Parsec parsing library] ([http://legacy.cs.uu.nl/daan/download/papers/parsec-paper.pdf paper]) was originally designed for use as a monad, in its most common use cases an <code>Applicative</code> instance can be used to great effect; [http://www.serpentine.com/blog/2008/02/06/the-basics-of-applicative-functors-put-to-practical-work/ Bryan O’Sullivan’s blog post] is a good starting point. If the extra power provided by <code>Monad</code> isn’t needed, it’s usually a good idea to use <code>Applicative</code> instead.
Although the [http://hackage.haskell.org/package/parsec Parsec parsing library] ([http://legacy.cs.uu.nl/daan/download/papers/parsec-paper.pdf paper]) was originally designed for use as a monad, in its most common use cases an <code>Applicative</code> instance can be used to great effect; [http://www.serpentine.com/blog/2008/02/06/the-basics-of-applicative-functors-put-to-practical-work/ Bryan O’Sullivan’s blog post] is a good starting point. If the extra power provided by <code>Monad</code> isn’t needed, it’s usually a good idea to use <code>Applicative</code> instead.
A couple other nice examples of <code>Applicative</code> in action include the [http://web.archive.org/web/20090416111947/chrisdone.com/blog/html/2009-02-10-applicative-configfile-hsql.html ConfigFile and HSQL libraries] and the [http://groups.inf.ed.ac.uk/links/formlets/ formlets library].
Gershom Bazerman's [http://comonad.com/reader/2012/abstracting-with-applicatives/ post] contains many insights into applicatives.
A couple other nice examples of <code>Applicative</code> in action include the [http://chrisdone.com/blog/html/2009-02-10-applicative-configfile-hsql.html ConfigFile and HSQL libraries] and the [http://groups.inf.ed.ac.uk/links/formlets/ formlets library].
The <code>ApplicativeDo</code> extension is described in [https://ghc.haskell.org/trac/ghc/wiki/ApplicativeDo this wiki page], and in more detail in [http://doi.org/10.1145/2976002.2976007 this Haskell Symposium paper].
=Monad=
* Haskell does, in fact, single out monads for special attention by making them the framework in which to construct I/O operations.
* Haskell also singles out monads for special attention by providing a special syntactic sugar for monadic expressions: the <code>do</code>-notation.
* Haskell also singles out monads for special attention by providing a special syntactic sugar for monadic expressions: the <code>do</code>-notation. (As of GHC 8, <code>do</code>-notation can be used with <code>Applicative</code> as well, but the notation is still fundamentally related to monads.)
* <code>Monad</code> has been around longer than other abstract models of computation such as <code>Applicative</code> or <code>Arrow</code>.
* The more monad tutorials there are, the harder people think monads must be, and the more new monad tutorials are written by people who think they finally “get” monads (the [http://byorgey.wordpress.com/2009/01/12/abstraction-intuition-and-the-monad-tutorial-fallacy/ monad tutorial fallacy]).
As of GHC 7.10, [{{HackageDocs|base|Prelude}}#t:Monad <code>Monad</code>] is defined as:
The type class declaration for [http://haskell.org/ghc/docs/latest/html/libraries/base/Prelude.html#t:Monad <code>Monad</code>] is:
class Monad m where
class Applicative m => Monad m where
return :: a -> m a
(>>=) :: m a -> (a -> m b) -> m b
The <code>Monad</code> type class is exported by the <code>Prelude</code>, along with a few standard instances. However, many utility functions are found in [http://haskell.org/ghc/docs/latest/html/libraries/base/Control-Monad.html <code>Control.Monad</code>], and there are also several instances (such as <code>((->) e)</code>) defined in [http://haskell.org/ghc/docs/latest/html/libraries/base/Control-Monad-Instances.html <code>Control.Monad.Instances</code>].
(Prior to GHC 7.10, <code>Applicative</code> was not a superclass of <code>Monad</code>, for historical reasons.)
The <code>Monad</code> type class is exported by the <code>Prelude</code>, along with a few standard instances. However, many utility functions are found in [{{HackageDocs|base|Control-Monad}} <code>Control.Monad</code>].
Let’s examine the methods in the <code>Monad</code> class one by one. The type of <code>return</code> should look familiar; it’s the same as <code>pure</code>. Indeed, <code>return</code> ''is'' <code>pure</code>, but with an unfortunate name. (Unfortunate, since someone coming from an imperative programming background might think that <code>return</code> is like the C or Java keyword of the same name, when in fact the similarities are minimal.) From a mathematical point of view, every monad is an applicative functor, but for historical reasons, the <code>Monad</code> type class declaration unfortunately does not require this.
Let’s examine the methods in the <code>Monad</code> class one by one. The type of <code>return</code> should look familiar; it’s the same as <code>pure</code>. Indeed, <code>return</code> ''is'' <code>pure</code>, but with an unfortunate name. (Unfortunate, since someone coming from an imperative programming background might think that <code>return</code> is like the C or Java keyword of the same name, when in fact the similarities are minimal.) For historical reasons, we still have both names, but they should always denote the same value (although this cannot be enforced). Likewise, <code>(>>)</code> should be the same as <code>(*>)</code> from <code>Applicative</code>. It is possible that <code>return</code> and <code>(>>)</code> may eventually be removed from the <code>Monad</code> class: see the [https://ghc.haskell.org/trac/ghc/wiki/Proposal/MonadOfNoReturn Monad of No Return proposal].
We can see that <code>(>>)</code> is a specialized version of <code>(>>=)</code>, with a default implementation given. It is only included in the type class declaration so that specific instances of <code>Monad</code> can override the default implementation of <code>(>>)</code> with a more efficient one, if desired. Also, note that although <code>_ >> n = n</code> would be a type-correct implementation of <code>(>>)</code>, it would not correspond to the intended semantics: the intention is that <code>m >> n</code> ignores the ''result'' of <code>m</code>, but not its ''effects''.
The <code>fail</code> function is an awful hack that has no place in the <code>Monad</code> class; more on this later.
The only really interesting thing to look at—and what makes <code>Monad</code> strictly more powerful than <code>Applicative</code>—is <code>(>>=)</code>, which is often called ''bind''. An alternative definition of <code>Monad</code> could look like:
The only really interesting thing to look at—and what makes <code>Monad</code> strictly more powerful than <code>Applicative</code>—is <code>(>>=)</code>, which is often called ''bind''.
class Applicative m => Monad' m where
We could spend a while talking about the intuition behind <code>(>>=)</code>—and we will. But first, let’s look at some examples.
Even if you don’t understand the intuition behind the <code>Monad</code> class, you can still create instances of it by just seeing where the types lead you. You may be surprised to find that this actually gets you a long way towards understanding the intuition; at the very least, it will give you some concrete examples to play with as you read more about the <code>Monad</code> class in general. The first few examples are from the standard <code>Prelude</code>; the remaining examples are from the monad transformer library ([http://hackage.haskell.org/package/mtl mtl]).
Even if you don’t understand the intuition behind the <code>Monad</code> class, you can still create instances of it by just seeing where the types lead you. You may be surprised to find that this actually gets you a long way towards understanding the intuition; at the very least, it will give you some concrete examples to play with as you read more about the <code>Monad</code> class in general. The first few examples are from the standard <code>Prelude</code>; the remaining examples are from the [http://hackage.haskell.org/package/transformers <code>transformers</code> package].
<li>The simplest possible instance of <code>Monad</code> is [http://hackage.haskell.org/packages/archive/mtl/1.1.0.2/doc/html/Control-Monad-Identity.html <code>Identity</code>], which is described in Dan Piponi’s highly recommended blog post on [http://blog.sigfpe.com/2007/04/trivial-monad.html The Trivial Monad]. Despite being “trivial”, it is a great introduction to the <code>Monad</code> type class, and contains some good exercises to get your brain working.
<li>The next simplest instance of <code>Monad</code> is <code>Maybe</code>. We already know how to write <code>return</code>/<code>pure</code> for <code>Maybe</code>. So how do we write <code>(>>=)</code>? Well, let’s think about its type. Specializing for <code>Maybe</code>, we have
* The simplest possible instance of <code>Monad</code> is [http://hackage.haskell.org/packages/archive/mtl/1.1.0.2/doc/html/Control-Monad-Identity.html <code>Identity</code>], which is described in Dan Piponi’s highly recommended blog post on [http://blog.sigfpe.com/2007/04/trivial-monad.html The Trivial Monad]. Despite being “trivial”, it is a great introduction to the <code>Monad</code> type class, and contains some good exercises to get your brain working.
* The next simplest instance of <code>Monad</code> is <code>Maybe</code>. We already know how to write <code>return</code>/<code>pure</code> for <code>Maybe</code>. So how do we write <code>(>>=)</code>? Well, let’s think about its type. Specializing for <code>Maybe</code>, we have
(>>=) :: Maybe a -> (a -> Maybe b) -> Maybe b.
:If the first argument to <code>(>>=)</code> is <code>Just x</code>, then we have something of type <code>a</code> (namely, <code>x</code>), to which we can apply the second argument—resulting in a <code>Maybe b</code>, which is exactly what we wanted. What if the first argument to <code>(>>=)</code> is <code>Nothing</code>? In that case, we don’t have anything to which we can apply the <code>a -> Maybe b</code> function, so there’s only one thing we can do: yield <code>Nothing</code>. This instance is:
If the first argument to <code>(>>=)</code> is <code>Just x</code>, then we have something of type <code>a</code> (namely, <code>x</code>), to which we can apply the second argument—resulting in a <code>Maybe b</code>, which is exactly what we wanted. What if the first argument to <code>(>>=)</code> is <code>Nothing</code>? In that case, we don’t have anything to which we can apply the <code>a -> Maybe b</code> function, so there’s only one thing we can do: yield <code>Nothing</code>. This instance is:
instance Monad Maybe where
return :: a -> Maybe a
return = Just
(>>=) :: Maybe a -> (a -> Maybe b) -> Maybe b
(Just x) >>= g = g x
Nothing >>= _ = Nothing
:We can already get a bit of intuition as to what is going on here: if we build up a computation by chaining together a bunch of functions with <code>(>>=)</code>, as soon as any one of them fails, the entire computation will fail (because <code>Nothing >>= f</code> is <code>Nothing</code>, no matter what <code>f</code> is). The entire computation succeeds only if all the constituent functions individually succeed. So the <code>Maybe</code> monad models computations which may fail.
We can already get a bit of intuition as to what is going on here: if we build up a computation by chaining together a bunch of functions with <code>(>>=)</code>, as soon as any one of them fails, the entire computation will fail (because <code>Nothing >>= f</code> is <code>Nothing</code>, no matter what <code>f</code> is). The entire computation succeeds only if all the constituent functions individually succeed. So the <code>Maybe</code> monad models computations which may fail.
* The <code>Monad</code> instance for the list constructor <code>[]</code> is similar to its <code>Applicative</code> instance; see the exercise below.
<li>The <code>Monad</code> instance for the list constructor <code>[]</code> is similar to its <code>Applicative</code> instance; see the exercise below.
* Of course, the <code>IO</code> constructor is famously a <code>Monad</code>, but its implementation is somewhat magical, and may in fact differ from compiler to compiler. It is worth emphasizing that the <code>IO</code> monad is the ''only'' monad which is magical. It allows us to build up, in an entirely pure way, values representing possibly effectful computations. The special value <code>main</code>, of type <code>IO ()</code>, is taken by the runtime and actually executed, producing actual effects. Every other monad is functionally pure, and requires no special compiler support. We often speak of monadic values as “effectful computations”, but this is because some monads allow us to write code ''as if'' it has side effects, when in fact the monad is hiding the plumbing which allows these apparent side effects to be implemented in a functionally pure way.
<li>Of course, the <code>IO</code> constructor is famously a <code>Monad</code>, but its implementation is somewhat magical, and may in fact differ from compiler to compiler. It is worth emphasizing that the <code>IO</code> monad is the ''only'' monad which is magical. It allows us to build up, in an entirely pure way, values representing possibly effectful computations. The special value <code>main</code>, of type <code>IO ()</code>, is taken by the runtime and actually executed, producing actual effects. Every other monad is functionally pure, and requires no special compiler support. We often speak of monadic values as “effectful computations”, but this is because some monads allow us to write code ''as if'' it has side effects, when in fact the monad is hiding the plumbing which allows these apparent side effects to be implemented in a functionally pure way.
* As mentioned earlier, <code>((->) e)</code> is known as the ''reader monad'', since it describes computations in which a value of type <code>e</code> is available as a read-only environment.
<li>As mentioned earlier, <code>((->) e)</code> is known as the ''reader monad'', since it describes computations in which a value of type <code>e</code> is available as a read-only environment.
:The [http://hackage.haskell.org/packages/archive/mtl/latest/doc/html/Control-Monad-Reader.html <code>Control.Monad.Reader</code>] module provides the <code>Reader e a</code> type, which is just a convenient <code>newtype</code> wrapper around <code>(e -> a)</code>, along with an appropriate <code>Monad</code> instance and some <code>Reader</code>-specific utility functions such as <code>ask</code> (retrieve the environment), <code>asks</code> (retrieve a function of the environment), and <code>local</code> (run a subcomputation under a different environment).
The [http://hackage.haskell.org/packages/archive/mtl/latest/doc/html/Control-Monad-Reader.html <code>Control.Monad.Reader</code>] module provides the <code>Reader e a</code> type, which is just a convenient <code>newtype</code> wrapper around <code>(e -> a)</code>, along with an appropriate <code>Monad</code> instance and some <code>Reader</code>-specific utility functions such as <code>ask</code> (retrieve the environment), <code>asks</code> (retrieve a function of the environment), and <code>local</code> (run a subcomputation under a different environment).
* The [http://hackage.haskell.org/packages/archive/mtl/latest/doc/html/Control-Monad-Writer-Lazy.html <code>Control.Monad.Writer</code>] module provides the <code>Writer</code> monad, which allows information to be collected as a computation progresses. <code>Writer w a</code> is isomorphic to <code>(a,w)</code>, where the output value <code>a</code> is carried along with an annotation or “log” of type <code>w</code>, which must be an instance of <code>Monoid</code> (see [[#Monoid|section Monoid]]); the special function <code>tell</code> performs logging.
<li>The [http://hackage.haskell.org/packages/archive/mtl/latest/doc/html/Control-Monad-Writer-Lazy.html <code>Control.Monad.Writer</code>] module provides the <code>Writer</code> monad, which allows information to be collected as a computation progresses. <code>Writer w a</code> is isomorphic to <code>(a,w)</code>, where the output value <code>a</code> is carried along with an annotation or “log” of type <code>w</code>, which must be an instance of <code>Monoid</code> (see [[#Monoid|section Monoid]]); the special function <code>tell</code> performs logging.
* The [http://hackage.haskell.org/packages/archive/mtl/latest/doc/html/Control-Monad-State-Lazy.html <code>Control.Monad.State</code>] module provides the <code>State s a</code> type, a <code>newtype</code> wrapper around <code>s -> (a,s)</code>. Something of type <code>State s a</code> represents a stateful computation which produces an <code>a</code> but can access and modify the state of type <code>s</code> along the way. The module also provides <code>State</code>-specific utility functions such as <code>get</code> (read the current state), <code>gets</code> (read a function of the current state), <code>put</code> (overwrite the state), and <code>modify</code> (apply a function to the state).
<li>The [http://hackage.haskell.org/packages/archive/mtl/latest/doc/html/Control-Monad-State-Lazy.html <code>Control.Monad.State</code>] module provides the <code>State s a</code> type, a <code>newtype</code> wrapper around <code>s -> (a,s)</code>. Something of type <code>State s a</code> represents a stateful computation which produces an <code>a</code> but can access and modify the state of type <code>s</code> along the way. The module also provides <code>State</code>-specific utility functions such as <code>get</code> (read the current state), <code>gets</code> (read a function of the current state), <code>put</code> (overwrite the state), and <code>modify</code> (apply a function to the state).
* The [http://hackage.haskell.org/packages/archive/mtl/latest/doc/html/Control-Monad-Cont.html <code>Control.Monad.Cont</code>] module provides the <code>Cont</code> monad, which represents computations in continuation-passing style. It can be used to suspend and resume computations, and to implement non-local transfers of control, co-routines, other complex control structures—all in a functionally pure way. <code>Cont</code> has been called the [http://blog.sigfpe.com/2008/12/mother-of-all-monads.html “mother of all monads”] because of its universal properties.
<li>The [http://hackage.haskell.org/packages/archive/mtl/latest/doc/html/Control-Monad-Cont.html <code>Control.Monad.Cont</code>] module provides the <code>Cont</code> monad, which represents computations in continuation-passing style. It can be used to suspend and resume computations, and to implement non-local transfers of control, co-routines, other complex control structures—all in a functionally pure way. <code>Cont</code> has been called the [http://blog.sigfpe.com/2008/12/mother-of-all-monads.html “mother of all monads”] because of its universal properties.
# Implement a <code>Monad</code> instance for the list constructor, <code>[]</code>. Follow the types!
# Implement a <code>Monad</code> instance for <code>((->) e)</code>.
<li>Implement a <code>Monad</code> instance for the list constructor, <code>[]</code>. Follow the types!</li>
<li>Implement a <code>Monad</code> instance for <code>((->) e)</code>.</li>
<li>Implement <code>Functor</code> and <code>Monad</code> instances for <code>Free f</code>, defined as
data Free f a = Var a
| Node (f (Free f a))
You may assume that <code>f</code> has a <code>Functor</code> instance. This is known as the ''free monad'' built from the functor <code>f</code>.
Let’s look more closely at the type of <code>(>>=)</code>. The basic intuition is that it combines two computations into one larger computation. The first argument, <code>m a</code>, is the first computation. However, it would be boring if the second argument were just an <code>m b</code>; then there would be no way for the computations to interact with one another. So, the second argument to <code>(>>=)</code> has type <code>a -> m b</code>: a function of this type, given a ''result'' of the first computation, can produce a second computation to be run. In other words, <code>x >>= k</code> is a computation which runs <code>x</code>, and then uses the result(s) of <code>x</code> to ''decide'' what computation to run second, using the output of the second computation as the result of the entire computation.
Let’s look more closely at the type of <code>(>>=)</code>. The basic intuition is that it combines two computations into one larger computation. The first argument, <code>m a</code>, is the first computation. However, it would be boring if the second argument were just an <code>m b</code>; then there would be no way for the computations to interact with one another (actually, this is exactly the situation with <code>Applicative</code>). So, the second argument to <code>(>>=)</code> has type <code>a -> m b</code>: a function of this type, given a ''result'' of the first computation, can produce a second computation to be run. In other words, <code>x >>= k</code> is a computation which runs <code>x</code>, and then uses the result(s) of <code>x</code> to ''decide'' what computation to run second, using the output of the second computation as the result of the entire computation.
Intuitively, it is this ability to use the output from previous computations to decide what computations to run next that makes <code>Monad</code> more powerful than <code>Applicative</code>. The structure of an <code>Applicative</code> computation is fixed, whereas the structure of a <code>Monad</code> computation can change based on intermediate results.
{{note|Actually, because Haskell allows general recursion, one can recursively construct ''infinite'' grammars, and hence <code>Applicative</code> (together with <code>Alternative</code>) is enough to parse any context-sensitive language with a finite alphabet. See [http://byorgey.wordpress.com/2012/01/05/parsing-context-sensitive-languages-with-applicative/ Parsing context-sensitive languages with Applicative].}}
Intuitively, it is this ability to use the output from previous computations to decide what computations to run next that makes <code>Monad</code> more powerful than <code>Applicative</code>. The structure of an <code>Applicative</code> computation is fixed, whereas the structure of a <code>Monad</code> computation can change based on intermediate results. This also means that parsers built using an <code>Applicative</code> interface can only parse context-free languages; in order to parse context-sensitive languages a <code>Monad</code> interface is needed.{{noteref}}
To see the increased power of <code>Monad</code> from a different point of view, let’s see what happens if we try to implement <code>(>>=)</code> in terms of <code>fmap</code>, <code>pure</code>, and <code>(<*>)</code>. We are given a value <code>x</code> of type <code>m a</code>, and a function <code>k</code> of type <code>a -> m b</code>, so the only thing we can do is apply <code>k</code> to <code>x</code>. We can’t apply it directly, of course; we have to use <code>fmap</code> to lift it over the <code>m</code>. But what is the type of <code>fmap k</code>? Well, it’s <code>m a -> m (m b)</code>. So after we apply it to <code>x</code>, we are left with something of type <code>m (m b)</code>—but now we are stuck; what we really want is an <code>m b</code>, but there’s no way to get there from here. We can ''add'' <code>m</code>’s using <code>pure</code>, but we have no way to ''collapse'' multiple <code>m</code>’s into one.
{{note|1=You might hear some people claim that the definition in terms of <code>return</code>, <code>fmap</code>, and <code>join</code> is the “math definition” and the definition in terms of <code>return</code> and <code>(>>=)</code> is something specific to Haskell. In fact, both definitions were known in the mathematics community long before Haskell picked up monads.}}
This ability to collapse multiple <code>m</code>’s is exactly the ability provided by the function <code>join :: m (m a) -> m a</code>, and it should come as no surprise that an alternative definition of <code>Monad</code> can be given in terms of <code>join</code>:
In fact, monads in category theory are defined in terms of <code>return</code>, <code>fmap</code>, and <code>join</code> (often called <math>\eta</math>, <math>T</math>, and <math>\mu</math> in the mathematical literature). Haskell uses the equivalent formulation in terms of <code>(>>=)</code> instead of <code>join</code> since it is more convenient to use; however, sometimes it can be easier to think about <code>Monad</code> instances in terms of <code>join</code>, since it is a more “atomic” operation. (For example, <code>join</code> for the list monad is just <code>concat</code>.)
In fact, the canonical definition of monads in category theory is in terms of <code>return</code>, <code>fmap</code>, and <code>join</code> (often called <math>\eta</math>, <math>T</math>, and <math>\mu</math> in the mathematical literature). Haskell uses an alternative formulation with <code>(>>=)</code> instead of <code>join</code> since it is more convenient to use {{noteref}}. However, sometimes it can be easier to think about <code>Monad</code> instances in terms of <code>join</code>, since it is a more “atomic” operation. (For example, <code>join</code> for the list monad is just <code>concat</code>.)
# Implement <code>(>>{{=}})</code> in terms of <code>fmap</code> and <code>join</code>.
# Implement <code>(>>{{=}})</code> in terms of <code>fmap</code> (or <code>liftM</code>) and <code>join</code>.
# Now implement <code>join</code> in terms of <code>(>>{{=}})</code>.
# Now implement <code>join</code> and <code>fmap</code> (<code>liftM</code>) in terms of <code>(>>{{=}})</code> and <code>return</code>.
The [http://haskell.org/ghc/docs/latest/html/libraries/base/Control-Monad.html <code>Control.Monad</code>] module provides a large number of convenient utility functions, all of which can be implemented in terms of the basic <code>Monad</code> operations (<code>return</code> and <code>(>>=)</code> in particular). We have already seen one of them, namely, <code>join</code>. We also mention some other noteworthy ones here; implementing these utility functions oneself is a good exercise. For a more detailed guide to these functions, with commentary and example code, see Henk-Jan van Tuyl’s [http://members.chello.nl/hjgtuyl/tourdemonad.html tour].
The [{{HackageDocs|base|Control-Monad}} <code>Control.Monad</code>] module provides a large number of convenient utility functions, all of which can be implemented in terms of the basic <code>Monad</code> operations (<code>return</code> and <code>(>>=)</code> in particular). We have already seen one of them, namely, <code>join</code>. We also mention some other noteworthy ones here; implementing these utility functions oneself is a good exercise. For a more detailed guide to these functions, with commentary and example code, see Henk-Jan van Tuyl’s [http://members.chello.nl/hjgtuyl/tourdemonad.html tour].
{{note|Still, it is unclear how this "bug" should be fixed. Making <code>Monad</code> require a <code>Functor</code> instance has some drawbacks, as mentioned in this [http://www.haskell.org/pipermail/haskell-prime/2011-January/003312.html 2011 mailing-list discussion]. —Geheimdienst}}
* <code>liftM :: Monad m => (a -> b) -> m a -> m b</code>. This should be familiar; of course, it is just <code>fmap</code>. The fact that we have both <code>fmap</code> and <code>liftM</code> is a consequence of the fact that the <code>Monad</code> type class did not require a <code>Functor</code> instance until recently, even though mathematically speaking, every monad is a functor. If you are using GHC 7.10 or newer, you should avoid using <code>liftM</code> and just use <code>fmap</code> instead.
* <code>liftM :: Monad m => (a -> b) -> m a -> m b</code>. This should be familiar; of course, it is just <code>fmap</code>. The fact that we have both <code>fmap</code> and <code>liftM</code> is an unfortunate consequence of the fact that the <code>Monad</code> type class does not require a <code>Functor</code> instance, even though mathematically speaking, every monad is a functor. However, <code>fmap</code> and <code>liftM</code> are essentially interchangeable, since it is a bug (in a social rather than technical sense) for any type to be an instance of <code>Monad</code> without also being an instance of <code>Functor</code> {{noteref}}.
* <code>ap :: Monad m => m (a -> b) -> m a -> m b</code> should also be familiar: it is equivalent to <code>(<*>)</code>, justifying the claim that the <code>Monad</code> interface is strictly more powerful than <code>Applicative</code>. We can make any <code>Monad</code> into an instance of <code>Applicative</code> by setting <code>pure = return</code> and <code>(<*>) = ap</code>.
* <code>sequence :: Monad m => [m a] -> m [a]</code> takes a list of computations and combines them into one computation which collects a list of their results. It is again something of a historical accident that <code>sequence</code> has a <code>Monad</code> constraint, since it can actually be implemented only in terms of <code>Applicative</code>. There is an additional generalization of <code>sequence</code> to structures other than lists, which will be discussed in the [[#Traversable|section on <code>Traversable</code>]].
* <code>sequence :: Monad m => [m a] -> m [a]</code> takes a list of computations and combines them into one computation which collects a list of their results. It is again something of a historical accident that <code>sequence</code> has a <code>Monad</code> constraint, since it can actually be implemented only in terms of <code>Applicative</code> (see the exercise at the end of the Utility Functions section for Applicative). Note that the actual type of <code>sequence</code> is more general, and works over any <code>Traversable</code> rather than just lists; see the [[#Traversable|section on <code>Traversable</code>]].
* <code>replicateM :: Monad m => Int -> m a -> m [a]</code> is simply a combination of [http://haskell.org/ghc/docs/latest/html/libraries/base/Prelude.html#v:replicate <code>replicate</code>] and <code>sequence</code>.
* <code>replicateM :: Monad m => Int -> m a -> m [a]</code> is simply a combination of [{{HackageDocs|base|Prelude}}#v:replicate <code>replicate</code>] and <code>sequence</code>.
* <code>when :: Monad m => Bool -> m () -> m ()</code> conditionally executes a computation, evaluating to its second argument if the test is <code>True</code>, and to <code>return ()</code> if the test is <code>False</code>. A collection of other sorts of monadic conditionals can be found in the [http://hackage.haskell.org/package/IfElse <code>IfElse</code> package].
* <code>mapM :: Monad m => (a -> m b) -> [a] -> m [b]</code> maps its first argument over the second, and <code>sequence</code>s the results. The <code>forM</code> function is just <code>mapM</code> with its arguments reversed; it is called <code>forM</code> since it models generalized <code>for</code> loops: the list <code>[a]</code> provides the loop indices, and the function <code>a -> m b</code> specifies the “body” of the loop for each index. Again, these functions actually work over any <code>Traversable</code>, not just lists, and they can also be defined in terms of <code>Applicative</code>, not <code>Monad</code>: the analogue of <code>mapM</code> for <code>Applicative</code> is called <code>traverse</code>.
* <code>mapM :: Monad m => (a -> m b) -> [a] -> m [b]</code> maps its first argument over the second, and <code>sequence</code>s the results. The <code>forM</code> function is just <code>mapM</code> with its arguments reversed; it is called <code>forM</code> since it models generalized <code>for</code> loops: the list <code>[a]</code> provides the loop indices, and the function <code>a -> m b</code> specifies the “body” of the loop for each index.
* <code>(=<<) :: Monad m => (a -> m b) -> m a -> m b</code> is just <code>(>>=)</code> with its arguments reversed; sometimes this direction is more convenient since it corresponds more closely to function application.
* <code>(>=>) :: Monad m => (a -> m b) -> (b -> m c) -> a -> m c</code> is sort of like function composition, but with an extra <code>m</code> on the result type of each function, and the arguments swapped. We’ll have more to say about this operation later. There is also a flipped variant, <code>(<=<)</code>.
* The <code>guard</code> function is for use with instances of <code>MonadPlus</code>, which is discussed at the end of the [[#Monoid|<code>Monoid</code> section]].
Many of these functions also have “underscored” variants, such as <code>sequence_</code> and <code>mapM_</code>; these variants throw away the results of the computations passed to them as arguments, using them only for their side effects.
Other monadic functions which are occasionally useful include <code>filterM</code>, <code>zipWithM</code>, <code>foldM</code>, and <code>forever</code>.
m >>= return = m
m >>= (\x -> k x >>= h) = (m >>= k) >>= h
fmap f xs = xs >>= return . f = liftM f xs
The first and second laws express the fact that <code>return</code> behaves nicely: if we inject a value <code>a</code> into a monadic context with <code>return</code>, and then bind to <code>k</code>, it is the same as just applying <code>k</code> to <code>a</code> in the first place; if we bind a computation <code>m</code> to <code>return</code>, nothing changes. The third law essentially says that <code>(>>=)</code> is associative, sort of. The last law ensures that <code>fmap</code> and <code>liftM</code> are the same for types which are instances of both <code>Functor</code> and <code>Monad</code>—which, as already noted, should be every instance of <code>Monad</code>.
The first and second laws express the fact that <code>return</code> behaves nicely: if we inject a value <code>a</code> into a monadic context with <code>return</code>, and then bind to <code>k</code>, it is the same as just applying <code>k</code> to <code>a</code> in the first place; if we bind a computation <code>m</code> to <code>return</code>, nothing changes. The third law essentially says that <code>(>>=)</code> is associative, sort of.
{{note|I like to pronounce this operator “fish”, but that’s probably not the canonical pronunciation ...}}
{{note|I like to pronounce this operator “fish”.}}
However, the presentation of the above laws, especially the third, is marred by the asymmetry of <code>(>>=)</code>. It’s hard to look at the laws and see what they’re really saying. I prefer a much more elegant version of the laws, which is formulated in terms of <code>(>=>)</code> {{noteref}}. Recall that <code>(>=>)</code> “composes” two functions of type <code>a -> m b</code> and <code>b -> m c</code>. You can think of something of type <code>a -> m b</code> (roughly) as a function from <code>a</code> to <code>b</code> which may also have some sort of effect in the context corresponding to <code>m</code>. (Note that <code>return</code> is such a function.) <code>(>=>)</code> lets us compose these “effectful functions”, and we would like to know what properties <code>(>=>)</code> has. The monad laws reformulated in terms of <code>(>=>)</code> are:
However, the presentation of the above laws, especially the third, is marred by the asymmetry of <code>(>>=)</code>. It’s hard to look at the laws and see what they’re really saying. I prefer a much more elegant version of the laws, which is formulated in terms of <code>(>=>)</code> {{noteref}}. Recall that <code>(>=>)</code> “composes” two functions of type <code>a -> m b</code> and <code>b -> m c</code>. You can think of something of type <code>a -> m b</code> (roughly) as a function from <code>a</code> to <code>b</code> which may also have some sort of effect in the context corresponding to <code>m</code>. <code>(>=>)</code> lets us compose these “effectful functions”, and we would like to know what properties <code>(>=>)</code> has. The monad laws reformulated in terms of <code>(>=>)</code> are:
{{note|As fans of category theory will note, these laws say precisely that functions of type <code>a -> m b</code> are the arrows of a category with <code>(>{{=}}>)</code> as composition! Indeed, this is known as the ''Kleisli category'' of the monad <code>m</code>. It will come up again when we discuss <code>Arrow</code>s.}}
Ah, much better! The laws simply state that <code>return</code> is the identity of <code>(>=>)</code>, and that <code>(>=>)</code> is associative {{noteref}}. Working out the equivalence between these two formulations, given the definition <code>g >=> h = \x -> g x >>= h</code>, is left as an exercise.
Ah, much better! The laws simply state that <code>return</code> is the identity of <code>(>=>)</code>, and that <code>(>=>)</code> is associative {{noteref}}.
There is also a formulation of the monad laws in terms of <code>fmap</code>, <code>return</code>, and <code>join</code>; for a discussion of this formulation, see the Haskell [http://en.wikibooks.org/wiki/Haskell/Category_theory wikibook page on category theory].
# Given the definition <code>g >{{=}}> h {{=}} \x -> g x >>{{=}} h</code>, prove the equivalence of the above laws and the usual monad laws.
==<code>do</code> notation==
do { x <- a ;
do { x <- a
b ;
; b
y <- c ;
; y <- c
; d
but what happens if <code>foo</code> produces an empty list? Well, remember that ugly <code>fail</code> function in the <code>Monad</code> type class declaration? That’s what happens. See [http://haskell.org/onlinereport/exps.html#sect3.14 section 3.14 of the Haskell Report] for the full details. See also the discussion of <code>MonadPlus</code> and <code>MonadZero</code> in the [[#Other monoidal classes: Alternative, MonadPlus, ArrowPlus|section on other monoidal classes]].
but what happens if <code>foo</code> is an empty list? Well, remember that ugly <code>fail</code> function in the <code>Monad</code> type class declaration? That’s what happens. See [http://www.haskell.org/onlinereport/exps.html#sect3.14 section 3.14 of the Haskell Report] for the full details. See also the discussion of <code>MonadPlus</code> and <code>MonadZero</code> in the [[#Other monoidal classes: Alternative, MonadPlus, ArrowPlus|section on other monoidal classes]].
A final note on intuition: <code>do</code> notation plays very strongly to the “computational context” point of view rather than the “container” point of view, since the binding notation <code>x <- m</code> is suggestive of “extracting” a single <code>x</code> from <code>m</code> and doing something with it. But <code>m</code> may represent some sort of a container, such as a list or a tree; the meaning of <code>x <- m</code> is entirely dependent on the implementation of <code>(>>=)</code>. For example, if <code>m</code> is a list, <code>x <- m</code> actually means that <code>x</code> will take on each value from the list in turn.
==Monad transformers==
Sometimes, the full power of <code>Monad</code> is not needed to desugar <code>do</code>-notation. For example,
One would often like to be able to combine two monads into one: for example, to have stateful, nondeterministic computations (<code>State</code> + <code>[]</code>), or computations which may fail and can consult a read-only environment (<code>Maybe</code> + <code>Reader</code>), and so on. Unfortunately, monads do not compose as nicely as applicative functors (yet another reason to use <code>Applicative</code> if you don’t need the full power that <code>Monad</code> provides), but some monads can be combined in certain ways.
The monad transformer library [http://hackage.haskell.org/package/mtl mtl] provides a number of ''monad transformers'', such as <code>StateT</code>, <code>ReaderT</code>, <code>ErrorT</code> ([http://hackage.haskell.org/packages/archive/mtl/1.1.0.2/doc/html/Control-Monad-Error.html haddock]), and (soon) <code>MaybeT</code>, which can be applied to other monads to produce a new monad with the effects of both. For example, <code>StateT s Maybe</code> is an instance of <code>Monad</code>; computations of type <code>StateT s Maybe a</code> may fail, and have access to a mutable state of type <code>s</code>. These transformers can be multiply stacked. One thing to keep in mind while using monad transformers is that the order of composition matters. For example, when a <code>StateT s Maybe a</code> computation fails, the state ceases being updated; on the other hand, the state of a <code>MaybeT (State s) a</code> computation may continue to be modified even after the computation has failed. (This may seem backwards, but it is correct. Monad transformers build composite monads “inside out”; for example, <code>MaybeT (State s) a</code> is isomorphic to <code>s -> (Maybe a, s)</code>. Lambdabot has an indispensable <code>@unmtl</code> command which you can use to “unpack” a monad transformer stack in this way.)
All monad transformers should implement the <code>MonadTrans</code> type class, defined in <code>Control.Monad.Trans</code>:
class MonadTrans t where
do x <- foo1
lift :: Monad m => m a -> t m a
y <- foo2
z <- foo3
return (g x y z)
It allows arbitrary computations in the base monad <code>m</code> to be “lifted” into computations in the transformed monad <code>t m</code>. (Note that type application associates to the left, just like function application, so <code>t m a = (t m) a</code>. As an exercise, you may wish to work out <code>t</code>’s kind, which is rather more interesting than most of the kinds we’ve seen up to this point.) However, you should only have to think about <code>MonadTrans</code> when defining your own monad transformers, not when using predefined ones.
would normally be desugared to <code>foo1 >>= \x -> foo2 >>= \y -> foo3 >>= \z -> return (g x y z)</code>, but this is equivalent to <code>g <$> foo1 <*> foo2 <*> foo3</code>. With the <code>ApplicativeDo</code> extension enabled (as of GHC 8.0), GHC tries hard to desugar <code>do</code>-blocks using <code>Applicative</code> operations wherever possible. This can sometimes lead to efficiency gains, even for types which also have <code>Monad</code> instances, since in general <code>Applicative</code> computations may be run in parallel, whereas monadic ones may not. For example, consider
{{note|The only problem with this scheme is the quadratic number of instances required as the number of standard monad transformers grows—but as the current set of standard monad transformers seems adequate for most common use cases, this may not be that big of a deal.}}
g :: Int -> Int -> M Int
There are also type classes such as <code>MonadState</code>, which provides state-specific methods like <code>get</code> and <code>put</code>, allowing you to conveniently use these methods not only with <code>State</code>, but with any monad which is an instance of <code>MonadState</code>—including <code>MaybeT (State s)</code>, <code>StateT s (ReaderT r IO)</code>, and so on. Similar type classes exist for <code>Reader</code>, <code>Writer</code>, <code>Cont</code>, <code>IO</code>, and others {{noteref}}.
-- These could be expensive
bar, baz :: M Int
There are two excellent references on monad transformers. Martin Grabmüller’s [http://user.cs.tu-berlin.de/~magr/pub/Transformers.en.html Monad Transformers Step by Step] is a thorough description, with running examples, of how to use monad transformers to elegantly build up computations with various effects. [http://cale.yi.org/index.php/How_To_Use_Monad_Transformers Cale Gibbard’s article] on how to use monad transformers is more practical, describing how to structure code using monad transformers to make writing it as painless as possible. Another good starting place for learning about monad transformers is a [http://blog.sigfpe.com/2006/05/grok-haskell-monad-transformers.html blog post by Dan Piponi].
foo :: M Int
foo = do
x <- bar
y <- baz
g x y
==MonadFix==
<code>foo</code> definitely depends on the <code>Monad</code> instance of <code>M</code>, since the effects generated by the whole computation may depend (via <code>g</code>) on the <code>Int</code> outputs of <code>bar</code> and <code>baz</code>. Nonetheless, with <code>ApplicativeDo</code> enabled, <code>foo</code> can be desugared as
join (g <$> bar <*> baz)
which may allow <code>bar</code> and <code>baz</code> to be computed in parallel, since they at least do not depend on each other.
The <code>MonadFix</code> class describes monads which support the special fixpoint operation <code>mfix :: (a -> m a) -> m a</code>, which allows the output of monadic computations to be defined via recursion. This is supported in GHC and Hugs by a special “recursive do” notation, <code>mdo</code>. For more information, see Levent Erkök’s thesis, [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.15.1543&rep=rep1&type=pdf Value Recursion in Monadic Computations].
Philip Wadler was the first to propose using monads to structure functional programs. [http://homepages.inf.ed.ac.uk/wadler/topics/monads.html His paper] is still a readable introduction to the subject.
Much of the monad transformer library [http://hackage.haskell.org/package/mtl mtl], including the <code>Reader</code>, <code>Writer</code>, <code>State</code>, and other monads, as well as the monad transformer framework itself, was inspired by Mark Jones’s classic paper [http://web.cecs.pdx.edu/~mpj/pubs/springschool.html Functional Programming with Overloading and Higher-Order Polymorphism]. It’s still very much worth a read—and highly readable—after almost fifteen years.
{{note|1=
[[All About Monads]],
{{note|
[http://www.haskell.org/haskellwiki/Monads_as_Containers Monads as containers],
[http://www.haskell.org/all_about_monads/html/ All About Monads],
[http://en.wikibooks.org/w/index.php?title=Haskell/Understanding_monads Understanding monads],
[http://haskell.org/haskellwiki/Monads_as_Containers Monads as containers],
[[The Monadic Way]],
[http://en.wikibooks.org/w/index.php?title=Haskell/Understanding_monads&oldid=933545 Understanding monads],
[[[The Monadic Way]],
[http://blog.sigfpe.com/2006/08/you-could-have-invented-monads-and.html You Could Have Invented Monads! (And Maybe You Already Have.)],
[http://www.haskell.org/pipermail/haskell-cafe/2006-November/019190.html there’s a monster in my Haskell!],
[http://kawagner.blogspot.com/2007/02/understanding-monads-for-real.html Understanding Monads. For real.],
[http://www.randomhacks.net/articles/2007/03/12/monads-in-15-minutes Monads in 15 minutes: Backtracking and Maybe],
[http://haskell.org/haskellwiki/Monads_as_computation Monads as computation],
[http://www.haskell.org/haskellwiki/Monads_as_computation Monads as computation],
[http://metafoo.co.uk/practical-monads.txt Practical Monads]}}
There are, of course, numerous monad tutorials of varying quality {{noteref}}.
A few of the best include Cale Gibbard’s [http://haskell.org/haskellwiki/Monads_as_Containers Monads as containers] and [http://haskell.org/haskellwiki/Monads_as_computation Monads as computation]; Jeff Newbern’s [http://www.haskell.org/all_about_monads/html/ All About Monads], a comprehensive guide with lots of examples; and Dan Piponi’s [http://blog.sigfpe.com/2006/08/you-could-have-invented-monads-and.html You Could Have Invented Monads!], which features great exercises. If you just want to know how to use <code>IO</code>, you could consult the [[Introduction to IO]]. Even this is just a sampling; the [[monad tutorials timeline]] is a more complete list. (All these monad tutorials have prompted parodies like [http://koweycode.blogspot.com/2007/01/think-of-monad.html think of a monad ...] as well as other kinds of backlash like [http://ahamsandwich.wordpress.com/2007/07/26/monads-and-why-monad-tutorials-are-all-awful/ Monads! (and Why Monad Tutorials Are All Awful)] or [http://byorgey.wordpress.com/2009/01/12/abstraction-intuition-and-the-monad-tutorial-fallacy/ Abstraction, intuition, and the “monad tutorial fallacy”].)
A few of the best include Cale Gibbard’s [http://www.haskell.org/haskellwiki/Monads_as_Containers Monads as containers] and [http://www.haskell.org/haskellwiki/Monads_as_computation Monads as computation]; Jeff Newbern’s [[All About Monads]], a comprehensive guide with lots of examples; and Dan Piponi’s [http://blog.sigfpe.com/2006/08/you-could-have-invented-monads-and.html You Could Have Invented Monads!], which features great exercises. If you just want to know how to use <code>IO</code>, you could consult the [[Introduction to IO]]. Even this is just a sampling; the [[monad tutorials timeline]] is a more complete list. (All these monad tutorials have prompted parodies like [http://koweycode.blogspot.com/2007/01/think-of-monad.html think of a monad ...] as well as other kinds of backlash like [http://ahamsandwich.wordpress.com/2007/07/26/monads-and-why-monad-tutorials-are-all-awful/ Monads! (and Why Monad Tutorials Are All Awful)] or [http://byorgey.wordpress.com/2009/01/12/abstraction-intuition-and-the-monad-tutorial-fallacy/ Abstraction, intuition, and the “monad tutorial fallacy”].)
Other good monad references which are not necessarily tutorials include [http://members.chello.nl/hjgtuyl/tourdemonad.html Henk-Jan van Tuyl’s tour] of the functions in <code>Control.Monad</code>, Dan Piponi’s [http://blog.sigfpe.com/2006/10/monads-field-guide.html field guide], and Tim Newsham’s [http://www.thenewsh.com/~newsham/haskell/monad.html What’s a Monad?]. There are also many blog posts which have been written on various aspects of monads; a collection of links can be found under [[Blog articles/Monads]].
Other good monad references which are not necessarily tutorials include [http://members.chello.nl/hjgtuyl/tourdemonad.html Henk-Jan van Tuyl’s tour] of the functions in <code>Control.Monad</code>, Dan Piponi’s [http://blog.sigfpe.com/2006/10/monads-field-guide.html field guide], Tim Newsham’s [http://www.thenewsh.com/~newsham/haskell/monad.html What’s a Monad?], and Chris Smith's excellent article [http://cdsmith.wordpress.com/2012/04/18/why-do-monads-matter/ Why Do Monads Matter?]. There are also many blog posts which have been written on various aspects of monads; a collection of links can be found under [[Blog articles/Monads]].
For help constructing monads from scratch, and for obtaining a "deep embedding" of monad operations suitable for use in, say, compiling a domain-specific language, see [http://projects.haskell.org/operational Apfelmus's operational package].
One of the quirks of the <code>Monad</code> class and the Haskell type system is that it is not possible to straightforwardly declare <code>Monad</code> instances for types which require a class constraint on their data, even if they are monads from a mathematical point of view. For example, <code>Data.Set</code> requires an <code>Ord</code> constraint on its data, so it cannot be easily made an instance of <code>Monad</code>. A solution to this problem was [http://www.randomhacks.net/articles/2007/03/15/data-set-monad-haskell-macros first described by Eric Kidd], and later made into a [http://hackage.haskell.org/cgi-bin/hackage-scripts/package/rmonad library named rmonad] by Ganesh Sittampalam and Peter Gavin.
There are many good reasons for eschewing <code>do</code> notation; some have gone so far as to [[Do_notation_considered_harmful|consider it harmful].
There are many good reasons for eschewing <code>do</code> notation; some have gone so far as to [[Do_notation_considered_harmful|consider it harmful]].
Monads can be generalized in various ways; for an exposition of one possibility, see Robert Atkey’s paper on [http://homepages.inf.ed.ac.uk/ratkey/paramnotions-jfp.pdf parameterized monads], or Dan Piponi’s [http://blog.sigfpe.com/2009/02/beyond-monads.html Beyond Monads].
Monads can be generalized in various ways; for an exposition of one possibility, see Robert Atkey’s paper on [https://bentnib.org/paramnotions-jfp.pdf parameterized monads], or Dan Piponi’s [http://blog.sigfpe.com/2009/02/beyond-monads.html Beyond Monads].
For the categorically inclined, monads can be viewed as monoids ([http://blog.sigfpe.com/2008/11/from-monoids-to-monads.html From Monoids to Monads]) and also as closure operators [http://blog.plover.com/math/monad-closure.html Triples and Closure]. Derek Elkins’s article in [http://www.haskell.org/wikiupload/8/85/TMR-Issue13.pdf issue 13 of the Monad.Reader] contains an exposition of the category-theoretic underpinnings of some of the standard <code>Monad</code> instances, such as <code>State</code> and <code>Cont</code>. There is also an alternative way to compose monads, using coproducts, as described by [http://doi.acm.org/10.1145/583852.581492 Lüth and Ghani], although this method has not (yet?) seen widespread use.
For the categorically inclined, monads can be viewed as monoids ([http://blog.sigfpe.com/2008/11/from-monoids-to-monads.html From Monoids to Monads]) and also as closure operators ([http://blog.plover.com/math/monad-closure.html Triples and Closure]). Derek Elkins’ article in [http://www.haskell.org/wikiupload/8/85/TMR-Issue13.pdf issue 13 of the Monad.Reader] contains an exposition of the category-theoretic underpinnings of some of the standard <code>Monad</code> instances, such as <code>State</code> and <code>Cont</code>. Jonathan Hill and Keith Clarke have [http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.53.6497 an early paper explaining the connection between monads as they arise in category theory and as used in functional programming]. There is also a [http://okmij.org/ftp/Computation/IO-monad-history.html web page by Oleg Kiselyov] explaining the history of the IO monad.
Links to many more research papers related to monads can be found under [[Research papers/Monads and arrows]].
=Monoid=
=MonadFail=
A monoid is a set <math>S\ </math> together with a binary operation <math>\oplus\ </math> which
Some monads support a notion of ''failure'', without necessarily supporting the notion of ''recovery'' suggested by <code>MonadPlus</code>, and possibly including a primitive error reporting mechanism. This notion is expressed by the relatively unprincipled <code>MonadFail</code>. When the <code>MonadFailDesugaring</code> language extension is enabled, the <code>fail</code> method from <code>MonadFail</code> is used for pattern match failure in <code>do</code> bindings rather than the traditional <code>fail</code> method of the <code>Monad</code> class. This language change is being implemented because there are many monads, such as <code>Reader</code>, <code>State</code>, <code>Writer</code>, <code>RWST</code>, and <code>Cont</code> that simply do not support a legitimate <code>fail</code> method.
See the [https://prime.haskell.org/wiki/Libraries/Proposals/MonadFail MonadFail proposal] for more information.
class Monad m => MonadFail m where
fail :: String -> m a
==Law==
fail s >>= m = fail s
=Monad transformers=
==Standard monad transformers==
The [http://hackage.haskell.org/package/transformers transformers] library provides a number of standard ''monad transformers''. Each monad transformer adds a particular capability/feature/effect to any existing monad.
* [http://hackage.haskell.org/packages/archive/transformers/latest/doc/html/Control-Monad-Trans-Identity.html <code>IdentityT</code>] is the identity transformer, which maps a monad to (something isomorphic to) itself. This may seem useless at first glance, but it is useful for the same reason that the <code>id</code> function is useful -- it can be passed as an argument to things which are parameterized over an arbitrary monad transformer, when you do not actually want any extra capabilities.
* [http://hackage.haskell.org/packages/archive/transformers/latest/doc/html/Control-Monad-Trans-State.html <code>StateT</code>] adds a read-write state.
* [http://hackage.haskell.org/packages/archive/transformers/latest/doc/html/Control-Monad-Trans-Reader.html <code>ReaderT</code>] adds a read-only environment.
* [http://hackage.haskell.org/packages/archive/transformers/latest/doc/html/Control-Monad-Trans-Writer.html <code>WriterT</code>] adds a write-only log.
* [http://hackage.haskell.org/packages/archive/transformers/0.2.2.0/doc/html/Control-Monad-Trans-RWS.html <code>RWST</code>] conveniently combines <code>ReaderT</code>, <code>WriterT</code>, and <code>StateT</code> into one.
* [http://hackage.haskell.org/packages/archive/transformers/latest/doc/html/Control-Monad-Trans-Maybe.html <code>MaybeT</code>] adds the possibility of failure.
* [http://hackage.haskell.org/packages/archive/transformers/latest/doc/html/Control-Monad-Trans-Error.html <code>ErrorT</code>] adds the possibility of failure with an arbitrary type to represent errors.
* [http://hackage.haskell.org/packages/archive/transformers/latest/doc/html/Control-Monad-Trans-List.html <code>ListT</code>] adds non-determinism (however, see the discussion of <code>ListT</code> below).
* [http://hackage.haskell.org/packages/archive/transformers/latest/doc/html/Control-Monad-Trans-Cont.html <code>ContT</code>] adds continuation handling.
For example, <code>StateT s Maybe</code> is an instance of <code>Monad</code>; computations of type <code>StateT s Maybe a</code> may fail, and have access to a mutable state of type <code>s</code>. Monad transformers can be multiply stacked. One thing to keep in mind while using monad transformers is that the order of composition matters. For example, when a <code>StateT s Maybe a</code> computation fails, the state ceases being updated (indeed, it simply disappears); on the other hand, the state of a <code>MaybeT (State s) a</code> computation may continue to be modified even after the computation has "failed". This may seem backwards, but it is correct. Monad transformers build composite monads “inside out”; <code>MaybeT (State s) a</code> is isomorphic to <code>s -> (Maybe a, s)</code>. (Lambdabot has an indispensable <code>@unmtl</code> command which you can use to “unpack” a monad transformer stack in this way.)
Intuitively, the monads become "more fundamental" the further inside the stack you get, and the effects of inner monads "have precedence" over the effects of outer ones. Of course, this is just handwaving, and if you are unsure of the proper order for some monads you wish to combine, there is no substitute for using <code>@unmtl</code> or simply trying out the various options.
==Definition and laws==
All monad transformers should implement the <code>MonadTrans</code> type class, defined in <code>Control.Monad.Trans.Class</code>:
It allows arbitrary computations in the base monad <code>m</code> to be “lifted” into computations in the transformed monad <code>t m</code>. (Note that type application associates to the left, just like function application, so <code>t m a = (t m) a</code>.)
<code>lift</code> must satisfy the laws
lift . return = return
lift (m >>= f) = lift m >>= (lift . f)
which intuitively state that <code>lift</code> transforms <code>m a</code> computations into <code>t m a</code> computations in a "sensible" way, which sends the <code>return</code> and <code>(>>=)</code> of <code>m</code> to the <code>return</code> and <code>(>>=)</code> of <code>t m</code>.
# What is the kind of <code>t</code> in the declaration of <code>MonadTrans</code>?
==Transformer type classes and "capability" style==
There are also type classes (provided by the [http://hackage.haskell.org/package/mtl <code>mtl</code> package]) for the operations of each transformer. For example, the <code>MonadState</code> type class provides the state-specific methods <code>get</code> and <code>put</code>, allowing you to conveniently use these methods not only with <code>State</code>, but with any monad which is an instance of <code>MonadState</code>—including <code>MaybeT (State s)</code>, <code>StateT s (ReaderT r IO)</code>, and so on. Similar type classes exist for <code>Reader</code>, <code>Writer</code>, <code>Cont</code>, <code>IO</code>, and others {{noteref}}.
These type classes serve two purposes. First, they get rid of (most of) the need for explicitly using <code>lift</code>, giving a type-directed way to automatically determine the right number of calls to <code>lift</code>. Simply writing <code>put</code> will be automatically translated into <code>lift . put</code>, <code>lift . lift . put</code>, or something similar depending on what concrete monad stack you are using.
Second, they give you more flexibility to switch between different concrete monad stacks. For example, if you are writing a state-based algorithm, don't write
foo :: State Int Char
foo = modify (*2) >> return 'x'
but rather
foo :: MonadState Int m => m Char
Now, if somewhere down the line you realize you need to introduce the possibility of failure, you might switch from <code>State Int</code> to <code>MaybeT (State Int)</code>. The type of the first version of <code>foo</code> would need to be modified to reflect this change, but the second version of <code>foo</code> can still be used as-is.
However, this sort of "capability-based" style (<i>e.g.</i> specifying that <code>foo</code> works for any monad with the "state capability") quickly runs into problems when you try to naively scale it up: for example, what if you need to maintain two independent states? A framework for solving this and related problems is described by Schrijvers and Olivera ([http://users.ugent.be/~tschrijv/Research/papers/icfp2011.pdf Monads, zippers and views: virtualizing the monad stack, ICFP 2011]) and is implemented in the [http://hackage.haskell.org/package/Monatron <code>Monatron</code> package].
==Composing monads==
Is the composition of two monads always a monad? As hinted previously, the answer is no.
Since <code>Applicative</code> functors are closed under composition, the problem must lie with <code>join</code>. Indeed, suppose <code>m</code> and <code>n</code> are arbitrary monads; to make a monad out of their composition we would need to be able to implement
join :: m (n (m (n a))) -> m (n a)
but it is not clear how this could be done in general. The <code>join</code> method for <code>m</code> is no help, because the two occurrences of <code>m</code> are not next to each other (and likewise for <code>n</code>).
However, one situation in which it can be done is if <code>n</code> ''distributes'' over <code>m</code>, that is, if there is a function
distrib :: n (m a) -> m (n a)
satisfying certain laws. See Jones and Duponcheel ([http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.42.2605 Composing Monads]); see also the [[#Traversable|section on Traversable]].
For a much more in-depth discussion and analysis of the failure of monads to be closed under composition, see [http://stackoverflow.com/questions/13034229/concrete-example-showing-that-monads-are-not-closed-under-composition-with-proo?lq=1 this question on StackOverflow].
* Implement <code>join :: M (N (M (N a))) -> M (N a)</code>, given <code>distrib :: N (M a) -> M (N a)</code> and assuming <code>M</code> and <code>N</code> are instances of <code>Monad</code>.
Much of the monad transformer library (originally [http://hackage.haskell.org/package/mtl <code>mtl</code>], now split between <code>mtl</code> and [http://hackage.haskell.org/package/transformers <code>transformers</code>]), including the <code>Reader</code>, <code>Writer</code>, <code>State</code>, and other monads, as well as the monad transformer framework itself, was inspired by Mark Jones’ classic paper [http://web.cecs.pdx.edu/~mpj/pubs/springschool.html Functional Programming with Overloading and Higher-Order Polymorphism]. It’s still very much worth a read—and highly readable—after almost fifteen years.
See [http://archive.fo/wxSkj Edward Kmett's mailing list message] for a description of the history and relationships among monad transformer packages (<code>mtl</code>, <code>transformers</code>, <code>monads-fd</code>, <code>monads-tf</code>).
There are two excellent references on monad transformers. Martin Grabmüller’s [https://github.com/mgrabmueller/TransformersStepByStep/blob/master/Transformers.lhs Monad Transformers Step by Step] is a thorough description, with running examples, of how to use monad transformers to elegantly build up computations with various effects. [http://cale.yi.org/index.php/How_To_Use_Monad_Transformers Cale Gibbard’s article] on how to use monad transformers is more practical, describing how to structure code using monad transformers to make writing it as painless as possible. Another good starting place for learning about monad transformers is a [http://blog.sigfpe.com/2006/05/grok-haskell-monad-transformers.html blog post by Dan Piponi].
The <code>ListT</code> transformer from the <code>transformers</code> package comes with the caveat that <code>ListT m</code> is only a monad when <code>m</code> is ''commutative'', that is, when <code>ma >>= \a -> mb >>= \b -> foo</code> is equivalent to <code>mb >>= \b -> ma >>= \a -> foo</code> (i.e. the order of <code>m</code>'s effects does not matter). For one explanation why, see Dan Piponi's blog post [http://blog.sigfpe.com/2006/11/why-isnt-listt-monad.html "Why isn't <code><nowiki>ListT []</nowiki></code> a monad"]. For more examples, as well as a design for a version of <code>ListT</code> which does not have this problem, see [http://www.haskell.org/haskellwiki/ListT_done_right <code>ListT</code> done right].
There is an alternative way to compose monads, using coproducts, as described by [http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.3581 Lüth and Ghani]. This method is interesting but has not (yet?) seen widespread use. For a more recent alternative, see Kiselyov et al's [http://okmij.org/ftp/Haskell/extensible/exteff.pdf Extensible Effects: An Alternative to Monad Transformers].
=MonadFix=
''Note: <code>MonadFix</code> is included here for completeness (and because it is interesting) but seems not to be used much. Skipping this section on a first read-through is perfectly OK (and perhaps even recommended).''
==<code>do rec</code> notation==
The <code>MonadFix</code> class describes monads which support the special fixpoint operation <code>mfix :: (a -> m a) -> m a</code>, which allows the output of monadic computations to be defined via (effectful) recursion. This is [http://www.haskell.org/ghc/docs/latest/html/users_guide/syntax-extns.html#recursive-do-notation supported in GHC] by a special “recursive do” notation, enabled by the <code>-XRecursiveDo</code> flag. Within a <code>do</code> block, one may have a nested <code>rec</code> block, like so:
do { x <- foo
; rec { y <- baz
; z <- bar
; bob
; w <- frob
Normally (if we had <code>do</code> in place of <code>rec</code> in the above example), <code>y</code> would be in scope in <code>bar</code> and <code>bob</code> but not in <code>baz</code>, and <code>z</code> would be in scope only in <code>bob</code>. With the <code>rec</code>, however, <code>y</code> and <code>z</code> are both in scope in all three of <code>baz</code>, <code>bar</code>, and <code>bob</code>. A <code>rec</code> block is analogous to a <code>let</code> block such as
let { y = baz
; z = bar
in bob
because, in Haskell, every variable bound in a <code>let</code>-block is in scope throughout the entire block. (From this point of view, Haskell's normal <code>do</code> blocks are analogous to Scheme's <code>let*</code> construct.)
What could such a feature be used for? One of the motivating examples given in the original paper describing <code>MonadFix</code> (see below) is encoding circuit descriptions. A line in a <code>do</code>-block such as
x <- gate y z
describes a gate whose input wires are labeled <code>y</code> and <code>z</code> and whose output wire is labeled <code>x</code>. Many (most?) useful circuits, however, involve some sort of feedback loop, making them impossible to write in a normal <code>do</code>-block (since some wire would have to be mentioned as an input ''before'' being listed as an output). Using a <code>rec</code> block solves this problem.
==Examples and intuition==
Of course, not every monad supports such recursive binding. However, as mentioned above, it suffices to have an implementation of <code>mfix :: (a -> m a) -> m a</code>, satisfying a few laws. Let's try implementing <code>mfix</code> for the <code>Maybe</code> monad. That is, we want to implement a function
maybeFix :: (a -> Maybe a) -> Maybe a
{{note|Actually, <code>fix</code> is implemented slightly differently for efficiency reasons; but the given definition is equivalent and simpler for the present purpose.}}
Let's think for a moment about the implementation {{noteref}} of the non-monadic <code>fix :: (a -> a) -> a</code>:
fix f = f (fix f)
Inspired by <code>fix</code>, our first attempt at implementing <code>maybeFix</code> might be something like
maybeFix f = maybeFix f >>= f
This has the right type. However, something seems wrong: there is nothing in particular here about <code>Maybe</code>; <code>maybeFix</code> actually has the more general type <code>Monad m => (a -> m a) -> m a</code>. But didn't we just say that not all monads support <code>mfix</code>?
The answer is that although this implementation of <code>maybeFix</code> has the right type, it does ''not'' have the intended semantics. If we think about how <code>(>>=)</code> works for the <code>Maybe</code> monad (by pattern-matching on its first argument to see whether it is <code>Nothing</code> or <code>Just</code>) we can see that this definition of <code>maybeFix</code> is completely useless: it will just recurse infinitely, trying to decide whether it is going to return <code>Nothing</code> or <code>Just</code>, without ever even so much as a glance in the direction of <code>f</code>.
The trick is to simply ''assume'' that <code>maybeFix</code> will return <code>Just</code>, and get on with life!
maybeFix f = ma
where ma = f (fromJust ma)
This says that the result of <code>maybeFix</code> is <code>ma</code>, and assuming that <code>ma = Just x</code>, it is defined (recursively) to be equal to <code>f x</code>.
Why is this OK? Isn't <code>fromJust</code> almost as bad as <code>unsafePerformIO</code>? Well, usually, yes. This is just about the only situation in which it is justified! The interesting thing to note is that <code>maybeFix</code> ''will never crash'' -- although it may, of course, fail to terminate. The only way we could get a crash is if we try to evaluate <code>fromJust ma</code> when we know that <code>ma = Nothing</code>. But how could we know <code>ma = Nothing</code>? Since <code>ma</code> is defined as <code>f (fromJust ma)</code>, it must be that this expression has already been evaluated to <code>Nothing</code> -- in which case there is no reason for us to be evaluating <code>fromJust ma</code> in the first place!
To see this from another point of view, we can consider three possibilities. First, if <code>f</code> outputs <code>Nothing</code> without looking at its argument, then <code>maybeFix f</code> clearly returns <code>Nothing</code>. Second, if <code>f</code> always outputs <code>Just x</code>, where <code>x</code> depends on its argument, then the recursion can proceed usefully: <code>fromJust ma</code> will be able to evaluate to <code>x</code>, thus feeding <code>f</code>'s output back to it as input. Third, if <code>f</code> tries to use its argument to decide whether to output <code>Just</code> or <code>Nothing</code>, then <code>maybeFix f</code> will not terminate: evaluating <code>f</code>'s argument requires evaluating <code>ma</code> to see whether it is <code>Just</code>, which requires evaluating <code>f (fromJust ma)</code>, which requires evaluating <code>ma</code>, ... and so on.
There are also instances of <code>MonadFix</code> for lists (which works analogously to the instance for <code>Maybe</code>), for <code>ST</code>, and for <code>IO</code>. The [http://hackage.haskell.org/packages/archive/base/latest/doc/html/System-IO.html#fixIO instance for <code>IO</code>] is particularly amusing: it creates a new (empty) <code>MVar</code>, immediately reads its contents using <code>unsafeInterleaveIO</code> (which delays the actual reading lazily until the value is needed), uses the contents of the <code>MVar</code> to compute a new value, which it then writes back into the <code>MVar</code>. It almost seems, spookily, that <code>mfix</code> is sending a value back in time to itself through the <code>MVar</code> -- though of course what is really going on is that the reading is delayed just long enough (via <code>unsafeInterleaveIO</code>) to get the process bootstrapped.
* Implement a <code>MonadFix</code> instance for <code>[]</code>.
==<code>mdo</code> syntax==
The example at the start of this section can also be written
mdo { x <- foo
; y <- baz
which will be translated into the original example (assuming that, say, <code>bar</code> and <code>bob</code> refer to <code>y</code>. The difference is that <code>mdo</code> will analyze the code in order to find minimal recursive blocks, which will be placed in <code>rec</code> blocks, whereas <code>rec</code> blocks desugar directly into calls to <code>mfix</code> without any further analysis.
For more information (such as the precise desugaring rules for <code>rec</code> blocks), see Levent Erkök and John Launchbury's 2002 Haskell workshop paper, [http://sites.google.com/site/leventerkok/recdo.pdf?attredirects=0 A Recursive do for Haskell], or for full details, Levent Erkök’s thesis, [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.15.1543&rep=rep1&type=pdf Value Recursion in Monadic Computations]. (Note, while reading, that <code>MonadFix</code> used to be called <code>MonadRec</code>.) You can also read the [http://www.haskell.org/ghc/docs/latest/html/users_guide/syntax-extns.html#recursive-do-notation GHC user manual section on recursive do-notation].
=Semigroup=
A semigroup is a set <math>S\ </math> together with a binary operation <math>\oplus\ </math> which
combines elements from <math>S\ </math>. The <math>\oplus\ </math> operator is required to be associative
(that is, <math>(a \oplus b) \oplus c = a \oplus (b \oplus c)\ </math>, for any
<math>a,b,c\ </math> which are elements of <math>S\ </math>), and there must be some element of
<math>a,b,c\ </math> which are elements of <math>S\ </math>).
<math>S\ </math> which is the identity with respect to <math>\oplus\ </math>.
(If you are familiar with group theory, a monoid is like a
For example, the natural numbers under addition form a semigroup: the sum of any two natural numbers is a natural number, and <math>(a+b)+c = a+(b+c)\ </math> for any natural numbers <math>a\ </math>, <math>b\ </math>, and <math>c\,\ </math>. The integers under multiplication also form a semigroup, as do the integers (or rationals, or reals) under <math>\max\ </math> or <math>\min\ </math>, Boolean values under conjunction and disjunction, lists under concatenation, functions from a set to itself under composition ... Semigroups show up all over the place, once you know to look for them.
group without the requirement that inverses exist.) For example, the
natural numbers under addition form a monoid: the sum of any two
natural numbers is a natural number; <math>(a+b)+c = a+(b+c)\ </math> for any
natural numbers <math>a\ </math>, <math>b\ </math>, and <math>c\,\ </math>; and zero is the additive
As of version 4.9 of the <code>base</code> package (which comes with GHC 8.0), semigroups are defined in the <code>Data.Semigroup</code> module. (If you are working with a previous version of base, or want to write a library that supports previous versions of base, you can use the <code>semigroups</code> package.)
identity. The integers under multiplication also form a monoid, as do
natural numbers under <math>\max\ </math>, Boolean values under conjunction and
The definition of the <code>Semigroup</code> type class ([https://hackage.haskell.org/package/base-4.9.0.0/docs/Data-Semigroup.html haddock]) is as follows:
disjunction, lists under concatenation, functions from a set to itself
under composition ... Monoids show up all over the place, once you
know to look for them.
class Semigroup a where
(<>) :: a -> a -> a
sconcat :: NonEmpty a -> a
sconcat (a :| as) = go a as where
go b (c:cs) = b <> go c cs
go b [] = b
stimes :: Integral b => b -> a -> a
stimes = ...
The really important method is <code>(<>)</code>, representing the associative binary operation. The other two methods have default implementations in terms of <code>(<>)</code>, and are included in the type class in case some instances can give more efficient implementations than the default.
<code>sconcat</code> reduces a nonempty list using <code>(<>)</code>. For most instances, this is the same as <code>foldr1 (<>)</code>, but it can be constant-time for idempotent semigroups.
<code>stimes n</code> is equivalent to (but sometimes considerably more efficient than) <code>sconcat . replicate n</code>. Its default definition uses multiplication by doubling (also known as exponentiation by squaring). For many semigroups, this is an important optimization; for some, such as lists, it is terrible and must be overridden.
See the [https://hackage.haskell.org/package/base-4.9.0.0/docs/Data-Semigroup.html haddock documentation] for more information on <code>sconcat</code> and <code>stimes</code>.
The only law is that <code>(<>)</code> must be associative:
(x <> y) <> z = x <> (y <> z)
Many semigroups have a special element <math>e</math> for which the binary operation <math>\oplus</math> is the identity, that is, <math>e \oplus x = x \oplus e = x</math> for every element <math>x</math>. Such a semigroup-with-identity-element is called a ''monoid''.
The definition of the <code>Monoid</code> type class (defined in
<code>Data.Monoid</code>; [http://haskell.org/ghc/docs/latest/html/libraries/base/Data-Monoid.html haddock]) is:
<code>Data.Monoid</code>; [{{HackageDocs|base|Data-Monoid}} haddock]) is:
The <code>Monoid</code> methods are rather unfortunately named; they are inspired
by the list instance of <code>Monoid</code>, where indeed <code>mempty = []</code> and <code>mappend = (++)</code>, but this is misleading since many
monoids have little to do with appending (see these [http://thread.gmane.org/gmane.comp.lang.haskell.cafe/50590 Comments from OCaml Hacker Brian Hurt] on the haskell-cafe mailing list).
monoids have little to do with appending (see these [http://archive.fo/hkTOb Comments from OCaml Hacker Brian Hurt] on the Haskell-cafe mailing list). The situation is made somewhat better by <code>(<>)</code>, which is provided as an alias for <code>mappend</code>.
Note that the <code>(<>)</code> alias for <code>mappend</code> conflicts with the <code>Semigroup</code> method of the same name. For this reason, <code>Data.Semigroup</code> re-exports much of <code>Data.Monoid</code>; to use semigroups and monoids together, just import <code>Data.Semigroup</code>, and make sure all your types have both <code>Semigroup</code> and <code>Monoid</code> instances (and that <code>(<>) = mappend</code>).
There are quite a few interesting <code>Monoid</code> instances defined in
There are quite a few interesting <code>Monoid</code> instances defined in <code>Data.Monoid</code>.
<code>Data.Monoid</code>.
* <code>[a]</code> is a <code>Monoid</code>, with <code>mempty = []</code> and <code>mappend = (++)</code>.
It is not hard to check that
<li><code>[a]</code> is a <code>Monoid</code>, with <code>mempty = []</code> and <code>mappend = (++)</code>. It is not hard to check that <code>(x ++ y) ++ z = x ++ (y ++ z)</code> for any lists <code>x</code>, <code>y</code>, and <code>z</code>, and that the empty list is the identity: <code>[] ++ x = x ++ [] = x</code>.</li>
<code>(x ++ y) ++ z = x ++ (y ++ z)</code> for any lists <code>x</code>, <code>y</code>, and <code>z</code>, and
that the empty list is the identity:
<code>[] ++ x = x ++ [] = x</code>.
* As noted previously, we can make a monoid out of any numeric type under either addition or multiplication. However, since we can’t have two instances for the same type, <code>Data.Monoid</code> provides two <code>newtype</code> wrappers, <code>Sum</code> and <code>Product</code>, with appropriate <code>Monoid</code> instances.
<li>As noted previously, we can make a monoid out of any numeric type under either addition or multiplication. However, since we can’t have two instances for the same type, <code>Data.Monoid</code> provides two <code>newtype</code> wrappers, <code>Sum</code> and <code>Product</code>, with appropriate <code>Monoid</code> instances.
:This example code is silly, of course; we could just write
This example code is silly, of course; we could just write
<code>sum [1..5]</code> and <code>product [1..5]</code>. Nevertheless, these instances
<code>sum [1..5]</code> and <code>product [1..5]</code>. Nevertheless, these instances are useful in more generalized settings, as we will see in the [[Foldable|section on <code>Foldable</code>]].</li>
are useful in more generalized settings, as we will see in the
[[Foldable|section <code>Foldable</code>]].
* <code>Any</code> and <code>All</code> are <code>newtype</code> wrappers providing <code>Monoid</code> instances for <code>Bool</code> (under disjunction and conjunction, respectively).
<li><code>Any</code> and <code>All</code> are <code>newtype</code> wrappers providing <code>Monoid</code> instances for <code>Bool</code> (under disjunction and conjunction, respectively).</li>
* There are three instances for <code>Maybe</code>: a basic instance which lifts a <code>Monoid</code> instance for <code>a</code> to an instance for <code>Maybe a</code>, and two <code>newtype</code> wrappers <code>First</code> and <code>Last</code> for which <code>mappend</code> selects the first (respectively last) non-<code>Nothing</code> item.
<li> There are three instances for <code>Maybe</code>: a basic instance which lifts a <code>Monoid</code> instance for <code>a</code> to an instance for <code>Maybe a</code>, and two <code>newtype</code> wrappers <code>First</code> and <code>Last</code> for which <code>mappend</code> selects the first (respectively last) non-<code>Nothing</code> item.</li>
* <code>Endo a</code> is a newtype wrapper for functions <code>a -> a</code>, which form a monoid under composition.
<li><code>Endo a</code> is a newtype wrapper for functions <code>a -> a</code>, which form a monoid under composition.</li>
* There are several ways to “lift” <code>Monoid</code> instances to instances with additional structure. We have already seen that an instance for <code>a</code> can be lifted to an instance for <code>Maybe a</code>. There are also tuple instances: if <code>a</code> and <code>b</code> are instances of code>Monoid</code>, then so is <code>(a,b)</code>, using the monoid operations for <code>a</code> and <code>b</code> in the obvious pairwise manner. Finally, if <code>a</code> is a <code>Monoid</code>, then so is the function type <code>e -> a</code> for any <code>e</code>; in particular, <code>g `mappend` h</code> is the function which applies both <code>g</code> and <code>h</code> to its argument and then combines the results using the underlying <code>Monoid</code> instance for <code>a</code>. This can be quite useful and elegant (see [http://thread.gmane.org/gmane.comp.lang.haskell.cafe/52416 example]).
<li>There are several ways to “lift” <code>Monoid</code> instances to instances with additional structure. We have already seen that an instance for <code>a</code> can be lifted to an instance for <code>Maybe a</code>. There are also tuple instances: if <code>a</code> and <code>b</code> are instances of <code>Monoid</code>, then so is <code>(a,b)</code>, using the monoid operations for <code>a</code> and <code>b</code> in the obvious pairwise manner. Finally, if <code>a</code> is a <code>Monoid</code>, then so is the function type <code>e -> a</code> for any <code>e</code>; in particular, <code>g `mappend` h</code> is the function which applies both <code>g</code> and <code>h</code> to its argument and then combines the results using the underlying <code>Monoid</code> instance for <code>a</code>. This can be quite useful and elegant (see [http://archive.fo/dUbHK example]).</li>
* The type <code>Ordering = LT || EQ || GT</code> is a <code>Monoid</code>, defined in such a way that <code>mconcat (zipWith compare xs ys)</code> computes the lexicographic ordering of <code>xs</code> and <code>ys</code>. In articular, <code>mempty = EQ</code>, and <code>mappend</code> evaluates to its leftmost non-<code>EQ</code> argument (or <code>EQ</code> if both arguments are <code>EQ</code>). This can be used together with the function instance of <code>Monoid</code> to do some clever things ([http://www.reddit.com/r/programming/comments/7cf4r/monoids_in_my_programming_language/c06adnx example]).
<li>The type <code>Ordering = LT | EQ | GT</code> is a <code>Monoid</code>, defined in such a way that <code>mconcat (zipWith compare xs ys)</code> computes the lexicographic ordering of <code>xs</code> and <code>ys</code> (if <code>xs</code> and <code>ys</code> have the same length). In particular, <code>mempty = EQ</code>, and <code>mappend</code> evaluates to its leftmost non-<code>EQ</code> argument (or <code>EQ</code> if both arguments are <code>EQ</code>). This can be used together with the function instance of <code>Monoid</code> to do some clever things ([http://www.reddit.com/r/programming/comments/7cf4r/monoids_in_my_programming_language/c06adnx example]).</li>
* There are also <code>Monoid</code> instances for several standard data structures in the containers library ([http://hackage.haskell.org/packages/archive/containers/0.2.0.0/doc/html/index.html haddock]), including <code>Map</code>, <code>Set</code>, and <code>Sequence</code>.
<li>There are also <code>Monoid</code> instances for several standard data structures in the containers library ([http://hackage.haskell.org/packages/archive/containers/0.2.0.0/doc/html/index.html haddock]), including <code>Map</code>, <code>Set</code>, and <code>Sequence</code>.</li>
<code>Monoid</code> is also used to enable several other type class instances.
As noted previously, we can use <code>Monoid</code> to make <code>((,) e)</code> an instance
As noted previously, we can use <code>Monoid</code> to make <code>((,) e)</code> an instance of <code>Applicative</code>:
of <code>Applicative</code>:
instance Monoid e => Applicative ((,) e) where
pure :: Monoid e => a -> (e,a)
pure x = (mempty, x)
(<*>) :: Monoid e => (e,a -> b) -> (e,a) -> (e,b)
(u, f) <*> (v, x) = (u `mappend` v, f x)
<code>Monoid</code> can be similarly used to make <code>((,) e)</code> an instance of
<code>Monoid</code> can be similarly used to make <code>((,) e)</code> an instance of <code>Monad</code> as well; this is known as the ''writer monad''. As we’ve already seen, <code>Writer</code> and <code>WriterT</code> are a newtype wrapper and transformer for this monad, respectively.
<code>Monad</code> as well; this is known as the ''writer monad''. As we’ve
already seen, <code>Writer</code> and <code>WriterT</code> are a newtype wrapper and
transformer for this monad, respectively.
<code>Monoid</code> also plays a key role in the <code>Foldable</code> type class
<code>Monoid</code> also plays a key role in the <code>Foldable</code> type class (see section [[#Foldable|Foldable]]).
(see section [[#Foldable|Foldable]]).
==Other monoidal classes: Alternative, MonadPlus, ArrowPlus==
Monoids got a fair bit of attention in 2009, when
[http://blog.enfranchisedmind.com/2009/01/random-thoughts-on-haskell/ a blog post by Brian Hurt]
complained about the fact that the names of many Haskell type classes
(<code>Monoid</code> in particular) are taken from abstract mathematics. This
resulted in [http://archive.fo/hkTOb a long Haskell-cafe thread]
arguing the point and discussing monoids in general.
{{note|May its name live forever.}}
However, this was quickly followed by several blog posts about
<code>Monoid</code> {{noteref}}. First, Dan Piponi
wrote a great introductory post, [http://blog.sigfpe.com/2009/01/haskell-monoids-and-their-uses.html Haskell Monoids and their Uses]. This was quickly followed by
Heinrich Apfelmus’ [http://apfelmus.nfshost.com/monoid-fingertree.html Monoids and Finger Trees], an accessible exposition of
Hinze and Paterson’s [http://www.soi.city.ac.uk/%7Eross/papers/FingerTree.html classic paper on 2-3 finger trees], which makes very clever
use of <code>Monoid</code> to implement an elegant and generic data structure.
Dan Piponi then wrote two fascinating articles about using <code>Monoids</code>
(and finger trees): [http://blog.sigfpe.com/2009/01/fast-incremental-regular-expression.html Fast Incremental Regular Expressions] and [http://blog.sigfpe.com/2009/01/beyond-regular-expressions-more.html Beyond Regular Expressions]
In a similar vein, David Place’s article on improving <code>Data.Map</code> in
order to compute incremental folds (see [http://www.haskell.org/wikiupload/6/6a/TMR-Issue11.pdf the Monad Reader issue 11])
is also a
good example of using <code>Monoid</code> to generalize a data structure.
Some other interesting examples of <code>Monoid</code> use include [http://www.reddit.com/r/programming/comments/7cf4r/monoids_in_my_programming_language/c06adnx building elegant list sorting combinators], [http://byorgey.wordpress.com/2008/04/17/collecting-unstructured-information-with-the-monoid-of-partial-knowledge/ collecting unstructured information], [http://izbicki.me/blog/gausian-distributions-are-monoids combining probability distributions], and a brilliant series of posts by Chung-Chieh Shan and Dylan Thurston using <code>Monoid</code>s to [http://conway.rutgers.edu/~ccshan/wiki/blog/posts/WordNumbers1/ elegantly solve a difficult combinatorial puzzle] (followed by [http://conway.rutgers.edu/~ccshan/wiki/blog/posts/WordNumbers2/ part 2], [http://conway.rutgers.edu/~ccshan/wiki/blog/posts/WordNumbers3/ part 3], [http://conway.rutgers.edu/~ccshan/wiki/blog/posts/WordNumbers4/ part 4]).
As unlikely as it sounds, monads can actually be viewed as a sort of
monoid, with <code>join</code> playing the role of the binary operation and
<code>return</code> the role of the identity; see [http://blog.sigfpe.com/2008/11/from-monoids-to-monads.html Dan Piponi’s blog post].
=Failure and choice: Alternative, MonadPlus, ArrowPlus=
Several classes (<code>Applicative</code>, <code>Monad</code>, <code>Arrow</code>) have "monoidal" subclasses, intended to model computations that support "failure" and "choice" (in some appropriate sense).
The <code>Alternative</code> type class ([http://haskell.org/ghc/docs/latest/html/libraries/base/Control-Applicative.html#g:2 haddock])
The <code>Alternative</code> type class ([{{HackageDocs|base|Control-Applicative}}#g:2 haddock])
is for <code>Applicative</code> functors which also have
a monoid structure:
empty :: f a
(<|>) :: f a -> f a -> f a
some :: f a -> f [a]
many :: f a -> f [a]
The basic intuition is that <code>empty</code> represents some sort of "failure", and <code>(<|>)</code> represents a choice between alternatives. (However, this intuition does not fully capture the nuance possible; see the section on Laws below.) Of course, <code>(<|>)</code> should be associative and <code>empty</code> should be the identity element for it.
Instances of <code>Alternative</code> must implement <code>empty</code> and <code>(<|>)</code>; <code>some</code> and <code>many</code> have default implementations but are included in the class since specialized implementations may be more efficient than the default.
The default definitions of <code>some</code> and <code>many</code> are essentially given by
some v = (:) <$> v <*> many v
many v = some v <|> pure []
Of course, instances of <code>Alternative</code> should satisfy the monoid laws.
(though for some reason, in actual fact they are not defined via mutual recursion). The intuition is that both keep running <code>v</code>, collecting its results into a list, until it fails; <code>some v</code> requires <code>v</code> to succeed at least once, whereas <code>many v</code> does not require it to succeed at all. That is, <code>many</code> represents 0 or more repetitions of <code>v</code>, whereas <code>some</code> represents 1 or more repetitions. Note that <code>some</code> and <code>many</code> do not make sense for all instances of <code>Alternative</code>; they are discussed further below.
Likewise, <code>MonadPlus</code> ([http://haskell.org/ghc/docs/latest/html/libraries/base/Control-Monad.html#t:MonadPlus haddock])
Likewise, <code>MonadPlus</code> ([{{HackageDocs|base|Control-Monad}}#t:MonadPlus haddock])
is for <code>Monad</code>s with a monoid structure:
The <code>MonadPlus</code> documentation states that it is intended to model
Finally, <code>ArrowZero</code> and <code>ArrowPlus</code> ([{{HackageDocs|base|Control-Arrow}}#t:ArrowZero haddock])
monads which also support “choice and failure”; in addition to the
represent <code>Arrow</code>s ([[#Arrow|see below]]) with a
monoid laws, instances of <code>MonadPlus</code> are expected to satisfy
monoid structure:
mzero >>= f = mzero
class Arrow arr => ArrowZero arr where
v >> mzero = mzero
zeroArrow :: b `arr` c
class ArrowZero arr => ArrowPlus arr where
(<+>) :: (b `arr` c) -> (b `arr` c) -> (b `arr` c)
which explains the sense in which <code>mzero</code> denotes failure. Since
<code>mzero</code> should be the identity for <code>mplus</code>, the computation <code>m1 `mplus` m2</code> succeeds (evaluates to something other than <code>mzero</code>) if
either <code>m1</code> or <code>m2</code> does; so <code>mplus</code> represents choice. The <code>guard</code>
Although this document typically discusses laws before presenting example instances, for <code>Alternative</code> and friends it is worth doing things the other way around, because there is some controversy over the laws and it helps to have some concrete examples in mind when discussing them. We mostly focus on <code>Alternative</code> in this section and the next; now that <code>Applicative</code> is a superclass of <code>Monad</code>, there is little reason to use <code>MonadPlus</code> any longer, and <code>ArrowPlus</code> is rather obscure.
function can also be used with instances of <code>MonadPlus</code>; it requires a
condition to be satisfied and fails (using <code>mzero</code>) if it is not. A
* <code>Maybe</code> is an instance of <code>Alternative</code>, where <code>empty</code> is <code>Nothing</code> and the choice operator <code>(<|>)</code> results in its first argument when it is <code>Just</code>, and otherwise results in its second argument. Hence folding over a list of <code>Maybe</code> with <code>(<|>)</code> (which can be done with <code>asum</code> from <code>Data.Foldable</code>) results in the first non-<code>Nothing</code> value in the list (or <code>Nothing</code> if there are none).
simple example of a <code>MonadPlus</code> instance is <code>[]</code>, which is exactly the
same as the <code>Monoid</code> instance for <code>[]</code>: the empty list represents
* <code>[]</code> is an instance, with <code>empty</code> given by the empty list, and <code>(<|>)</code> equal to <code>(++)</code>. It is worth pointing out that this is identical to the <code>Monoid</code> instance for <code>[a]</code>, whereas the <code>Alternative</code> and <code>Monoid</code> instances for <code>Maybe</code> are different: the <code>Monoid</code> instance for <code>Maybe a</code> requires a <code>Monoid</code> instance for <code>a</code>, and monoidally combines the contained values when presented with two <code>Just</code>s.
failure, and list concatenation represents choice. In general,
however, a <code>MonadPlus</code> instance for a type need not be the same as its
Let's think about the behavior of <code>some</code> and <code>many</code> for <code>Maybe</code> and <code>[]</code>. For <code>Maybe</code>, we have <code>some Nothing = (:) <$> Nothing <*> many Nothing = Nothing <*> many Nothing = Nothing</code>. Hence we also have <code>many Nothing = some Nothing <|> pure [] = Nothing <|> pure [] = pure [] = Just []</code>. Boring. But what about applying <code>some</code> and <code>many</code> to <code>Just</code>? In fact, <code>some (Just a)</code> and <code>many (Just a)</code> are both bottom! The problem is that since <code>Just a</code> is always "successful", the recursion will never terminate. In theory the result "should be" the infinite list <code>[a,a,a,...]</code> but it cannot even start producing any elements of this list, because there is no way for the <code>(<*>)</code> operator to yield any output until it knows that the result of the call to <code>many</code> will be <code>Just</code>.
<code>Monoid</code> instance; <code>Maybe</code> is an example of such a type. A great
introduction to the <code>MonadPlus</code> type class, with interesting examples
You can work out the behavior for <code>[]</code> yourself, but it ends up being quite similar: <code>some</code> and <code>many</code> yield boring results when applied to the empty list, and yield bottom when applied to any non-empty list.
of its use, is Doug Auclair’s ''MonadPlus: What a Super Monad!'' in [http://www.haskell.org/wikiupload/6/6a/TMR-Issue11.pdf the Monad.Reader issue 11].
In the end, <code>some</code> and <code>many</code> really only make sense when used with some sort of "stateful" <code>Applicative</code> instance, for which an action <code>v</code>, when run multiple times, can succeed some finite number of times and then fail. For example, parsers have this behavior, and indeed, parsers were the original motivating example for the <code>some</code> and <code>many</code> methods; more on this below.
* Since GHC 8.0 (that is, <code>base-4.9</code>), there is an instance of <code>Alternative</code> for <code>IO</code>. <code>empty</code> throws an I/O exception, and <code>(<|>)</code> works by first running its left-hand argument; if the left-hand argument throws an I/O exception, <code>(<|>)</code> catches the exception and then calls its second argument. (Note that other types of exceptions are not caught.) There are other, much better ways to handle I/O errors, but this is a quick and dirty way that may work for simple, one-off programs, such as expressions typed at the GHCi prompt. For example, if you want to read the contents of a file but use some default contents in case the file does not exist, you can just write <code>readFile "somefile.txt" <|> return "default file contents"</code>.
* <code>Concurrently</code> from the <code>async</code> package has an <code>Alternative</code> instance, for which <code>c1 <|> c2</code> races <code>c1</code> and <code>c2</code> in parallel, and returns the result of whichever finishes first. <code>empty</code> corresponds to the action that runs forever without returning a value.
* Practically any parser type (e.g. from <code>parsec</code>, <code>megaparsec</code>, <code>trifecta</code>, ...) has an <code>Alternative</code> instance, where <code>empty</code> is an unconditional parse failure, and <code>(<|>)</code> is left-biased choice. That is, <code>p1 <|> p2</code> first tries parsing with <code>p1</code>, and if <code>p1</code> fails then it tries <code>p2</code> instead.
<code>some</code> and <code>many</code> work particularly well with parser types having an <code>Applicative</code> instance: if <code>p</code> is a parser, then <code>some p</code> parses one or more consecutive occurrences of <code>p</code> (i.e. it will parse as many occurrences of <code>p</code> as possible and then stop), and <code>many p</code> parses zero or more occurrences.
Of course, instances of <code>Alternative</code> should satisfy the monoid laws
empty <|> x = x
x <|> empty = x
(x <|> y) <|> z = x <|> (y <|> z)
The documentation for <code>some</code> and <code>many</code> states that they should be the "least solution" (i.e. least in the definedness partial order) to their characterizing, mutually recursive default definitions. However, [https://www.reddit.com/r/haskell/comments/2j8bvl/laws_of_some_and_many/ this is controversial], and probably wasn't really thought out very carefully.
Since <code>Alternative</code> is a subclass of <code>Applicative</code>, a natural question is, "how should <code>empty</code> and <code>(<|>)</code> interact with <code>(<*>)</code> and <code>pure</code>?"
Almost everyone agrees on the ''left zero'' law (though see the discussion of the ''right zero'' law below):
empty <*> f = empty
After this is where it starts to get a bit hairy though. It turns out there are several other laws one might imagine adding, and different instances satisfy different laws.
* ''Right Zero'':<p>Another obvious law would be <haskell>f <*> empty = empty</haskell></p><p>This law is satisfied by most instances; however, it is not satisfied by <code>IO</code>. Once the effects in <code>f</code> have been executed, there is no way to roll them back if we later encounter an exception. Now consider the <code>Backwards</code> applicative transformer from the <code>transformers</code> package. If <code>f</code> is <code>Applicative</code>, then so is <code>Backwards f</code>; it works the same way but performs the actions of the arguments to <code>(<*>)</code> in the reverse order. There is also an instance <code>Alternative f => Alternative (Backwards f)</code>. If some <code>f</code> (such as <code>IO</code>) satisfies ''left zero'' but not ''right zero'', then <code>Backwards f</code> satisfies ''right zero'' but not ''left zero''! So even the ''left zero'' law is suspect. The point is that given the existence of <code>Backwards</code> we cannot privilege one direction or the other.</p>
* ''Left Distribution'':<p><haskell>(a <|> b) <*> c = (a <*> c) <|> (b <*> c)</haskell></p><p>This distributivity law is satisfied by <code>[]</code> and <code>Maybe</code>, as you may verify. However, it is ''not'' satisfied by <code>IO</code> or most parsers. The reason is that <code>a</code> and <code>b</code> can have effects which influence execution of <code>c</code>, and the left-hand side may end up failing where the right-hand side succeeds.</p><p>For example, consider <code>IO</code>, and suppose that <code>a</code> always executes successfully, but <code>c</code> throws an I/O exception after <code>a</code> has run. Concretely, say, <code>a</code> might ensure that a certain file does not exist (deleting it if it does exist or doing nothing if it does not), and then <code>c</code> tries to read that file. In that case <code>(a <|> b) <*> c</code> will first delete the file, ignoring <code>b</code> since <code>a</code> is successful, and then throw an exception when <code>c</code> tries to read the file. On the other hand, <code>b</code> might ensure that the same file in question ''does'' exist. In that case <code>(a <*> c) <|> (b <*> c)</code> would succeed: after <code>(a <*> c)</code> throws an exception, it would be caught by <code>(<|>)</code>, and then <code>(b <*> c)</code> would be tried.</p><p>This law does not hold for parsers for a similar reason: <code>(a <|> b) <*> c</code> has to "commit" to parsing with <code>a</code> or <code>b</code> before running <code>c</code>, whereas <code>(a <*> c) <|> (b <*> c)</code> allows backtracking if <code>a <*> c</code> fails. In the particular case that <code>a</code> succeeds but <code>c</code> fails after <code>a</code> but not after <code>b</code>, these may give different results. For example, suppose <code>a</code> and <code>c</code> both expect to see two asterisks, but <code>b</code> expects to see only one. If there are only three asterisks in the input, <code>b <*> c</code> will be successful whereas <code>a <*> c</code> will not.</p>
* ''Right Distribution'':<p><haskell>a <*> (b <|> c) = (a <*> b) <|> (a <*> c)</haskell></p><p>This law is not satisfied by very many instances, but it's still worth discussing. In particular the law is still satisfied by <code>Maybe</code>. However, it is ''not'' satisfied by, for example, lists. The problem is that the results come out in a different order. For example, suppose <code>a = [(+1), (*10)]</code>, <code>b = [2]</code>, and <code>c = [3]</code>. Then the left-hand side yields <code>[3,4,20,30]</code>, whereas the right-hand side is <code>[3,20,4,30]</code>.</p><p><code>IO</code> does not satisfy it either, since, for example, <code>a</code> may succeed only the ''second'' time it is executed. Parsers, on the other hand, may or may not satisfy this law, depending on how they handle backtracking. Parsers for which <code>(<|>)</code> by itself does full backtracking will satisfy the law; but for many parser combinator libraries this is not the case, for efficiency reasons. For example, parsec fails this law: if <code>a</code> succeeds while consuming some input, and afterwards <code>b</code> fails without consuming any input, then the left-hand side may succeed while the right-hand side fails: after <code>(a <*> b)</code> fails, the right-hand side tries to re-run <code>a</code> without backtracking over the input the original <code>a</code> consumed.</p>
* ''Left Catch'':<p><haskell>(pure a) <|> x = pure a</haskell></p><p>Intuitively, this law states that <code>pure</code> should always represent a "successful" computation. It is satisfied by <code>Maybe</code>, <code>IO</code>, and parsers. However, it is not satisfied by lists, since lists collect ''all'' possible results: it corresponds to <code>[a] ++ x == [a]</code> which is obviously false.</p>
This, then, is the situation: we have a lot of instances of <code>Alternative</code> (and <code>MonadPlus</code>), with each instance satisfying some ''subset'' of these laws. Moreover, it's not always the ''same'' subset, so there is no obvious "default" set of laws to choose. For now at least, we just have to live with the situation. When using a particular instance of <code>Alternative</code> or <code>MonadPlus</code>, it's worth thinking carefully about which laws it satisfies.
There are a few <code>Alternative</code>-specific utility functions worth mentioning:
* <haskell>guard :: Alternative f => Bool -> f ()</haskell> checks the given condition, and evaluates to <code>pure ()</code> if the condition holds, and <code>empty</code> if not. This can be used to create a conditional failure point in the middle of a computation, where the computation only proceeds if a certain condition holds.
* <haskell>optional :: Alternative f => f a -> f (Maybe a)</haskell> reifies potential failure into the <code>Maybe</code> type: that is, <code>optional x</code> is a computation which always succeeds, returning <code>Nothing</code> if <code>x</code> fails and <code>Just a</code> if <code>x</code> successfully results in <code>a</code>. It is useful, for example, in the context of parsers, where it corresponds to a production which can occur zero or one times.
There used to be a type class called <code>MonadZero</code> containing only
Finally, <code>ArrowZero</code> and <code>ArrowPlus</code> ([http://haskell.org/ghc/docs/latest/html/libraries/base/Control-Arrow.html#t:ArrowZero haddock])
A great introduction to the <code>MonadPlus</code> type class, with interesting examples of its use, is Doug Auclair’s ''MonadPlus: What a Super Monad!'' in [http://www.haskell.org/wikiupload/6/6a/TMR-Issue11.pdf the Monad.Reader issue 11].
Another interesting use of <code>MonadPlus</code> can be found in Christiansen et al, [http://www-ps.informatik.uni-kiel.de/~sad/icfp2016-preprint.pdf All Sorts of Permutations], from ICFP 2016.
class Arrow (~>) => ArrowZero (~>) where
zeroArrow :: b ~> c
class ArrowZero (~>) => ArrowPlus (~>) where
The [https://hackage.haskell.org/package/logict logict package] defines a type with prominent <code>Alternative</code> and <code>MonadPlus</code> instances that can be used to efficiently enumerate possibilities subject to constraints, ''i.e.'' logic programming; it's like the list monad on steroids.
(<+>) :: (b ~> c) -> (b ~> c) -> (b ~> c)
Monoids have gotten a fair bit of attention recently, ultimately due
[http://enfranchisedmind.com/blog/posts/random-thoughts-on-haskell/ a blog post by Brian Hurt], in which he
resulted in [http://thread.gmane.org/gmane.comp.lang.haskell.cafe/50590 a long haskell-cafe thread]
Heinrich Apfelmus’s [http://apfelmus.nfshost.com/monoid-fingertree.html Monoids and Finger Trees], an accessible exposition of
order to compute incremental folds (see [http://www.haskell.org/sitewiki/images/6/6a/TMR-Issue11.pdf the Monad Reader issue 11])
Some other interesting examples of <code>Monoid</code> use include [http://www.reddit.com/r/programming/comments/7cf4r/monoids_in_my_programming_language/c06adnx building elegant list sorting combinators],
[http://byorgey.wordpress.com/2008/04/17/collecting-unstructured-information-with-the-monoid-of-partial-knowledge/ collecting unstructured information],
and a brilliant series of posts by Chung-Chieh Shan and Dylan Thurston
using <code>Monoid</code>s to [http://conway.rutgers.edu/~ccshan/wiki/blog/posts/WordNumbers1/ elegantly solve a difficult combinatorial puzzle] (followed by
[http://conway.rutgers.edu/~ccshan/wiki/blog/posts/WordNumbers2/ part 2],
[http://conway.rutgers.edu/~ccshan/wiki/blog/posts/WordNumbers4/ part 4]).
=Foldable=
The <code>Foldable</code> class, defined in the <code>Data.Foldable</code>
module ([http://haskell.org/ghc/docs/latest/html/libraries/base/Data-Foldable.html haddock]), abstracts over containers which can be
module ([{{HackageDocs|base|Data-Foldable}} haddock]), abstracts over containers which can be
“folded” into a summary value. This allows such folding operations
to be written in a container-agnostic way.
fold :: Monoid m => t m -> m
foldMap :: Monoid m => (a -> m) -> t a -> m
foldr :: (a -> b -> b) -> b -> t a -> b
foldl :: (a -> b -> a) -> a -> t b -> a
foldr' :: (a -> b -> b) -> b -> t a -> b
foldl :: (b -> a -> b) -> b -> t a -> b
foldl' :: (b -> a -> b) -> b -> t a -> b
foldr1 :: (a -> a -> a) -> t a -> a
foldl1 :: (a -> a -> a) -> t a -> a
toList :: t a -> [a]
null :: t a -> Bool
length :: t a -> Int
elem :: Eq a => a -> t a -> Bool
maximum :: Ord a => t a -> a
minimum :: Ord a => t a -> a
sum :: Num a => t a -> a
product :: Num a => t a -> a
you only need to implement one method: your choice of <code>foldMap</code> or
<code>foldr</code>. All the other methods have default implementations in terms
of these, and are presumably included in the class in case more
of these, and are included in the class in case more
efficient implementations can be provided.
instance Foldable [] where
foldMap :: Monoid m => (a -> m) -> [a] -> m
foldMap g = mconcat . map g
instance Foldable Tree where
foldMap f Empty = mempty
foldMap :: Monoid m => (a -> m) -> Tree a -> m
foldMap f (Leaf x) = f x
foldMap f (Node l k r) = foldMap f l ++ f k ++ foldMap f r
where (++) = mappend
foldMap f (Node l k r) = foldMap f l `mappend` f k `mappend` foldMap f r
The <code>foldr</code> function has a type similar to the <code>foldr</code> found in the <code>Prelude</code>, but
more general, since the <code>foldr</code> in the <code>Prelude</code> works only on lists.
The <code>Foldable</code> module also provides instances for <code>Maybe</code> and <code>Array</code>;
additionally, many of the data structures found in the standard [http://hackage.haskell.org/package/containers containers library] (for example, <code>Map</code>, <code>Set</code>, <code>Tree</code>,
and <code>Sequence</code>) provide their own <code>Foldable</code> instances.
# Implement <code>fold</code> in terms of <code>foldMap</code>.
# What would you need in order to implement <code>foldMap</code> in terms of <code>fold</code>?
# Implement <code>foldMap</code> in terms of <code>foldr</code>.
# Implement <code>foldr</code> in terms of <code>foldMap</code> (hint: use the <code>Endo</code> monoid).
# What is the type of <code>foldMap . foldMap</code>? Or <code>foldMap . foldMap . foldMap</code>, etc.? What do they do?
==Derived folds==
The <code>Foldable</code> module also provides a large number of predefined
folds, many of which are generalized versions of <code>Prelude</code> functions of the
folds. These used to be generalized versions of <code>Prelude</code> functions of the
same name that only work on lists: <code>concat</code>, <code>concatMap</code>, <code>and</code>,
same name that only worked on lists; but [https://wiki.haskell.org/Foldable_Traversable_In_Prelude as of GHC 7.10], the generalized versions themselves are now exported from the Prelude: for example, <code>concat</code>, <code>concatMap</code>, <code>and</code>,
<code>or</code>, <code>any</code>, <code>all</code>, <code>sum</code>, <code>product</code>, <code>maximum</code>(<code>By</code>),
<code>minimum</code>(<code>By</code>), <code>elem</code>, <code>notElem</code>, and <code>find</code>. The reader may enjoy
<code>minimum</code>(<code>By</code>), <code>elem</code>, <code>notElem</code>, and <code>find</code>. For example, before GHC 7.10, <code>length</code> used to have type <code>length :: [a] -> Int</code>; now it has type <code>Foldable t => t a -> Int</code> (and is in fact the same as the <code>containerSize</code> function shown above).
coming up with elegant implementations of these functions using <code>fold</code>
or <code>foldMap</code> and appropriate <code>Monoid</code> instances.
The important function <code>toList</code> is also provided, which turns any <code>Foldable</code> structure into a list of its elements in left-right order; it works by folding with the list monoid.
There are also generic functions that work with <code>Applicative</code> or
and others. The results must be discarded because the <code>Foldable</code>
class is too weak to specify what to do with them: we cannot, in
general, make an arbitrary <code>Applicative</code> or <code>Monad</code> instance into a
general, make an arbitrary <code>Applicative</code> or <code>Monad</code> instance into a <code>Monoid</code>, but we can make <code>m ()</code> into a <code>Monoid</code> for any such <code>m</code>. If we do have an <code>Applicative</code> or <code>Monad</code> with a monoid
<code>Monoid</code>. If we do have an <code>Applicative</code> or <code>Monad</code> with a monoid
structure—that is, an <code>Alternative</code> or a <code>MonadPlus</code>—then we can
use the <code>asum</code> or <code>msum</code> functions, which can combine the results as
well. Consult the [http://haskell.org/ghc/docs/latest/html/libraries/base/Data-Foldable.html <code>Foldable</code> documentation] for
well. Consult the [{{HackageDocs|base|Data-Foldable}} <code>Foldable</code> documentation] for
more details on any of these functions.
structure—and this is exactly what the <code>Traversable</code> class provides,
which will be discussed in the next section.
# Implement <code>toList :: Foldable f {{=}}> f a -> [a]</code> in terms of either <code>foldr</code> or <code>foldMap</code>.
# Show how one could implement the generic version of <code>foldr</code> in terms of <code>toList</code>, assuming we had only the list-specific <code>foldr :: (a -> b -> b) -> b -> [a] -> b</code>.
# Pick some of the following functions to implement: <code>concat</code>, <code>concatMap</code>, <code>and</code>, <code>or</code>, <code>any</code>, <code>all</code>, <code>sum</code>, <code>product</code>, <code>maximum</code>(<code>By</code>), <code>minimum</code>(<code>By</code>), <code>elem</code>, <code>notElem</code>, and <code>find</code>. Figure out how they generalize to <code>Foldable</code> and come up with elegant implementations using <code>fold</code> or <code>foldMap</code> along with appropriate <code>Monoid</code> instances.
* <code>asum :: (Alternative f, Foldable t) => t (f a) -> f a</code> takes a container full of computations and combines them using <code>(<|>)</code>.
* <code>sequenceA_ :: (Applicative f, Foldable t) => t (f a) -> f ()</code> takes a container full of computations and runs them in sequence, discarding the results (that is, they are used only for their effects). Since the results are discarded, the container only needs to be <code>Foldable</code>. (Compare with <code>sequenceA :: (Applicative f, Traversable t) => t (f a) -> f (t a)</code>, which requires a stronger <code>Traversable</code> constraint in order to be able to reconstruct a container of results having the same shape as the original container.)
* <code>traverse_ :: (Applicative f, Foldable t) => (a -> f b) -> t a -> f ()</code> applies the given function to each element in a foldable container and sequences the effects (but discards the results).
* <code>for_</code> is the same as <code>traverse_</code> but with its arguments flipped. This is the moral equivalent of a "foreach" loop in an imperative language.
* For historical reasons, there are also variants of all the above with overly-restrictive <code>Monad</code>(-like) constraints: <code>msum</code> is the same as <code>asum</code> specialized to <code>MonadPlus</code>, and <code>sequence_</code>, <code>mapM_</code>, and <code>forM_</code> respectively are <code>Monad</code> specializations of <code>sequenceA_</code>, <code>traverse_</code>, and <code>for_</code>.
# Implement <code>traverse_</code> in terms of <code>sequenceA_</code> and vice versa. One of these will need an extra constraint. What is it?
==Foldable actually isn't==
The generic term "fold" is often used to refer to the more technical concept of [[Catamorphisms|catamorphism]]. Intuitively, given a way to summarize "one level of structure" (where recursive subterms have already been replaced with their summaries), a catamorphism can summarize an entire recursive structure. It is important to realize that <code>Foldable</code> does <i>not</i> correspond to catamorphisms, but to something weaker. In particular, <code>Foldable</code> allows observing only the left-right traversal order of elements within a structure, not the actual structure itself. Put another way, every use of <code>Foldable</code> can be expressed in terms of <code>toList</code>. For example, <code>fold</code> itself is equivalent to <code>mconcat . toList</code>.
This is sufficient for many tasks, but not all. For example, consider trying to compute the depth of a <code>Tree</code>: try as we might, there is no way to implement it using <code>Foldable</code>. However, it <i>can</i> be implemented as a catamorphism.
An interesting use of <code>Foldable</code> (as well as <code>Traversable</code>) can be
found in Janis Voigtländer’s paper [http://doi.acm.org/10.1145/1480881.1480904 Bidirectionalization for free!].
For more on the relationship between <code>fold</code>, <code>foldMap</code>, and <code>foldr</code>, see [https://byorgey.wordpress.com/2012/11/05/foldr-is-made-of-monoids/ foldr is made of monoids].
There was [http://tojans.me/blog/2015/10/13/foldable-for-non-haskellers-haskells-controversial-ftp-proposal/ quite a bit of controversy] in the Haskell community about a [https://wiki.haskell.org/Foldable_Traversable_In_Prelude proposal to integrate <code>Foldable</code> (and <code>Traversable</code>) more tightly into the Prelude], known as the FTP. Some of the controversy centered around <code>Foldable</code> instances such as the one for <code>((,) a)</code>, which, together with generalized types for functions such as <code>length :: Foldable t => t a -> Int</code>, allow one to derive seemingly nonsensical results such as <code>length (2,3) = 1</code>. Here is a [https://www.youtube.com/watch?v=87re_yIQMDw humorous talk] poking fun at the situation.
=Traversable=
The <code>Traversable</code> type class, defined in the <code>Data.Traversable</code>
module ([http://haskell.org/ghc/docs/latest/html/libraries/base/Data-Traversable.html haddock]), is:
module ([{{HackageDocs|base|Data-Traversable}} haddock]), is:
traverse :: Applicative f => (a -> f b) -> t a -> f (t b)
sequenceA :: Applicative f => t (f a) -> f (t a)
mapM :: Monad m => (a -> m b) -> t a -> m (t b)
sequence :: Monad m => t (m a) -> m (t a)
As you can see, every <code>Traversable</code> is also a foldable functor. Like
As you can see, every <code>Traversable</code> is also a <code>Foldable</code> <code>Functor</code>. To make a <code>Traversable</code> instance, it suffices to implement either <code>traverse</code> or
<code>Foldable</code>, there is a lot in this type class, but making instances is
actually rather easy: one need only implement <code>traverse</code> or
<code>sequenceA</code>; the other methods all have default implementations in
terms of these functions. A good exercise is to figure out what the default
terms of these. Note that <code>mapM</code> and <code>sequence</code> only exist for historical reasons; especially now that <code>Applicative</code> is a superclass of <code>Monad</code>, they are nothing more than copies of <code>traverse</code> and <code>sequenceA</code>, respectively, but with more restrictive types.
implementations should be: given either <code>traverse</code> or <code>sequenceA</code>, how
would you define the other three methods? (Hint for <code>mapM</code>:
<code>Control.Applicative</code> exports the <code>WrapMonad</code> newtype, which makes any
<code>Monad</code> into an <code>Applicative</code>. The <code>sequence</code> function can be implemented in terms
of <code>mapM</code>.)
The key method of the <code>Traversable</code> class, and the source of its
unique power, is <code>sequenceA</code>. Consider its type:
The key method of the <code>Traversable</code> class is <code>traverse</code>, which has the following type:
This leads us to view <code>Traversable</code> as a generalization of <code>Functor</code>. <code>traverse</code> is an "effectful <code>fmap</code>": it allows us to map over a structure of type <code>t a</code>, applying a function to every element of type <code>a</code> in order to produce a new structure of type <code>t b</code>; but along the way the function may have some effects (captured by the applicative functor <code>f</code>).
Alternatively, we may consider the <code>sequenceA</code> function. Consider its type:
This answers the fundamental question: when can we commute two
functors? For example, can we turn a tree of lists into a list of
trees? (Answer: yes, in two ways. Figuring out what they are, and
trees?
why, is left as an exercise. A much more challenging question is
whether a list of trees can be turned into a tree of lists.)
The ability to compose two monads depends crucially on this ability to
the <code>n</code> past the <code>m</code> to get <code>m (m (n (n a)))</code>, and then we can use the
<code>join</code>s for <code>m</code> and <code>n</code> to produce something of type <code>m (n a)</code>. See
[http://web.cecs.pdx.edu/~mpj/pubs/springschool.html Mark Jones’s paper] for more details.
[http://web.cecs.pdx.edu/~mpj/pubs/springschool.html Mark Jones’ paper] for more details.
It turns out that given a <code>Functor</code> constraint on the type <code>t</code>, <code>traverse</code> and <code>sequenceA</code> are equivalent in power: either can be implemented in terms of the other.
# There are at least two natural ways to turn a tree of lists into a list of trees. What are they, and why?
# Give a natural way to turn a list of trees into a tree of lists.
# What is the type of <code>traverse . traverse</code>? What does it do?
# Implement <code>traverse</code> in terms of <code>sequenceA</code>, and vice versa.
==Instances and examples==
instance Traversable Tree where
traverse :: Applicative f => (a -> f b) -> Tree a -> f (Tree b)
traverse g Empty = pure Empty
traverse g (Leaf x) = Leaf <$> g x
instance Functor Tree where
fmap :: (a -> b) -> Tree a -> Tree b
fmap g Empty = Empty
fmap g (Leaf x) = Leaf $ g x
It should be clear that the <code>Traversable</code> and <code>Functor</code> instances for
<code>Tree</code> are almost identical; the only difference is that the <code>Functor</code>
<code>Tree</code> are structurally identical; the only difference is that the <code>Functor</code>
instance involves normal function application, whereas the
applications in the <code>Traversable</code> instance take place within an
<code>Applicative</code> context, using <code>(<$>)</code> and <code>(<*>)</code>. In fact, this will
<code>Applicative</code> context, using <code>(<$>)</code> and <code>(<*>)</code>. This same pattern will hold for any type.
true for any type.
Any <code>Traversable</code> functor is also <code>Foldable</code>, and a <code>Functor</code>. We can see
this not only from the class declaration, but by the fact that we can
implement the methods of both classes given only the <code>Traversable</code>
methods. A good exercise is to implement <code>fmap</code> and <code>foldMap</code> using
methods.
only the <code>Traversable</code> methods; the implementations are surprisingly
elegant. The <code>Traversable</code> module provides these
implementations as <code>fmapDefault</code> and <code>foldMapDefault</code>.
The standard libraries provide a number of <code>Traversable</code> instances,
including instances for <code>[]</code>, <code>Maybe</code>, <code>Map</code>, <code>Tree</code>, and <code>Sequence</code>.
including instances for <code>[]</code>, <code>ZipList</code>, <code>Maybe</code>, <code>((,) e)</code>, <code>Sum</code>, <code>Product</code>, <code>Either e</code>, <code>Map</code>, <code>Tree</code>, and <code>Sequence</code>.
Notably, <code>Set</code> is not <code>Traversable</code>, although it is <code>Foldable</code>.
# Implement <code>fmap</code> and <code>foldMap</code> using only the <code>Traversable</code> methods. (Note that the <code>Traversable</code> module provides these implementations as <code>fmapDefault</code> and <code>foldMapDefault</code>.)
# Implement <code>Traversable</code> instances for <code>[]</code>, <code>Maybe</code>, <code>((,) e)</code>, and <code>Either e</code>.
# Explain why <code>Set</code> is <code>Foldable</code> but not <code>Traversable</code>.
# Show that <code>Traversable</code> functors compose: that is, implement an instance for <code>Traversable (Compose f g)</code> given <code>Traversable</code> instances for <code>f</code> and <code>g</code>.
Any instance of <code>Traversable</code> must satisfy the following two laws, where <code>Identity</code> is the identity functor (as defined in the [http://hackage.haskell.org/packages/archive/transformers/latest/doc/html/Data-Functor-Identity.html <code>Data.Functor.Identity</code> module] from the <code>transformers</code> package), and <code>Compose</code> wraps the composition of two functors (as defined in [http://hackage.haskell.org/packages/archive/transformers/0.3.0.0/doc/html/Data-Functor-Compose.html <code>Data.Functor.Compose</code>]):
# <code>traverse Identity = Identity</code>
# <code>traverse (Compose . fmap g . f) = Compose . fmap (traverse g) . traverse f</code>
The first law essentially says that traversals cannot make up arbitrary effects. The second law explains how doing two traversals in sequence can be collapsed to a single traversal.
Additionally, suppose <code>eta</code> is an "<code>Applicative</code> morphism", that is,
eta :: forall a f g. (Applicative f, Applicative g) => f a -> g a
and <code>eta</code> preserves the <code>Applicative</code> operations: <code>eta (pure x) = pure x</code> and <code>eta (x <*> y) = eta x <*> eta y</code>. Then, by parametricity, any instance of <code>Traversable</code> satisfying the above two laws will also satisfy <code>eta . traverse f = traverse (eta . f)</code>.
The <code>Traversable</code> class also had its genesis in [http://www.soi.city.ac.uk/~ross/papers/Applicative.html McBride and Paterson’s
The <code>Traversable</code> class also had its genesis in [http://www.soi.city.ac.uk/~ross/papers/Applicative.html McBride and Paterson’s <code>Applicative</code> paper],
<code>Applicative</code> paper], and is described in
and is described in more detail in Gibbons and Oliveira, [http://www.comlab.ox.ac.uk/jeremy.gibbons/publications/iterator.pdf The Essence of the Iterator Pattern],
more detail in Gibbons and Oliveira, [http://www.comlab.ox.ac.uk/jeremy.gibbons/publications/iterator.pdf The Essence of the Iterator Pattern], which also contains a wealth of
which also contains a wealth of references to related work.
references to related work.
<code>Traversable</code> forms a core component of Edward Kmett's [http://hackage.haskell.org/package/lens lens library]. Watching [https://vimeo.com/56063074 Edward's talk on the subject] is a highly recommended way to gain better insight into <code>Traversable</code>, <code>Foldable</code>, <code>Applicative</code>, and many other things besides.
For references on the <code>Traversable</code> laws, see Russell O'Connor's [http://archive.fo/7XcVE mailing list post] (and subsequent thread), and [https://arxiv.org/abs/1202.2919 this paper by Jaskelioff and Rypacek] for a more in-depth discussion. Daniel Mlot also has [http://duplode.github.io/posts/traversable-a-remix.html this very nice blog post] explaining how <code>Traversable</code> arises by considering a variant on the usual Kleisli category of a monad, which also sheds light on where the <code>Traversable</code> laws come from.
[http://elvishjerricco.github.io/2017/03/23/applicative-sorting.html This blog post by Will Fancher] shows how to use <code>Traversable</code> along with a clever choice of <code>Applicative</code> to efficiently sort any <code>Traversable</code> container.
=Bifunctor=
Recall that a <code>Functor</code> is a type of kind <code>* -> *</code> where one can "map" a function over the type parameter. <code>(Either e)</code> is a <code>Functor</code> (with <code>fmap :: (a -> b) -> Either e a -> Either e b</code>), as is <code>((,) e)</code>. But there is something oddly asymmetric about these two examples: in principle, there is no reason we can't map over the <code>e</code> instead of the <code>a</code>, for example, like so: <code>lmap :: (e -> e') -> Either e a -> Either e' a</code>. This observation leads directly to the definition of <code>Bifunctor</code>, a class for types of kind <code>* -> * -> *</code> where one can functorially map over ''both'' type parameters.
Here is the type class declaration for <code>Bifunctor</code>, defined
in <code>Data.Bifunctor</code> (since <code>base-4.8</code>, which came with GHC 7.10):
class Bifunctor p where
bimap :: (a -> b) -> (c -> d) -> p a c -> p b d
first :: (a -> b) -> p a c -> p b c
second :: (b -> c) -> p a b -> p a c
We can infer from the fact that <code>p</code> is applied to two type
arguments that its kind must be <code>* -> * -> *</code>. The most
fundamental method of the <code>Bifunctor</code> class is
<code>bimap</code>, which allows mapping over both type arguments at
once. For example,
bimap (+1) length (4, [1,2,3]) = (5,3)
<code>first</code> and <code>second</code> are also provided for
mapping over only one type argument at a time. One is required to
define either <code>bimap</code>, or both <code>first</code> and
<code>second</code>, since default definitions are provided for each
in terms of the others, namely:
bimap f g = first f . second g
first f = bimap f id
second g = bimap id g
The laws for <code>Bifunctor</code> are entirely analogous to the laws
for <code>Functor</code>. First, mapping with the identity function
should have no effect:
bimap id id = id
first id = id
second id = id
Second, mapping with a composition should be the same as a composition
of maps:
bimap (f . g) (h . i) = bimap f h . bimap g i
first (f . g) = first f . first g
second (f . g) = second f . second g
These composition laws actually come "for free" (that is, by
parametricity) once the identity laws are satisfied. One can also
check that the default implementations of <code>first</code> and
<code>second</code> will satisfy the requisite laws if and only if
<code>bimap</code> does, and vice versa.
There is one additional law that relates <code>bimap</code>,
<code>first</code>, and <code>second</code>, namely,
However, this law will hold automatically if one defines only
<code>bimap</code>, or only <code>first</code> and
<code>second</code>, using the default implementation for the others.
So you only need to worry about this law if for some reason (''e.g.''
efficiency) you define all three of the methods by hand.
One might wonder about the symmetric law <code>bimap f g = second g
. first f</code>; it turns out that once <code>bimap f g = first f
. second g</code> is satisfied, the symmetric version [https://byorgey.wordpress.com/2018/03/30/parametricity-for-bifunctor/ also follows from parametricity].
In summary, there are many laws that can be stated, but most of them
follow automatically from default definitions or from parametricity.
For example, if you define only <code>bimap</code>, then the only law
you actually need to check is <code>bimap id id = id</code>; all the
other laws come for free. Likewise, if you define only
<code>first</code> and <code>second</code>, you only need to check
that <code>first id = id</code> and <code>second id = id</code>.
* <code>(,)</code> and <code>Either</code> are instances in the evident way.
* Some larger tuple constructors are also instances; for example, the instance for <code>(,,)</code> maps over the last two components, leaving the first alone. Why anyone would ever want to use this is unclear.
* A value of type <code>Const a b</code> (to be discussed more in a later section) consists simply of a value of type <code>a</code>; <code>bimap f g</code> maps <code>f</code> over the <code>a</code> and ignores <code>g</code>.
=Category=
<code>Category</code> is another fairly new addition to the Haskell standard
<code>Category</code> is a relatively recent addition to the Haskell standard libraries. It generalizes the notion of function composition to general “morphisms”.
libraries; you may or may not have it installed depending on the
version of your <code>base</code> package. It generalizes the notion of
function composition to general “morphisms”.
{{note|GHC 7.6.1 changed its rules regarding types and type variables. Now, any operator at the type level is treated as a type ''constructor'' rather than a type ''variable''; prior to GHC 7.6.1 it was possible to use <code>(~>)</code> instead of <code>`arr`</code>. For more information, see [http://archive.fo/weS2f the discussion on the GHC-users mailing list]. For a new approach to nice arrow notation that works with GHC 7.6.1, see [http://archive.fo/HhdvB this message] and also [http://archive.fo/iGx6W this message] from Edward Kmett, though for simplicity I haven't adopted it here.}}
The definition of the <code>Category</code> type class (from
<code>Control.Category</code>—[http://haskell.org/ghc/docs/latest/html/libraries/base/Control-Category.html haddock]) is shown below. For ease of reading, note that I have used an
<code>Control.Category</code>; [{{HackageDocs|base|Control-Category}} haddock]) is shown below. For ease of reading, note that I have used an infix type variable <code>`arr`</code>, in parallel with the infix function type constructor <code>(->)</code>. {{noteref}} This syntax is not part of Haskell 2010. The second definition shown is the one used in the standard libraries. For the remainder of this document, I will use the infix type constructor <code>`arr`</code> for <code>Category</code> as well as <code>Arrow</code>.
infix type constructor <code>(~>)</code>, much like the infix function type
constructor <code>(->)</code>. This syntax is not part of Haskell 98.
The second definition shown is the one used in the standard libraries.
For the remainder of this document, I will use the infix type
constructor <code>(~>)</code> for <code>Category</code> as well as <code>Arrow</code>.
class Category (~>) where
class Category arr where
id :: a ~> a
id :: a `arr` a
(.) :: (b ~> c) -> (a ~> b) -> (a ~> c)
(.) :: (b `arr` c) -> (a `arr` b) -> (a `arr` c)
-- The same thing, with a normal (prefix) type constructor
Note that an instance of <code>Category</code> should be a type constructor which
Note that an instance of <code>Category</code> should be a type which takes two type arguments, that is, something of kind <code>* -> * -> *</code>. It is instructive to imagine the type variable <code>cat</code> replaced by the function constructor <code>(->)</code>: indeed, in this case we recover precisely the familiar identity function <code>id</code> and function composition operator <code>(.)</code> defined in the standard <code>Prelude</code>.
takes two type arguments, that is, something of kind <code>* -> * -> *</code>. It
is instructive to imagine the type constructor variable <code>cat</code> replaced
by the function constructor <code>(->)</code>: indeed, in this case we recover
precisely the familiar identity function <code>id</code> and function composition
operator <code>(.)</code> defined in the standard <code>Prelude</code>.
Of course, the <code>Category</code> module provides exactly such an instance of
<code>Category</code> for <code>(->)</code>. But it also provides one other instance, shown
<code>Category</code> for <code>(->)</code>. But it also provides one other instance, shown below, which should be familiar from the previous discussion of the <code>Monad</code> laws. <code>Kleisli m a b</code>, as defined in the <code>Control.Arrow</code> module, is just a <code>newtype</code> wrapper around <code>a -> m b</code>.
below, which should be familiar from the
previous discussion of the <code>Monad</code> laws. <code>Kleisli m a b</code>, as defined
in the <code>Control.Arrow</code> module, is just a <code>newtype</code> wrapper around <code>a -> m b</code>.
instance Monad m => Category (Kleisli m) where
id :: Kleisli m a a
id = Kleisli return
(.) :: Kleisli m b c -> Kleisli m a b -> Kleisli m a c
Kleisli g . Kleisli h = Kleisli (h >=> g)
The only law that <code>Category</code> instances should satisfy is that <code>id</code> and
The only laws that <code>Category</code> instances should satisfy are that <code>id</code> should be the identity of <code>(.)</code>, and <code>(.)</code> should be associative. This is kind of like being a monoid, except that, unlike with monoids, not any two values can be composed with <code>(.)</code>---their types have to match up.
<code>(.)</code> should form a monoid—that is, <code>id</code> should be the identity of
<code>(.)</code>, and <code>(.)</code> should be associative.
Finally, the <code>Category</code> module exports two additional operators:
<code>(<<<)</code>, which is just a synonym for <code>(.)</code>, and <code>(>>>)</code>, which is
<code>(<<<)</code>, which is just a synonym for <code>(.)</code>, and <code>(>>>)</code>, which is <code>(.)</code> with its arguments reversed. (In previous versions of the libraries, these operators were defined as part of the <code>Arrow</code> class.)
<code>(.)</code> with its arguments reversed. (In previous versions of the
libraries, these operators were defined as part of the <code>Arrow</code> class.)
The name <code>Category</code> is a bit misleading, since the <code>Category</code> class
The name <code>Category</code> is a bit misleading, since the <code>Category</code> class cannot represent arbitrary categories, but only categories whose objects are objects of <code>Hask</code>, the category of Haskell types. For a more general treatment of categories within Haskell, see the [http://hackage.haskell.org/package/category-extras category-extras package]. For more about category theory in general, see the excellent [http://en.wikibooks.org/wiki/Haskell/Category_theory Haskell wikibook page],
cannot represent arbitrary categories, but only categories whose
[http://books.google.com/books/about/Category_theory.html?id=-MCJ6x2lC7oC Steve Awodey’s new book], Benjamin Pierce’s [http://books.google.com/books/about/Basic_category_theory_for_computer_scien.html?id=ezdeaHfpYPwC Basic category theory for computer scientists], or [http://folli.loria.fr/cds/1999/esslli99/courses/barr-wells.html Barr and Wells category theory lecture notes]. [http://dekudekuplex.wordpress.com/2009/01/19/motivating-learning-category-theory-for-non-mathematicians/ Benjamin Russell’s blog post]
objects are objects of <code>Hask</code>, the category of Haskell types. For a
is another good source of motivation and category theory links. You certainly don’t need to know any category theory to be a successful and productive Haskell programmer, but it does lend itself to much deeper appreciation of Haskell’s underlying theory.
more general treatment of categories within Haskell, see the
[http://hackage.haskell.org/package/category-extras category-extras package]. For more about
category theory in general, see the excellent [http://en.wikibooks.org/wiki/Haskell/Category_theory Haskell wikibook page],
[http://books.google.com/books/about/Category_theory.html?id=-MCJ6x2lC7oC Steve Awodey’s new book],
Benjamin Pierce’s
[http://books.google.com/books/about/Basic_category_theory_for_computer_scien.html?id=ezdeaHfpYPwC Basic category theory for computer scientists], or
[http://folli.loria.fr/cds/1999/esslli99/courses/barr-wells.html Barr and Wells’s category theory lecture notes]. [http://dekudekuplex.wordpress.com/2009/01/19/motivating-learning-category-theory-for-non-mathematicians/ Benjamin Russell’s blog post]
is another good source of motivation and
category theory links. You certainly don’t need to know any category
theory to be a successful and productive Haskell programmer, but it
does lend itself to much deeper appreciation of Haskell’s underlying
theory.
=Arrow=
and <code>Applicative</code>, whose types only reflect their output, the type of
an <code>Arrow</code> computation reflects both its input and output. Arrows
generalize functions: if <code>(~>)</code> is an instance of <code>Arrow</code>, a value of
generalize functions: if <code>arr</code> is an instance of <code>Arrow</code>, a value of
type <code>b ~> c</code> can be thought of as a computation which takes values of
type <code>b `arr` c</code> can be thought of as a computation which takes values of
type <code>b</code> as input, and produces values of type <code>c</code> as output. In the
<code>(->)</code> instance of <code>Arrow</code> this is just a pure function; in general, however,
The definition of the <code>Arrow</code> type class, from
<code>Control.Arrow</code> ([http://haskell.org/ghc/docs/latest/html/libraries/base/Control-Arrow.html haddock]), is:
<code>Control.Arrow</code> ([{{HackageDocs|base|Control-Arrow}} haddock]), is:
class Category (~>) => Arrow (~>) where
class Category arr => Arrow arr where
arr :: (b -> c) -> (b ~> c)
arr :: (b -> c) -> (b `arr` c)
first :: (b ~> c) -> ((b, d) ~> (c, d))
first :: (b `arr` c) -> ((b, d) `arr` (c, d))
second :: (b ~> c) -> ((d, b) ~> (d, c))
second :: (b `arr` c) -> ((d, b) `arr` (d, c))
(***) :: (b ~> c) -> (b' ~> c') -> ((b, b') ~> (c, c'))
(***) :: (b `arr` c) -> (b' `arr` c') -> ((b, b') `arr` (c, c'))
(&&&) :: (b ~> c) -> (b ~> c') -> (b ~> (c, c'))
(&&&) :: (b `arr` c) -> (b `arr` c') -> (b `arr` (c, c'))
The first thing to note is the <code>Category</code> class constraint, which
means that we get identity arrows and arrow composition for free:
given two arrows <code>g :: b ~> c</code> and <code>h :: c ~> d</code>, we can form their
given two arrows <code>g :: b `arr` c</code> and <code>h :: c `arr` d</code>, we can form their
composition <code>g >>> h :: b ~> d</code> {{noteref}}.
composition <code>g >>> h :: b `arr` d</code> {{noteref}}.
As should be a familiar pattern by now, the only methods which must be
included in the <code>Arrow</code> class so that they can be overridden with more
efficient implementations if desired.
Note that <code>first</code> and <code>second</code> conflict with methods of the same name from <code>Data.Bifunctor</code>. If you want to use both for some reason, you will need to import one or both qualified. It used to be common to import <code>Control.Arrow</code> just to get the <code>(->)</code> instance for use in editing pairs using <code>first</code> or <code>second</code>; now it is recommended to import <code>Data.Bifunctor</code> for this purpose instead. (Notice that for the <code>(->)</code> instance of <code>Arrow</code> and the <code>(,)</code> instance of <code>Bifunctor</code>, <code>first</code> and <code>second</code> specialize to the same type.)
build intuition.
* The <code>arr</code> function takes any function <code>b -> c</code> and turns it into a generalized arrow <code>b ~> c</code>. The <code>arr</code> method justifies the claim that arrows generalize functions, since it says that we can treat any function as an arrow. It is intended that the arrow <code>arr g</code> is “pure” in the sense that it only computes <code>g</code> and has no “effects” (whatever that might mean for any particular arrow type).
* The <code>arr</code> function takes any function <code>b -> c</code> and turns it into a generalized arrow <code>b `arr` c</code>. The <code>arr</code> method justifies the claim that arrows generalize functions, since it says that we can treat any function as an arrow. It is intended that the arrow <code>arr g</code> is “pure” in the sense that it only computes <code>g</code> and has no “effects” (whatever that might mean for any particular arrow type).
* The <code>first</code> method turns any arrow from <code>b</code> to code>c</code> into an arrow from <code>(b,d)</code> to <code>(c,d)</code>. The idea is that <code>first g</code> uses code>g</code> to process the first element of a tuple, and lets the second element pass through unchanged. For the function instance of <code>Arrow</code>, of course, <code>first g (x,y) = (g x, y)</code>.
* The <code>first</code> method turns any arrow from <code>b</code> to <code>c</code> into an arrow from <code>(b,d)</code> to <code>(c,d)</code>. The idea is that <code>first g</code> uses <code>g</code> to process the first element of a tuple, and lets the second element pass through unchanged. For the function instance of <code>Arrow</code>, of course, <code>first g (x,y) = (g x, y)</code>.
* The <code>second</code> function is similar to <code>first</code>, but with the elements of the tuples swapped. Indeed, it can be defined in terms of <code>first</code> using an auxiliary function <code>swap</code>, defined by <code>swap (x,y) = (y,x)</code>.
instance Arrow (->) where
arr :: (b -> c) -> (b -> c)
arr g = g
first :: (b -> c) -> ((b,d) -> (c,d))
first g (x,y) = (g x, y)
instance Monad m => Arrow (Kleisli m) where
arr :: (b -> c) -> Kleisli m b c
arr f = Kleisli (return . f)
first :: Kleisli m b c -> Kleisli m (b,d) (c,d)
first (Kleisli f) = Kleisli (\ ~(b,d) -> do c <- f b
return (c,d) )
class Arrow (~>) => ArrowChoice (~>) where
class Arrow arr => ArrowChoice arr where
left :: (b ~> c) -> (Either b d ~> Either c d)
left :: (b `arr` c) -> (Either b d `arr` Either c d)
right :: (b ~> c) -> (Either d b ~> Either d c)
right :: (b `arr` c) -> (Either d b `arr` Either d c)
(+++) :: (b ~> c) -> (b' ~> c') -> (Either b b' ~> Either c c')
(+++) :: (b `arr` c) -> (b' `arr` c') -> (Either b b' `arr` Either c c')
(|||) :: (b ~> d) -> (c ~> d) -> (Either b c ~> d)
(|||) :: (b `arr` d) -> (c `arr` d) -> (Either b c `arr` d)
class Arrow (~>) => ArrowApply (~>) where
class Arrow arr => ArrowApply arr where
app :: (b ~> c, b) ~> c
app :: (b `arr` c, b) `arr` c
producing its output as the output of <code>app</code>. As an exercise, the
reader may wish to use <code>app</code> to implement an alternative “curried”
version, <code>app2 :: b ~> ((b ~> c) ~> c)</code>.
version, <code>app2 :: b `arr` ((b `arr` c) `arr` c)</code>.
This notion of being able to ''compute'' a new computation
instance Monad m => ArrowApply (Kleisli m) where
app :: Kleisli m (Kleisli m b c, b) c
app = -- exercise
instance ArrowApply a => Monad (ArrowMonad a) where
return :: b -> ArrowMonad a b
return = -- exercise
(>>=) :: ArrowMonad a a -> (a -> ArrowMonad a b) -> ArrowMonad a b
(ArrowMonad a) >>= k = -- exercise
class ArrowLoop (~>) => ArrowCircuit (~>) where
class ArrowLoop arr => ArrowCircuit arr where
delay :: b -> (b ~> b)
delay :: b -> (b `arr` b)
counter :: ArrowCircuit (~>) => Bool ~> Int
counter :: ArrowCircuit arr => Bool `arr` Int
counter = proc reset -> do
rec output <- idA -< if reset then 0 else next
There is not space here for a full explanation of arrow notation; the
interested reader should consult [http://www.soi.city.ac.uk/~ross/papers/notation.html Paterson’s paper introducing the
interested reader should consult
notation], or his later [http://www.soi.city.ac.uk/~ross/papers/fop.html
[http://www.soi.city.ac.uk/~ross/papers/notation.html Paterson’s paper introducing the notation], or his later [http://www.soi.city.ac.uk/~ross/papers/fop.html tutorial which presents a simplified version].
tutorial which presents a simplified version].
An excellent starting place for the student of arrows is the [http://www.haskell.org/arrows/ arrows web page], which contains an
introduction and many references. Some key papers on arrows include
Hughes’s original paper introducing arrows, [http://dx.doi.org/10.1016/S0167-6423(99)00023-4 Generalising monads to arrows], and [http://www.soi.city.ac.uk/~ross/papers/notation.html Paterson’s paper on arrow notation].
Hughes’ original paper introducing arrows, [http://dx.doi.org/10.1016/S0167-6423(99)00023-4 Generalising monads to arrows], and [http://www.soi.city.ac.uk/~ross/papers/notation.html Paterson’s paper on arrow notation].
Both Hughes and Paterson later wrote accessible tutorials intended for a broader
audience: [http://www.soi.city.ac.uk/~ross/papers/fop.html Paterson: Programming with Arrows] and [http://www.cse.chalmers.se/~rjmh/afp-arrows.pdf Hughes: Programming with Arrows].
Although Hughes’s goal in defining the <code>Arrow</code> class was to
Although Hughes’ goal in defining the <code>Arrow</code> class was to
generalize <code>Monad</code>s, and it has been said that <code>Arrow</code> lies “between
<code>Applicative</code> and <code>Monad</code>” in power, they are not directly
also invented a new calculus of arrows, based on the lambda calculus,
which considerably simplifies the presentation of the arrow laws
(see [http://homepages.inf.ed.ac.uk/wadler/papers/arrows/arrows.pdf The arrow calculus]).
(see [http://homepages.inf.ed.ac.uk/wadler/papers/arrows/arrows.pdf The arrow calculus]). There is also a precise technical sense in which [http://just-bottom.blogspot.de/2010/04/programming-with-effects-story-so-far.html <code>Arrow</code> can be seen as the intersection of <code>Applicative</code> and <code>Category</code>].
Some examples of <code>Arrow</code>s include [http://www.haskell.org/yampa/ Yampa], the
Some examples of <code>Arrow</code>s include [https://wiki.haskell.org/Yampa Yampa], the
[http://www.fh-wedel.de/~si/HXmlToolbox/ Haskell XML Toolkit], and the functional GUI library [[Grapefruit]].
Some extensions to arrows have been explored; for example, the
[http://www.cs.ru.nl/A.vanWeelden/bi-arrows/ <code>BiArrow</code>s of Alimarine et al.], for two-way instead of one-way
<code>BiArrow</code>s of Alimarine et al. ([http://wiki.clean.cs.ru.nl/download/papers/2005/alia2005-biarrowsHaskellWorkshop.pdf "There and Back Again: Arrows for Invertible Programming"]), for two-way instead of one-way
computation.
The <code>Comonad</code> type class, defined in the <code>Control.Comonad</code> module of
the [http://hackage.haskell.org/package/category-extras category-extras library], is:
the [http://hackage.haskell.org/package/comonad comonad library], is:
class Functor f => Copointed f where
class Functor w => Comonad w where
extract :: f a -> a
extract :: w a -> a
class Copointed w => Comonad w where
duplicate :: w a -> w (w a)
duplicate = extend id
extend :: (w a -> b) -> w a -> w b
extend f = fmap f . duplicate
As you can see, <code>extract</code> is the dual of <code>return</code>, <code>duplicate</code> is the
As you can see, <code>extract</code> is the dual of <code>return</code>, <code>duplicate</code> is the dual of <code>join</code>, and <code>extend</code> is the dual of <code>(=<<)</code>. The definition of <code>Comonad</code> is a bit redundant, giving the programmer the choice on whether extend or duplicate are implemented; the other operation then has a default implementation.
dual of <code>join</code>, and <code>extend</code> is the dual of <code>(>>=)</code> (although its
arguments are in a different order). The definition
of <code>Comonad</code> is a bit redundant (after all, the <code>Monad</code> class does not
need <code>join</code>), but this is so that a <code>Comonad</code> can be defined by <code>fmap</code>,
<code>extract</code>, and ''either'' <code>duplicate</code> or <code>extend</code>. Each has a
default implementation in terms of the other.
A prototypical example of a <code>Comonad</code> instance is:
-- Infinite lazy streams
data Stream a = Cons a (Stream a)
instance Functor Stream where
fmap g (Cons x xs) = Cons (g x) (fmap g xs)
instance Copointed Stream where
extract (Cons x _) = x
-- 'duplicate' is like the list function 'tails'
-- position n onwards in the old Stream
instance Comonad Stream where
extract :: Stream a -> a
duplicate :: Stream a -> Stream (Stream a)
duplicate s@(Cons x xs) = Cons s (duplicate xs)
extend :: (Stream a -> b) -> Stream a -> Stream b
extend g s@(Cons x xs) = Cons (g s) (extend g xs)
-- = fmap g (duplicate s)
Dan Piponi explains in a blog post what [http://blog.sigfpe.com/2006/12/evaluating-cellular-automata-is.html cellular automata have to do
Dan Piponi explains in a blog post what [http://blog.sigfpe.com/2006/12/evaluating-cellular-automata-is.html cellular automata have to do with comonads]. In another blog post, Conal Elliott has examined [http://conal.net/blog/posts/functional-interactive-behavior/ a comonadic formulation of functional reactive programming]. Sterling Clover’s blog post [http://fmapfixreturn.wordpress.com/2008/07/09/comonads-in-everyday-life/ Comonads in everyday life] explains the relationship between comonads and zippers, and how comonads can be used to design a menu system for a web site.
with comonads]. In another blog post,
Conal Elliott has examined [http://conal.net/blog/posts/functional-interactive-behavior/ a comonadic formulation of functional
reactive programming]. Sterling
Clover’s blog post [http://fmapfixreturn.wordpress.com/2008/07/09/comonads-in-everyday-life/ Comonads in everyday life] explains the relationship between
comonads and zippers, and how comonads can be used to design a menu
system for a web site.
Uustalu and Vene have a number of papers exploring ideas related to
Uustalu and Vene have a number of papers exploring ideas related to comonads and functional programming:
comonads and functional programming:
* [http://dx.doi.org/10.1016/j.entcs.2008.05.029 Comonadic Notions of Computation]
* [http://www.cs.ut.ee/~varmo/papers/sfp01-book.ps.gz The dual of substitution is redecoration]
* [http://www.ioc.ee/~tarmo/papers/sfp01-book.pdf The dual of substitution is redecoration] (Also available as [http://www.cs.ut.ee/~varmo/papers/sfp01-book.ps.gz ps.gz].)
* [http://dx.doi.org/10.1016/j.ic.2005.08.005 Recursive coalgebras from comonads]
* [http://www.fing.edu.uy/~pardo/papers/njc01.ps.gz Recursion schemes from comonads]
* [http://cs.ioc.ee/~tarmo/papers/essence.pdf The Essence of Dataflow Programming].
Gabriel Gonzalez's [http://www.haskellforall.com/2013/02/you-could-have-invented-comonads.html Comonads are objects] points out similarities between comonads and object-oriented programming.
The [http://hackage.haskell.org/package/comonad-transformers comonad-transformers] package contains comonad transformers.
=Acknowledgements=
=Colophon=
The Typeclassopedia was written by Brent Yorgey and initally published in March 2009. Painstakingly converted to wiki syntax by [[User:Geheimdienst]] in November 2011, after asking Brent’s permission.
The Typeclassopedia was written by Brent Yorgey and initially published in March 2009. Painstakingly converted to wiki syntax by [[User:Geheimdienst]] in November 2011, after asking Brent’s permission.
If something like this tex to wiki syntax conversion ever needs to be done again, here are some vim commands that helped:
* <nowiki>%s/\\section{\([^}]*\)}/=\1=/gc</nowiki>
* <nowiki>%s/^ *\\item /\r* /gc</nowiki>
* <nowiki>%s/---/—/gc</nowiki>
* <nowiki>%s/\$\([^$]*\)\$/<math>\1\\ <\/math>/gc</nowiki> ''Appending “\ ” forces images to be rendered. Otherwise, Mediawiki would go back and forth between one font for short <nowiki><math></nowiki> tags, and another more Tex-like font for longer tags (containing more than a few characters)""
* <nowiki>%s/|\([^|]*\)|/<code>\1<\/code>/gc</nowiki>
* <nowiki>%s/\\dots/.../gc</nowiki>
* <nowiki>%s/\\term{\([^}]*\)}/''\1''/gc</nowiki>
The biggest issue was taking the academic-paper-style citations and turning them into hyperlinks with an appropriate title and an appropriate target. In most cases there was an obvious thing to do (e.g. online PDFs of the cited papers or Citeseer entries). Sometimes, however, it’s less clear and you might want to check the
[[Media:Typeclassopedia.pdf|original Typeclassopedia PDF]]
with the
[http://code.haskell.org/~byorgey/TMR/Issue13/typeclassopedia.bib original bibliography file].
To get all the citations into the main text, I first tried processing the source with Tex or Lyx. This didn’t work due to missing unfindable packages, syntax errors, and my general ineptitude with Tex.
I then went for the next best solution, which seemed to be extracting all instances of “\cite{something}” from the source and ''in that order'' pulling the referenced entries from the .bib file. This way you can go through the source file and sorted-references file in parallel, copying over what you need, without searching back and forth in the .bib file. I used:
By Brent Yorgey, byorgey@gmail.com
Originally published 12 March 2009 in issue 13 of the Monad.Reader. Ported to the Haskell wiki in November 2011 by Geheimdienst.
This is now the official version of the Typeclassopedia and supersedes the version published in the Monad.Reader. Please help update and extend it by editing it yourself or by leaving comments, suggestions, and questions on the talk page.
3 Functor
3.1 Definition
3.2 Instances
3.3 Laws
3.4 Intuition
3.5 Utility functions
3.6 Further reading
4 Applicative
4.6 Alternative formulation
5 Monad
5.6 do notation
6 MonadFail
6.2 Law
7 Monad transformers
7.1 Standard monad transformers
7.2 Definition and laws
7.3 Transformer type classes and "capability" style
7.4 Composing monads
8 MonadFix
8.1 do rec notation
8.2 Examples and intuition
8.3 mdo syntax
9 Semigroup
10 Monoid
10.1 Definition
10.2 Laws
10.3 Instances
10.4 Further reading
11 Failure and choice: Alternative, MonadPlus, ArrowPlus
11.4 Utility functions
12 Foldable
12.2 Instances and examples
12.3 Derived folds
12.5 Foldable actually isn't
13 Traversable
13.2 Intuition
14 Bifunctor
16 Arrow
16.5 ArrowChoice
16.6 ArrowApply
16.7 ArrowLoop
16.8 Arrow notation
17 Comonad
18 Acknowledgements
19 About the author
Have you ever had any of the following thoughts?
What the heck is a monoid, and how is it different from a monad?
I finally figured out how to use Parsec with do-notation, and someone told me I should use something called Applicative instead. Um, what?
Someone in the #haskell IRC channel used (***), and when I asked Lambdabot to tell me its type, it printed out scary gobbledygook that didn’t even fit on one line! Then someone used fmap fmap fmap and my brain exploded.
When I asked how to do something I thought was really complicated, people started typing things like zip.ap fmap.(id &&& wtf) and the scary thing is that they worked! Anyway, I think those people must actually be robots because there’s no way anyone could come up with that in two seconds off the top of their head.
If you have, look no further! You, too, can write and understand concise, elegant, idiomatic Haskell code with the best of them.
There are two keys to an expert Haskell hacker’s wisdom:
Understand the types.
Gain a deep intuition for each type class and its relationship to other type classes, backed up by familiarity with many examples.
It’s impossible to overstate the importance of the first; the patient student of type signatures will uncover many profound secrets. Conversely, anyone ignorant of the types in their code is doomed to eternal uncertainty. “Hmm, it doesn’t compile ... maybe I’ll stick in an fmap here ... nope, let’s see ... maybe I need another (.) somewhere? ... um ...”
The second key—gaining deep intuition, backed by examples—is also important, but much more difficult to attain. A primary goal of this document is to set you on the road to gaining such intuition. However—
There is no royal road to Haskell. —Euclid
This document can only be a starting point, since good intuition comes from hard work, not from learning the right metaphor. Anyone who reads and understands all of it will still have an arduous journey ahead—but sometimes a good starting point makes a big difference.
It should be noted that this is not a Haskell tutorial; it is assumed that the reader is already familiar with the basics of Haskell, including the standard Prelude, the type system, data types, and type classes.
The type classes we will be discussing and their interrelationships (source code for this graph can be found here):
∗ Apply can be found in the semigroupoids package, and Comonad in the comonad package.
Solid arrows point from the general to the specific; that is, if there is an arrow from Foo to Bar it means that every Bar is (or should be, or can be made into) a Foo.
Dotted lines indicate some other sort of relationship.
Monad and ArrowApply are equivalent.
Apply and Comonad are greyed out since they are not actually (yet?) in the standard Haskell libraries ∗.
One more note before we begin. The original spelling of “type class” is with two words, as evidenced by, for example, the Haskell 2010 Language Report, early papers on type classes like Type classes in Haskell and Type classes: exploring the design space, and Hudak et al.’s history of Haskell. However, as often happens with two-word phrases that see a lot of use, it has started to show up as one word (“typeclass”) or, rarely, hyphenated (“type-class”). When wearing my prescriptivist hat, I prefer “type class”, but realize (after changing into my descriptivist hat) that there's probably not much I can do about it.
Instances of List and Maybe illustrates these type classes with simple examples using List and Maybe. We now begin with the simplest type class of all: Functor.
The Functor class (haddock) is the most basic and ubiquitous type class in the Haskell libraries. A simple intuition is that a Functor represents a “container” of some sort, along with the ability to apply a function uniformly to every element in the container. For example, a list is a container of elements, and we can apply a function to every element of a list, using map. As another example, a binary tree is also a container of elements, and it’s not hard to come up with a way to recursively apply a function to every element in a tree.
Another intuition is that a Functor represents some sort of “computational context”. This intuition is generally more useful, but is more difficult to explain, precisely because it is so general. Some examples later should help to clarify the Functor-as-context point of view.
In the end, however, a Functor is simply what it is defined to be; doubtless there are many examples of Functor instances that don’t exactly fit either of the above intuitions. The wise student will focus their attention on definitions and examples, without leaning too heavily on any particular metaphor. Intuition will come, in time, on its own.
Here is the type class declaration for Functor:
(<$) :: a -> f b -> f a
Functor is exported by the Prelude, so no special imports are needed to use it. Note that the (<$) operator is provided for convenience, with a default implementation in terms of fmap; it is included in the class just to give Functor instances the opportunity to provide a more efficient implementation than the default. To understand Functor, then, we really need to understand fmap.
First, the f a and f b in the type signature for fmap tell us that f isn’t a concrete type like Int; it is a sort of type function which takes another type as a parameter. More precisely, the kind of f must be * -> *. For example, Maybe is such a type with kind * -> *: Maybe is not a concrete type by itself (that is, there are no values of type Maybe), but requires another type as a parameter, like Maybe Integer. So it would not make sense to say instance Functor Integer, but it could make sense to say instance Functor Maybe.
Now look at the type of fmap: it takes any function from a to b, and a value of type f a, and outputs a value of type f b. From the container point of view, the intention is that fmap applies a function to each element of a container, without altering the structure of the container. From the context point of view, the intention is that fmap applies a function to a value without altering its context. Let’s look at a few specific examples.
Finally, we can understand (<$): instead of applying a function to the values a container/context, it simply replaces them with a given value. This is the same as applying a constant function, so (<$) can be implemented in terms of fmap.
∗ Recall that [] has two meanings in Haskell: it can either stand for the empty list, or, as here, it can represent the list type constructor (pronounced “list-of”). In other words, the type [a] (list-of-a) can also be written [] a.
∗ You might ask why we need a separate map function. Why not just do away with the current list-only map function, and rename fmap to map instead? Well, that’s a good question. The usual argument is that someone just learning Haskell, when using map incorrectly, would much rather see an error about lists than about Functors.
As noted before, the list constructor [] is a functor ∗; we can use the standard list function map to apply a function to each element of a list ∗. The Maybe type constructor is also a functor, representing a container which might hold a single element. The function fmap g has no effect on Nothing (there are no elements to which g can be applied), and simply applies g to the single element inside a Just. Alternatively, under the context interpretation, the list functor represents a context of nondeterministic choice; that is, a list can be thought of as representing a single value which is nondeterministically chosen from among several possibilities (the elements of the list). Likewise, the Maybe functor represents a context with possible failure. These instances are:
fmap _ [] = []
fmap _ Nothing = Nothing
As an aside, in idiomatic Haskell code you will often see the letter f used to stand for both an arbitrary Functor and an arbitrary function. In this document, f represents only Functors, and g or h always represent functions, but you should be aware of the potential confusion. In practice, what f stands for should always be clear from the context, by noting whether it is part of a type or part of the code.
There are other Functor instances in the standard library as well:
Either e is an instance of Functor; Either e a represents a container which can contain either a value of type a, or a value of type e (often representing some sort of error condition). It is similar to Maybe in that it represents possible failure, but it can carry some extra information about the failure as well.
((,) e) represents a container which holds an “annotation” of type e along with the actual value it holds. It might be clearer to write it as (e,), by analogy with an operator section like (1+), but that syntax is not allowed in types (although it is allowed in expressions with the TupleSections extension enabled). However, you can certainly think of it as (e,).
((->) e) (which can be thought of as (e ->); see above), the type of functions which take a value of type e as a parameter, is a Functor. As a container, (e -> a) represents a (possibly infinite) set of values of a, indexed by values of e. Alternatively, and more usefully, ((->) e) can be thought of as a context in which a value of type e is available to be consulted in a read-only fashion. This is also why ((->) e) is sometimes referred to as the reader monad; more on this later.
IO is a Functor; a value of type IO a represents a computation producing a value of type a which may have I/O effects. If m computes the value x while producing some I/O effects, then fmap g m will compute the value g x while producing the same I/O effects.
Many standard types from the containers library (such as Tree, Map, and Sequence) are instances of Functor. A notable exception is Set, which cannot be made a Functor in Haskell (although it is certainly a mathematical functor) since it requires an Ord constraint on its elements; fmap must be applicable to any types a and b. However, Set (and other similarly restricted data types) can be made an instance of a suitable generalization of Functor, either by making a and b arguments to the Functor type class themselves, or by adding an associated constraint.
Implement Functor instances for Either e and ((->) e).
Implement Functor instances for ((,) e) and for Pair, defined as
data Pair a = Pair a a
Implement a Functor instance for the type ITree, defined as
Give an example of a type of kind * -> * which cannot be made an instance of Functor (without using undefined).
Is this statement true or false?
The composition of two Functors is also a Functor.
As far as the Haskell language itself is concerned, the only requirement to be a Functor is an implementation of fmap with the proper type. Any sensible Functor instance, however, will also satisfy the functor laws, which are part of the definition of a mathematical functor. There are two:
fmap id = id
fmap (g . h) = (fmap g) . (fmap h)
∗ Technically, these laws make f and fmap together an endofunctor on Hask, the category of Haskell types (ignoring ⊥, which is a party pooper). See Wikibook: Category theory.
Together, these laws ensure that fmap g does not change the structure of a container, only the elements. Equivalently, and more simply, they ensure that fmap g changes a value without altering its context ∗.
The first law says that mapping the identity function over every item in a container has no effect. The second says that mapping a composition of two functions over every item in a container is the same as first mapping one function, and then mapping the other.
As an example, the following code is a “valid” instance of Functor (it typechecks), but it violates the functor laws. Do you see why?
Unlike some other type classes we will encounter, a given type has at most one valid instance of Functor. This can be proven via the free theorem for the type of fmap. In fact, GHC can automatically derive Functor instances for many data types.
∗ Actually, if seq/undefined are considered, it is possible to have an implementation which satisfies the first law but not the second. The rest of the comments in this section should be considered in a context where seq and undefined are excluded.
A similar argument also shows that any Functor instance satisfying the first law (fmap id = id) will automatically satisfy the second law as well. Practically, this means that only the first law needs to be checked (usually by a very straightforward induction) to ensure that a Functor instance is valid.∗
Although it is not possible for a Functor instance to satisfy the first Functor law but not the second (excluding undefined), the reverse is possible. Give an example of a (bogus) Functor instance which satisfies the second law but not the first.
Which laws are violated by the evil Functor instance for list shown above: both laws, or the first law alone? Give specific counterexamples.
There are two fundamental ways to think about fmap. The first has already been mentioned: it takes two parameters, a function and a container, and applies the function “inside” the container, producing a new container. Alternately, we can think of fmap as applying a function to a value in a context (without altering the context).
Just like all other Haskell functions of “more than one parameter”, however, fmap is actually curried: it does not really take two parameters, but takes a single parameter and returns a function. For emphasis, we can write fmap’s type with extra parentheses: fmap :: (a -> b) -> (f a -> f b). Written in this form, it is apparent that fmap transforms a “normal” function (g :: a -> b) into one which operates over containers/contexts (fmap g :: f a -> f b). This transformation is often referred to as a lift; fmap “lifts” a function from the “normal world” into the “f world”.
There are a few more Functor-related functions which can be imported from the Data.Functor module.
(<$>) is defined as a synonym for fmap. This enables a nice infix style that mirrors the ($) operator for function application. For example, f $ 3 applies the function f to 3, whereas f <$> [1,2,3] applies f to each member of the list.
($>) :: Functor f => f a -> b -> f b is just flip (<$), and can occasionally be useful. To keep them straight, you can remember that (<$) and ($>) point towards the value that will be kept.
void :: Functor f => f a -> f () is a specialization of (<$), that is, void x = () <$ x. This can be used in cases where a computation computes some value but the value should be ignored.
A good starting point for reading about the category theory behind the concept of a functor is the excellent Haskell wikibook page on category theory.
Applicative
A somewhat newer addition to the pantheon of standard Haskell type classes, applicative functors represent an abstraction lying in between Functor and Monad in expressivity, first described by McBride and Paterson. The title of their classic paper, Applicative Programming with Effects, gives a hint at the intended intuition behind the Applicative type class. It encapsulates certain sorts of “effectful” computations in a functionally pure way, and encourages an “applicative” programming style. Exactly what these things mean will be seen later.
Recall that Functor allows us to lift a “normal” function to a function on computational contexts. But fmap doesn’t allow us to apply a function which is itself in a context to a value in a context. Applicative gives us just such a tool, (<*>) (variously pronounced as "apply", "app", or "splat"). It also provides a method, pure, for embedding values in a default, “effect free” context. Here is the type class declaration for Applicative, as defined in Control.Applicative:
pure :: a -> f a
Note that every Applicative must also be a Functor. In fact, as we will see, fmap can be implemented using the Applicative methods, so every Applicative is a functor whether we like it or not; the Functor constraint forces us to be honest.
(*>) and (<*) are provided for convenience, in case a particular instance of Applicative can provide more efficient implementations, but they are provided with default implementations. For more on these operators, see the section on Utility functions below.
∗ Recall that ($) is just function application: f $ x = f x.
As always, it’s crucial to understand the type signatures. First, consider (<*>): the best way of thinking about it comes from noting that the type of (<*>) is similar to the type of ($) ∗, but with everything enclosed in an f. In other words, (<*>) is just function application within a computational context. The type of (<*>) is also very similar to the type of fmap; the only difference is that the first parameter is f (a -> b), a function in a context, instead of a “normal” function (a -> b).
pure takes a value of any type a, and returns a context/container of type f a. The intention is that pure creates some sort of “default” container or “effect free” context. In fact, the behavior of pure is quite constrained by the laws it should satisfy in conjunction with (<*>). Usually, for a given implementation of (<*>) there is only one possible implementation of pure.
(Note that previous versions of the Typeclassopedia explained pure in terms of a type class Pointed, which can still be found in the pointed package. However, the current consensus is that Pointed is not very useful after all. For a more detailed explanation, see Why not Pointed?)
∗ See haddock for Applicative and Applicative programming with effects
Traditionally, there are four laws that Applicative instances should satisfy ∗. In some sense, they are all concerned with making sure that pure deserves its name:
The identity law:
pure id <*> v = v
Homomorphism:
pure f <*> pure x = pure (f x)
Intuitively, applying a non-effectful function to a non-effectful argument in an effectful context is the same as just applying the function to the argument and then injecting the result into the context with pure.
Interchange:
u <*> pure y = pure ($ y) <*> u
Intuitively, this says that when evaluating the application of an effectful function to a pure argument, the order in which we evaluate the function and its argument doesn't matter.
u <*> (v <*> w) = pure (.) <*> u <*> v <*> w
This one is the trickiest law to gain intuition for. In some sense it is expressing a sort of associativity property of (<*>). The reader may wish to simply convince themselves that this law is type-correct.
Considered as left-to-right rewrite rules, the homomorphism, interchange, and composition laws actually constitute an algorithm for transforming any expression using pure and (<*>) into a canonical form with only a single use of pure at the very beginning and only left-nested occurrences of (<*>). Composition allows reassociating (<*>); interchange allows moving occurrences of pure leftwards; and homomorphism allows collapsing multiple adjacent occurrences of pure into one.
There is also a law specifying how Applicative should relate to Functor:
fmap g x = pure g <*> x
It says that mapping a pure function g over a context x is the same as first injecting g into a context with pure, and then applying it to x with (<*>). In other words, we can decompose fmap into two more atomic operations: injection into a context, and application within a context. Since (<$>) is a synonym for fmap, the above law can also be expressed as:
g <$> x = pure g <*> x.
(Tricky) One might imagine a variant of the interchange law that says something about applying a pure function to an effectful argument. Using the above laws, prove that
pure f <*> x = pure (flip ($)) <*> x <*> pure f
Most of the standard types which are instances of Functor are also instances of Applicative.
Maybe can easily be made an instance of Applicative; writing such an instance is left as an exercise for the reader.
The list type constructor [] can actually be made an instance of Applicative in two ways; essentially, it comes down to whether we want to think of lists as ordered collections of elements, or as contexts representing multiple results of a nondeterministic computation (see Wadler’s How to replace failure by a list of successes).
Let’s first consider the collection point of view. Since there can only be one instance of a given type class for any particular type, one or both of the list instances of Applicative need to be defined for a newtype wrapper; as it happens, the nondeterministic computation instance is the default, and the collection instance is defined in terms of a newtype called ZipList. This instance is:
newtype ZipList a = ZipList { getZipList :: [a] }
pure = undefined -- exercise
To apply a list of functions to a list of inputs with (<*>), we just match up the functions and inputs elementwise, and produce a list of the resulting outputs. In other words, we “zip” the lists together with function application, ($); hence the name ZipList.
The other Applicative instance for lists, based on the nondeterministic computation point of view, is:
Instead of applying functions to inputs pairwise, we apply each function to all the inputs in turn, and collect all the results in a list.
Now we can write nondeterministic computations in a natural style. To add the numbers 3 and 4 deterministically, we can of course write (+) 3 4. But suppose instead of 3 we have a nondeterministic computation that might result in 2, 3, or 4; then we can write
pure (+) <*> [2,3,4] <*> pure 4
or, more idiomatically,
(+) <$> [2,3,4] <*> pure 4.
There are several other Applicative instances as well:
IO is an instance of Applicative, and behaves exactly as you would think: to execute m1 <*> m2, first m1 is executed, resulting in a function f, then m2 is executed, resulting in a value x, and finally the value f x is returned as the result of executing m1 <*> m2.
((,) a) is an Applicative, as long as a is an instance of Monoid (section Monoid). The a values are accumulated in parallel with the computation.
The Applicative module defines the Const type constructor; a value of type Const a b simply contains an a. This is an instance of Applicative for any Monoid a; this instance becomes especially useful in conjunction with things like Foldable (section Foldable).
The WrappedMonad and WrappedArrow newtypes make any instances of Monad (section Monad) or Arrow (section Arrow) respectively into instances of Applicative; as we will see when we study those type classes, both are strictly more expressive than Applicative, in the sense that the Applicative methods can be implemented in terms of their methods.
Implement an instance of Applicative for Maybe.
Determine the correct definition of pure for the ZipList instance of Applicative—there is only one implementation that satisfies the law relating pure and (<*>).
McBride and Paterson’s paper introduces the notation to denote function application in a computational context. If each has type for some applicative functor , and has type , then the entire expression has type . You can think of this as applying a function to multiple “effectful” arguments. In this sense, the double bracket notation is a generalization of fmap, which allows us to apply a function to a single argument in a context.
Why do we need Applicative to implement this generalization of fmap? Suppose we use fmap to apply g to the first parameter x1. Then we get something of type f (t2 -> ... t), but now we are stuck: we can’t apply this function-in-a-context to the next argument with fmap. However, this is precisely what (<*>) allows us to do.
This suggests the proper translation of the idealized notation into Haskell, namely
g <$> x1 <*> x2 <*> ... <*> xn,
recalling that Control.Applicative defines (<$>) as convenient infix shorthand for fmap. This is what is meant by an “applicative style”—effectful computations can still be described in terms of function application; the only difference is that we have to use the special operator (<*>) for application instead of simple juxtaposition.
Note that pure allows embedding “non-effectful” arguments in the middle of an idiomatic application, like
which has type f d, given
g :: a -> b -> c -> d
The double brackets are commonly known as “idiom brackets”, because they allow writing “idiomatic” function application, that is, function application that looks normal but has some special, non-standard meaning (determined by the particular instance of Applicative being used). Idiom brackets are not supported by GHC, but they are supported by the Strathclyde Haskell Enhancement, a preprocessor which (among many other things) translates idiom brackets into standard uses of (<$>) and (<*>). This can result in much more readable code when making heavy use of Applicative.
In addition, as of GHC 8, the ApplicativeDo extension enables g <$> x1 <*> x2 <*> ... <*> xn to be written in a different style:
Control.Applicative provides several utility functions that work generically with any Applicative instance.
liftA :: Applicative f => (a -> b) -> f a -> f b. This should be familiar; of course, it is the same as fmap (and hence also the same as (<$>)), but with a more restrictive type. This probably exists to provide a parallel to liftA2 and liftA3, but there is no reason you should ever need to use it.
liftA2 :: Applicative f => (a -> b -> c) -> f a -> f b -> f c lifts a 2-argument function to operate in the context of some Applicative. When liftA2 is fully applied, as in liftA2 f arg1 arg2,it is typically better style to instead use f <$> arg1 <*> arg2. However, liftA2 can be useful in situations where it is partially applied. For example, one could define a Num instance for Maybe Integer by defining (+) = liftA2 (+) and so on.
There is a liftA3 but no liftAn for larger n.
(*>) :: Applicative f => f a -> f b -> f b sequences the effects of two Applicative computations, but discards the result of the first. For example, if m1, m2 :: Maybe Int, then m1 *> m2 is Nothing whenever either m1 or m2 is Nothing; but if not, it will have the same value as m2.
Likewise, (<*) :: Applicative f => f a -> f b -> f a sequences the effects of two computations, but keeps only the result of the first, discarding the result of the second. Just as with (<$) and ($>), to keep (<*) and (*>) straight, remember that they point towards the values that will be kept.
(<**>) :: Applicative f => f a -> f (a -> b) -> f b is similar to (<*>), but where the first computation produces value(s) which are provided as input to the function(s) produced by the second computation. Note this is not the same as flip (<*>), because the effects are performed in the opposite order. This is possible to observe with any Applicative instance with non-commutative effects, such as the instance for lists: (<**>) [1,2] [(+5),(*10)] produces a different result than (flip (<*>)) on the same arguments.
when :: Applicative f => Bool -> f () -> f () conditionally executes a computation, evaluating to its second argument if the test is True, and to pure () if the test is False.
unless :: Applicative f => Bool -> f () -> f () is like when, but with the test negated.
The guard function is for use with instances of Alternative (an extension of Applicative to incorporate the ideas of failure and choice), which is discussed in the section on Alternative and friends.
Implement a function
sequenceAL :: Applicative f => [f a] -> f [a]
. There is a generalized version of this, sequenceA, which works for any Traversable (see the later section on Traversable), but implementing this version specialized to lists is a good exercise.
Alternative formulation
An alternative, equivalent formulation of Applicative is given by
∗ In category-theory speak, we say f is a lax monoidal functor because there aren't necessarily functions in the other direction, like f (a, b) -> (f a, f b). Intuitively, this states that a monoidal functor∗ is one which has some sort of "default shape" and which supports some sort of "combining" operation. pure and (<*>) are equivalent in power to unit and (**) (see the Exercises below). More technically, the idea is that f preserves the "monoidal structure" given by the pairing constructor (,) and unit type (). This can be seen even more clearly if we rewrite the types of unit and (**) as
Furthermore, to deserve the name "monoidal" (see the section on Monoids), instances of Monoidal ought to satisfy the following laws, which seem much more straightforward than the traditional Applicative laws:
∗ In this and the following laws, ≅ refers to isomorphism rather than equality. In particular we consider (x,()) ≅ x ≅ ((),x) and ((x,y),z) ≅ (x,(y,z)).
Left identity∗:
unit ** v ≅ v
Right identity:
u ** unit ≅ u
Associativity:
u ** (v ** w) ≅ (u ** v) ** w
These turn out to be equivalent to the usual Applicative laws. In a category theory setting, one would also require a naturality law:
∗ Here g *** h = \(x,y) -> (g x, h y). See Arrows.
Naturality:
fmap (g *** h) (u ** v) = fmap g u ** fmap h v
Much of this section was taken from a blog post by Edward Z. Yang; see his actual post for a bit more information.
Implement pure and (<*>) in terms of unit and (**), and vice versa.
Are there any Applicative instances for which there are also functions f () -> () and f (a,b) -> (f a, f b), satisfying some "reasonable" laws?
(Tricky) Prove that given your implementations from the first exercise, the usual Applicative laws and the Monoidal laws stated above are equivalent.
McBride and Paterson’s original paper is a treasure-trove of information and examples, as well as some perspectives on the connection between Applicative and category theory. Beginners will find it difficult to make it through the entire paper, but it is extremely well-motivated—even beginners will be able to glean something from reading as far as they are able.
∗ Introduced by an earlier paper that was since superseded by Push-pull functional reactive programming.
Conal Elliott has been one of the biggest proponents of Applicative. For example, the Pan library for functional images and the reactive library for functional reactive programming (FRP) ∗ make key use of it; his blog also contains many examples of Applicative in action. Building on the work of McBride and Paterson, Elliott also built the TypeCompose library, which embodies the observation (among others) that Applicative types are closed under composition; therefore, Applicative instances can often be automatically derived for complex types built out of simpler ones.
Although the Parsec parsing library (paper) was originally designed for use as a monad, in its most common use cases an Applicative instance can be used to great effect; Bryan O’Sullivan’s blog post is a good starting point. If the extra power provided by Monad isn’t needed, it’s usually a good idea to use Applicative instead.
A couple other nice examples of Applicative in action include the ConfigFile and HSQL libraries and the formlets library.
Gershom Bazerman's post contains many insights into applicatives.
The ApplicativeDo extension is described in this wiki page, and in more detail in this Haskell Symposium paper.
Monad
It’s a safe bet that if you’re reading this, you’ve heard of monads—although it’s quite possible you’ve never heard of Applicative before, or Arrow, or even Monoid. Why are monads such a big deal in Haskell? There are several reasons.
Haskell does, in fact, single out monads for special attention by making them the framework in which to construct I/O operations.
Haskell also singles out monads for special attention by providing a special syntactic sugar for monadic expressions: the do-notation. (As of GHC 8, do-notation can be used with Applicative as well, but the notation is still fundamentally related to monads.)
Monad has been around longer than other abstract models of computation such as Applicative or Arrow.
The more monad tutorials there are, the harder people think monads must be, and the more new monad tutorials are written by people who think they finally “get” monads (the monad tutorial fallacy).
I will let you judge for yourself whether these are good reasons.
In the end, despite all the hoopla, Monad is just another type class. Let’s take a look at its definition.
As of GHC 7.10, Monad is defined as:
(>>=) :: m a -> (a -> m b) -> m b
(>>) :: m a -> m b -> m b
m >> n = m >>= \_ -> n
fail :: String -> m a
(Prior to GHC 7.10, Applicative was not a superclass of Monad, for historical reasons.)
The Monad type class is exported by the Prelude, along with a few standard instances. However, many utility functions are found in Control.Monad.
Let’s examine the methods in the Monad class one by one. The type of return should look familiar; it’s the same as pure. Indeed, return is pure, but with an unfortunate name. (Unfortunate, since someone coming from an imperative programming background might think that return is like the C or Java keyword of the same name, when in fact the similarities are minimal.) For historical reasons, we still have both names, but they should always denote the same value (although this cannot be enforced). Likewise, (>>) should be the same as (*>) from Applicative. It is possible that return and (>>) may eventually be removed from the Monad class: see the Monad of No Return proposal.
We can see that (>>) is a specialized version of (>>=), with a default implementation given. It is only included in the type class declaration so that specific instances of Monad can override the default implementation of (>>) with a more efficient one, if desired. Also, note that although _ >> n = n would be a type-correct implementation of (>>), it would not correspond to the intended semantics: the intention is that m >> n ignores the result of m, but not its effects.
The fail function is an awful hack that has no place in the Monad class; more on this later.
The only really interesting thing to look at—and what makes Monad strictly more powerful than Applicative—is (>>=), which is often called bind.
We could spend a while talking about the intuition behind (>>=)—and we will. But first, let’s look at some examples.
Even if you don’t understand the intuition behind the Monad class, you can still create instances of it by just seeing where the types lead you. You may be surprised to find that this actually gets you a long way towards understanding the intuition; at the very least, it will give you some concrete examples to play with as you read more about the Monad class in general. The first few examples are from the standard Prelude; the remaining examples are from the transformers package.
The simplest possible instance of Monad is Identity, which is described in Dan Piponi’s highly recommended blog post on The Trivial Monad. Despite being “trivial”, it is a great introduction to the Monad type class, and contains some good exercises to get your brain working.
The next simplest instance of Monad is Maybe. We already know how to write return/pure for Maybe. So how do we write (>>=)? Well, let’s think about its type. Specializing for Maybe, we have
If the first argument to (>>=) is Just x, then we have something of type a (namely, x), to which we can apply the second argument—resulting in a Maybe b, which is exactly what we wanted. What if the first argument to (>>=) is Nothing? In that case, we don’t have anything to which we can apply the a -> Maybe b function, so there’s only one thing we can do: yield Nothing. This instance is:
Nothing >>= _ = Nothing
We can already get a bit of intuition as to what is going on here: if we build up a computation by chaining together a bunch of functions with (>>=), as soon as any one of them fails, the entire computation will fail (because Nothing >>= f is Nothing, no matter what f is). The entire computation succeeds only if all the constituent functions individually succeed. So the Maybe monad models computations which may fail.
The Monad instance for the list constructor [] is similar to its Applicative instance; see the exercise below.
Of course, the IO constructor is famously a Monad, but its implementation is somewhat magical, and may in fact differ from compiler to compiler. It is worth emphasizing that the IO monad is the only monad which is magical. It allows us to build up, in an entirely pure way, values representing possibly effectful computations. The special value main, of type IO (), is taken by the runtime and actually executed, producing actual effects. Every other monad is functionally pure, and requires no special compiler support. We often speak of monadic values as “effectful computations”, but this is because some monads allow us to write code as if it has side effects, when in fact the monad is hiding the plumbing which allows these apparent side effects to be implemented in a functionally pure way.
As mentioned earlier, ((->) e) is known as the reader monad, since it describes computations in which a value of type e is available as a read-only environment. The Control.Monad.Reader module provides the Reader e a type, which is just a convenient newtype wrapper around (e -> a), along with an appropriate Monad instance and some Reader-specific utility functions such as ask (retrieve the environment), asks (retrieve a function of the environment), and local (run a subcomputation under a different environment).
The Control.Monad.Writer module provides the Writer monad, which allows information to be collected as a computation progresses. Writer w a is isomorphic to (a,w), where the output value a is carried along with an annotation or “log” of type w, which must be an instance of Monoid (see section Monoid); the special function tell performs logging.
The Control.Monad.State module provides the State s a type, a newtype wrapper around s -> (a,s). Something of type State s a represents a stateful computation which produces an a but can access and modify the state of type s along the way. The module also provides State-specific utility functions such as get (read the current state), gets (read a function of the current state), put (overwrite the state), and modify (apply a function to the state).
The Control.Monad.Cont module provides the Cont monad, which represents computations in continuation-passing style. It can be used to suspend and resume computations, and to implement non-local transfers of control, co-routines, other complex control structures—all in a functionally pure way. Cont has been called the “mother of all monads” because of its universal properties.
Implement a Monad instance for the list constructor, []. Follow the types!
Implement a Monad instance for ((->) e).
Implement Functor and Monad instances for Free f, defined as
You may assume that f has a Functor instance. This is known as the free monad built from the functor f.
Let’s look more closely at the type of (>>=). The basic intuition is that it combines two computations into one larger computation. The first argument, m a, is the first computation. However, it would be boring if the second argument were just an m b; then there would be no way for the computations to interact with one another (actually, this is exactly the situation with Applicative). So, the second argument to (>>=) has type a -> m b: a function of this type, given a result of the first computation, can produce a second computation to be run. In other words, x >>= k is a computation which runs x, and then uses the result(s) of x to decide what computation to run second, using the output of the second computation as the result of the entire computation.
∗ Actually, because Haskell allows general recursion, one can recursively construct infinite grammars, and hence Applicative (together with Alternative) is enough to parse any context-sensitive language with a finite alphabet. See Parsing context-sensitive languages with Applicative. Intuitively, it is this ability to use the output from previous computations to decide what computations to run next that makes Monad more powerful than Applicative. The structure of an Applicative computation is fixed, whereas the structure of a Monad computation can change based on intermediate results. This also means that parsers built using an Applicative interface can only parse context-free languages; in order to parse context-sensitive languages a Monad interface is needed.∗
To see the increased power of Monad from a different point of view, let’s see what happens if we try to implement (>>=) in terms of fmap, pure, and (<*>). We are given a value x of type m a, and a function k of type a -> m b, so the only thing we can do is apply k to x. We can’t apply it directly, of course; we have to use fmap to lift it over the m. But what is the type of fmap k? Well, it’s m a -> m (m b). So after we apply it to x, we are left with something of type m (m b)—but now we are stuck; what we really want is an m b, but there’s no way to get there from here. We can add m’s using pure, but we have no way to collapse multiple m’s into one.
∗ You might hear some people claim that the definition in terms of return, fmap, and join is the “math definition” and the definition in terms of return and (>>=) is something specific to Haskell. In fact, both definitions were known in the mathematics community long before Haskell picked up monads.
This ability to collapse multiple m’s is exactly the ability provided by the function join :: m (m a) -> m a, and it should come as no surprise that an alternative definition of Monad can be given in terms of join:
class Applicative m => Monad'' m where
join :: m (m a) -> m a
In fact, the canonical definition of monads in category theory is in terms of return, fmap, and join (often called , , and in the mathematical literature). Haskell uses an alternative formulation with (>>=) instead of join since it is more convenient to use ∗. However, sometimes it can be easier to think about Monad instances in terms of join, since it is a more “atomic” operation. (For example, join for the list monad is just concat.)
Implement (>>=) in terms of fmap (or liftM) and join.
Now implement join and fmap (liftM) in terms of (>>=) and return.
The Control.Monad module provides a large number of convenient utility functions, all of which can be implemented in terms of the basic Monad operations (return and (>>=) in particular). We have already seen one of them, namely, join. We also mention some other noteworthy ones here; implementing these utility functions oneself is a good exercise. For a more detailed guide to these functions, with commentary and example code, see Henk-Jan van Tuyl’s tour.
liftM :: Monad m => (a -> b) -> m a -> m b. This should be familiar; of course, it is just fmap. The fact that we have both fmap and liftM is a consequence of the fact that the Monad type class did not require a Functor instance until recently, even though mathematically speaking, every monad is a functor. If you are using GHC 7.10 or newer, you should avoid using liftM and just use fmap instead.
ap :: Monad m => m (a -> b) -> m a -> m b should also be familiar: it is equivalent to (<*>), justifying the claim that the Monad interface is strictly more powerful than Applicative. We can make any Monad into an instance of Applicative by setting pure = return and (<*>) = ap.
sequence :: Monad m => [m a] -> m [a] takes a list of computations and combines them into one computation which collects a list of their results. It is again something of a historical accident that sequence has a Monad constraint, since it can actually be implemented only in terms of Applicative (see the exercise at the end of the Utility Functions section for Applicative). Note that the actual type of sequence is more general, and works over any Traversable rather than just lists; see the section on Traversable.
replicateM :: Monad m => Int -> m a -> m [a] is simply a combination of replicate and sequence.
mapM :: Monad m => (a -> m b) -> [a] -> m [b] maps its first argument over the second, and sequences the results. The forM function is just mapM with its arguments reversed; it is called forM since it models generalized for loops: the list [a] provides the loop indices, and the function a -> m b specifies the “body” of the loop for each index. Again, these functions actually work over any Traversable, not just lists, and they can also be defined in terms of Applicative, not Monad: the analogue of mapM for Applicative is called traverse.
(=<<) :: Monad m => (a -> m b) -> m a -> m b is just (>>=) with its arguments reversed; sometimes this direction is more convenient since it corresponds more closely to function application.
(>=>) :: Monad m => (a -> m b) -> (b -> m c) -> a -> m c is sort of like function composition, but with an extra m on the result type of each function, and the arguments swapped. We’ll have more to say about this operation later. There is also a flipped variant, (<=<).
Many of these functions also have “underscored” variants, such as sequence_ and mapM_; these variants throw away the results of the computations passed to them as arguments, using them only for their side effects.
Other monadic functions which are occasionally useful include filterM, zipWithM, foldM, and forever.
There are several laws that instances of Monad should satisfy (see also the Monad laws wiki page). The standard presentation is:
return a >>= k = k a
m >>= return = m
m >>= (\x -> k x >>= h) = (m >>= k) >>= h
The first and second laws express the fact that return behaves nicely: if we inject a value a into a monadic context with return, and then bind to k, it is the same as just applying k to a in the first place; if we bind a computation m to return, nothing changes. The third law essentially says that (>>=) is associative, sort of.
∗ I like to pronounce this operator “fish”.
However, the presentation of the above laws, especially the third, is marred by the asymmetry of (>>=). It’s hard to look at the laws and see what they’re really saying. I prefer a much more elegant version of the laws, which is formulated in terms of (>=>) ∗. Recall that (>=>) “composes” two functions of type a -> m b and b -> m c. You can think of something of type a -> m b (roughly) as a function from a to b which may also have some sort of effect in the context corresponding to m. (>=>) lets us compose these “effectful functions”, and we would like to know what properties (>=>) has. The monad laws reformulated in terms of (>=>) are:
return >=> g = g
g >=> return = g
(g >=> h) >=> k = g >=> (h >=> k)
∗ As fans of category theory will note, these laws say precisely that functions of type a -> m b are the arrows of a category with (>=>) as composition! Indeed, this is known as the Kleisli category of the monad m. It will come up again when we discuss Arrows.
Ah, much better! The laws simply state that return is the identity of (>=>), and that (>=>) is associative ∗.
There is also a formulation of the monad laws in terms of fmap, return, and join; for a discussion of this formulation, see the Haskell wikibook page on category theory.
Given the definition g >=> h = \x -> g x >>= h, prove the equivalence of the above laws and the usual monad laws.
do notation
Haskell’s special do notation supports an “imperative style” of programming by providing syntactic sugar for chains of monadic expressions. The genesis of the notation lies in realizing that something like a >>= \x -> b >> c >>= \y -> d can be more readably written by putting successive computations on separate lines:
a >>= \x ->
c >>= \y ->
This emphasizes that the overall computation consists of four computations a, b, c, and d, and that x is bound to the result of a, and y is bound to the result of c (b, c, and d are allowed to refer to x, and d is allowed to refer to y as well). From here it is not hard to imagine a nicer notation:
; b
; d
(The curly braces and semicolons may optionally be omitted; the Haskell parser uses layout to determine where they should be inserted.) This discussion should make clear that do notation is just syntactic sugar. In fact, do blocks are recursively translated into monad operations (almost) like this:
do e → e
do { e; stmts } → e >> do { stmts }
do { v <- e; stmts } → e >>= \v -> do { stmts }
do { let decls; stmts} → let decls in do { stmts }
This is not quite the whole story, since v might be a pattern instead of a variable. For example, one can write
do (x:xs) <- foo
bar x
but what happens if foo is an empty list? Well, remember that ugly fail function in the Monad type class declaration? That’s what happens. See section 3.14 of the Haskell Report for the full details. See also the discussion of MonadPlus and MonadZero in the section on other monoidal classes.
A final note on intuition: do notation plays very strongly to the “computational context” point of view rather than the “container” point of view, since the binding notation x <- m is suggestive of “extracting” a single x from m and doing something with it. But m may represent some sort of a container, such as a list or a tree; the meaning of x <- m is entirely dependent on the implementation of (>>=). For example, if m is a list, x <- m actually means that x will take on each value from the list in turn.
Sometimes, the full power of Monad is not needed to desugar do-notation. For example,
would normally be desugared to foo1 >>= \x -> foo2 >>= \y -> foo3 >>= \z -> return (g x y z), but this is equivalent to g <$> foo1 <*> foo2 <*> foo3. With the ApplicativeDo extension enabled (as of GHC 8.0), GHC tries hard to desugar do-blocks using Applicative operations wherever possible. This can sometimes lead to efficiency gains, even for types which also have Monad instances, since in general Applicative computations may be run in parallel, whereas monadic ones may not. For example, consider
foo definitely depends on the Monad instance of M, since the effects generated by the whole computation may depend (via g) on the Int outputs of bar and baz. Nonetheless, with ApplicativeDo enabled, foo can be desugared as
which may allow bar and baz to be computed in parallel, since they at least do not depend on each other.
Philip Wadler was the first to propose using monads to structure functional programs. His paper is still a readable introduction to the subject.
∗ All About Monads, Monads as containers, Understanding monads, The Monadic Way, You Could Have Invented Monads! (And Maybe You Already Have.), there’s a monster in my Haskell!, Understanding Monads. For real., Monads in 15 minutes: Backtracking and Maybe, Monads as computation, Practical Monads
There are, of course, numerous monad tutorials of varying quality ∗.
A few of the best include Cale Gibbard’s Monads as containers and Monads as computation; Jeff Newbern’s All About Monads, a comprehensive guide with lots of examples; and Dan Piponi’s You Could Have Invented Monads!, which features great exercises. If you just want to know how to use IO, you could consult the Introduction to IO. Even this is just a sampling; the monad tutorials timeline is a more complete list. (All these monad tutorials have prompted parodies like think of a monad ... as well as other kinds of backlash like Monads! (and Why Monad Tutorials Are All Awful) or Abstraction, intuition, and the “monad tutorial fallacy”.)
Other good monad references which are not necessarily tutorials include Henk-Jan van Tuyl’s tour of the functions in Control.Monad, Dan Piponi’s field guide, Tim Newsham’s What’s a Monad?, and Chris Smith's excellent article Why Do Monads Matter?. There are also many blog posts which have been written on various aspects of monads; a collection of links can be found under Blog articles/Monads.
For help constructing monads from scratch, and for obtaining a "deep embedding" of monad operations suitable for use in, say, compiling a domain-specific language, see Apfelmus's operational package.
One of the quirks of the Monad class and the Haskell type system is that it is not possible to straightforwardly declare Monad instances for types which require a class constraint on their data, even if they are monads from a mathematical point of view. For example, Data.Set requires an Ord constraint on its data, so it cannot be easily made an instance of Monad. A solution to this problem was first described by Eric Kidd, and later made into a library named rmonad by Ganesh Sittampalam and Peter Gavin.
There are many good reasons for eschewing do notation; some have gone so far as to consider it harmful.
Monads can be generalized in various ways; for an exposition of one possibility, see Robert Atkey’s paper on parameterized monads, or Dan Piponi’s Beyond Monads.
For the categorically inclined, monads can be viewed as monoids (From Monoids to Monads) and also as closure operators (Triples and Closure). Derek Elkins’ article in issue 13 of the Monad.Reader contains an exposition of the category-theoretic underpinnings of some of the standard Monad instances, such as State and Cont. Jonathan Hill and Keith Clarke have an early paper explaining the connection between monads as they arise in category theory and as used in functional programming. There is also a web page by Oleg Kiselyov explaining the history of the IO monad.
Links to many more research papers related to monads can be found under Research papers/Monads and arrows.
MonadFail
Some monads support a notion of failure, without necessarily supporting the notion of recovery suggested by MonadPlus, and possibly including a primitive error reporting mechanism. This notion is expressed by the relatively unprincipled MonadFail. When the MonadFailDesugaring language extension is enabled, the fail method from MonadFail is used for pattern match failure in do bindings rather than the traditional fail method of the Monad class. This language change is being implemented because there are many monads, such as Reader, State, Writer, RWST, and Cont that simply do not support a legitimate fail method.
See the MonadFail proposal for more information.
Monad transformers
One would often like to be able to combine two monads into one: for example, to have stateful, nondeterministic computations (State + []), or computations which may fail and can consult a read-only environment (Maybe + Reader), and so on. Unfortunately, monads do not compose as nicely as applicative functors (yet another reason to use Applicative if you don’t need the full power that Monad provides), but some monads can be combined in certain ways.
Standard monad transformers
The transformers library provides a number of standard monad transformers. Each monad transformer adds a particular capability/feature/effect to any existing monad.
IdentityT is the identity transformer, which maps a monad to (something isomorphic to) itself. This may seem useless at first glance, but it is useful for the same reason that the id function is useful -- it can be passed as an argument to things which are parameterized over an arbitrary monad transformer, when you do not actually want any extra capabilities.
StateT adds a read-write state.
ReaderT adds a read-only environment.
WriterT adds a write-only log.
RWST conveniently combines ReaderT, WriterT, and StateT into one.
MaybeT adds the possibility of failure.
ErrorT adds the possibility of failure with an arbitrary type to represent errors.
ListT adds non-determinism (however, see the discussion of ListT below).
ContT adds continuation handling.
For example, StateT s Maybe is an instance of Monad; computations of type StateT s Maybe a may fail, and have access to a mutable state of type s. Monad transformers can be multiply stacked. One thing to keep in mind while using monad transformers is that the order of composition matters. For example, when a StateT s Maybe a computation fails, the state ceases being updated (indeed, it simply disappears); on the other hand, the state of a MaybeT (State s) a computation may continue to be modified even after the computation has "failed". This may seem backwards, but it is correct. Monad transformers build composite monads “inside out”; MaybeT (State s) a is isomorphic to s -> (Maybe a, s). (Lambdabot has an indispensable @unmtl command which you can use to “unpack” a monad transformer stack in this way.) Intuitively, the monads become "more fundamental" the further inside the stack you get, and the effects of inner monads "have precedence" over the effects of outer ones. Of course, this is just handwaving, and if you are unsure of the proper order for some monads you wish to combine, there is no substitute for using @unmtl or simply trying out the various options.
Definition and laws
All monad transformers should implement the MonadTrans type class, defined in Control.Monad.Trans.Class:
It allows arbitrary computations in the base monad m to be “lifted” into computations in the transformed monad t m. (Note that type application associates to the left, just like function application, so t m a = (t m) a.)
lift must satisfy the laws
lift . return = return
lift (m >>= f) = lift m >>= (lift . f)
which intuitively state that lift transforms m a computations into t m a computations in a "sensible" way, which sends the return and (>>=) of m to the return and (>>=) of t m.
What is the kind of t in the declaration of MonadTrans?
Transformer type classes and "capability" style
∗ The only problem with this scheme is the quadratic number of instances required as the number of standard monad transformers grows—but as the current set of standard monad transformers seems adequate for most common use cases, this may not be that big of a deal.
There are also type classes (provided by the mtl package) for the operations of each transformer. For example, the MonadState type class provides the state-specific methods get and put, allowing you to conveniently use these methods not only with State, but with any monad which is an instance of MonadState—including MaybeT (State s), StateT s (ReaderT r IO), and so on. Similar type classes exist for Reader, Writer, Cont, IO, and others ∗.
These type classes serve two purposes. First, they get rid of (most of) the need for explicitly using lift, giving a type-directed way to automatically determine the right number of calls to lift. Simply writing put will be automatically translated into lift . put, lift . lift . put, or something similar depending on what concrete monad stack you are using.
Now, if somewhere down the line you realize you need to introduce the possibility of failure, you might switch from State Int to MaybeT (State Int). The type of the first version of foo would need to be modified to reflect this change, but the second version of foo can still be used as-is.
However, this sort of "capability-based" style (e.g. specifying that foo works for any monad with the "state capability") quickly runs into problems when you try to naively scale it up: for example, what if you need to maintain two independent states? A framework for solving this and related problems is described by Schrijvers and Olivera (Monads, zippers and views: virtualizing the monad stack, ICFP 2011) and is implemented in the Monatron package.
Composing monads
Since Applicative functors are closed under composition, the problem must lie with join. Indeed, suppose m and n are arbitrary monads; to make a monad out of their composition we would need to be able to implement
but it is not clear how this could be done in general. The join method for m is no help, because the two occurrences of m are not next to each other (and likewise for n).
However, one situation in which it can be done is if n distributes over m, that is, if there is a function
satisfying certain laws. See Jones and Duponcheel (Composing Monads); see also the section on Traversable.
For a much more in-depth discussion and analysis of the failure of monads to be closed under composition, see this question on StackOverflow.
Implement join :: M (N (M (N a))) -> M (N a), given distrib :: N (M a) -> M (N a) and assuming M and N are instances of Monad.
Much of the monad transformer library (originally mtl, now split between mtl and transformers), including the Reader, Writer, State, and other monads, as well as the monad transformer framework itself, was inspired by Mark Jones’ classic paper Functional Programming with Overloading and Higher-Order Polymorphism. It’s still very much worth a read—and highly readable—after almost fifteen years.
See Edward Kmett's mailing list message for a description of the history and relationships among monad transformer packages (mtl, transformers, monads-fd, monads-tf).
There are two excellent references on monad transformers. Martin Grabmüller’s Monad Transformers Step by Step is a thorough description, with running examples, of how to use monad transformers to elegantly build up computations with various effects. Cale Gibbard’s article on how to use monad transformers is more practical, describing how to structure code using monad transformers to make writing it as painless as possible. Another good starting place for learning about monad transformers is a blog post by Dan Piponi.
The ListT transformer from the transformers package comes with the caveat that ListT m is only a monad when m is commutative, that is, when ma >>= \a -> mb >>= \b -> foo is equivalent to mb >>= \b -> ma >>= \a -> foo (i.e. the order of m's effects does not matter). For one explanation why, see Dan Piponi's blog post "Why isn't ListT [] a monad". For more examples, as well as a design for a version of ListT which does not have this problem, see ListT done right.
There is an alternative way to compose monads, using coproducts, as described by Lüth and Ghani. This method is interesting but has not (yet?) seen widespread use. For a more recent alternative, see Kiselyov et al's Extensible Effects: An Alternative to Monad Transformers.
MonadFix
Note: MonadFix is included here for completeness (and because it is interesting) but seems not to be used much. Skipping this section on a first read-through is perfectly OK (and perhaps even recommended).
do rec notation
The MonadFix class describes monads which support the special fixpoint operation mfix :: (a -> m a) -> m a, which allows the output of monadic computations to be defined via (effectful) recursion. This is supported in GHC by a special “recursive do” notation, enabled by the -XRecursiveDo flag. Within a do block, one may have a nested rec block, like so:
; bob
Normally (if we had do in place of rec in the above example), y would be in scope in bar and bob but not in baz, and z would be in scope only in bob. With the rec, however, y and z are both in scope in all three of baz, bar, and bob. A rec block is analogous to a let block such as
because, in Haskell, every variable bound in a let-block is in scope throughout the entire block. (From this point of view, Haskell's normal do blocks are analogous to Scheme's let* construct.)
What could such a feature be used for? One of the motivating examples given in the original paper describing MonadFix (see below) is encoding circuit descriptions. A line in a do-block such as
describes a gate whose input wires are labeled y and z and whose output wire is labeled x. Many (most?) useful circuits, however, involve some sort of feedback loop, making them impossible to write in a normal do-block (since some wire would have to be mentioned as an input before being listed as an output). Using a rec block solves this problem.
Examples and intuition
Of course, not every monad supports such recursive binding. However, as mentioned above, it suffices to have an implementation of mfix :: (a -> m a) -> m a, satisfying a few laws. Let's try implementing mfix for the Maybe monad. That is, we want to implement a function
∗ Actually, fix is implemented slightly differently for efficiency reasons; but the given definition is equivalent and simpler for the present purpose. Let's think for a moment about the implementation ∗ of the non-monadic fix :: (a -> a) -> a:
Inspired by fix, our first attempt at implementing maybeFix might be something like
This has the right type. However, something seems wrong: there is nothing in particular here about Maybe; maybeFix actually has the more general type Monad m => (a -> m a) -> m a. But didn't we just say that not all monads support mfix?
The answer is that although this implementation of maybeFix has the right type, it does not have the intended semantics. If we think about how (>>=) works for the Maybe monad (by pattern-matching on its first argument to see whether it is Nothing or Just) we can see that this definition of maybeFix is completely useless: it will just recurse infinitely, trying to decide whether it is going to return Nothing or Just, without ever even so much as a glance in the direction of f.
The trick is to simply assume that maybeFix will return Just, and get on with life!
This says that the result of maybeFix is ma, and assuming that ma = Just x, it is defined (recursively) to be equal to f x.
Why is this OK? Isn't fromJust almost as bad as unsafePerformIO? Well, usually, yes. This is just about the only situation in which it is justified! The interesting thing to note is that maybeFix will never crash -- although it may, of course, fail to terminate. The only way we could get a crash is if we try to evaluate fromJust ma when we know that ma = Nothing. But how could we know ma = Nothing? Since ma is defined as f (fromJust ma), it must be that this expression has already been evaluated to Nothing -- in which case there is no reason for us to be evaluating fromJust ma in the first place!
To see this from another point of view, we can consider three possibilities. First, if f outputs Nothing without looking at its argument, then maybeFix f clearly returns Nothing. Second, if f always outputs Just x, where x depends on its argument, then the recursion can proceed usefully: fromJust ma will be able to evaluate to x, thus feeding f's output back to it as input. Third, if f tries to use its argument to decide whether to output Just or Nothing, then maybeFix f will not terminate: evaluating f's argument requires evaluating ma to see whether it is Just, which requires evaluating f (fromJust ma), which requires evaluating ma, ... and so on.
There are also instances of MonadFix for lists (which works analogously to the instance for Maybe), for ST, and for IO. The instance for IO is particularly amusing: it creates a new (empty) MVar, immediately reads its contents using unsafeInterleaveIO (which delays the actual reading lazily until the value is needed), uses the contents of the MVar to compute a new value, which it then writes back into the MVar. It almost seems, spookily, that mfix is sending a value back in time to itself through the MVar -- though of course what is really going on is that the reading is delayed just long enough (via unsafeInterleaveIO) to get the process bootstrapped.
Implement a MonadFix instance for [].
mdo syntax
which will be translated into the original example (assuming that, say, bar and bob refer to y. The difference is that mdo will analyze the code in order to find minimal recursive blocks, which will be placed in rec blocks, whereas rec blocks desugar directly into calls to mfix without any further analysis.
For more information (such as the precise desugaring rules for rec blocks), see Levent Erkök and John Launchbury's 2002 Haskell workshop paper, A Recursive do for Haskell, or for full details, Levent Erkök’s thesis, Value Recursion in Monadic Computations. (Note, while reading, that MonadFix used to be called MonadRec.) You can also read the GHC user manual section on recursive do-notation.
Semigroup
A semigroup is a set together with a binary operation which combines elements from . The operator is required to be associative (that is, , for any which are elements of ).
For example, the natural numbers under addition form a semigroup: the sum of any two natural numbers is a natural number, and for any natural numbers , , and . The integers under multiplication also form a semigroup, as do the integers (or rationals, or reals) under or , Boolean values under conjunction and disjunction, lists under concatenation, functions from a set to itself under composition ... Semigroups show up all over the place, once you know to look for them.
As of version 4.9 of the base package (which comes with GHC 8.0), semigroups are defined in the Data.Semigroup module. (If you are working with a previous version of base, or want to write a library that supports previous versions of base, you can use the semigroups package.)
The definition of the Semigroup type class (haddock) is as follows:
go b [] = b
The really important method is (<>), representing the associative binary operation. The other two methods have default implementations in terms of (<>), and are included in the type class in case some instances can give more efficient implementations than the default.
sconcat reduces a nonempty list using (<>). For most instances, this is the same as foldr1 (<>), but it can be constant-time for idempotent semigroups.
stimes n is equivalent to (but sometimes considerably more efficient than) sconcat . replicate n. Its default definition uses multiplication by doubling (also known as exponentiation by squaring). For many semigroups, this is an important optimization; for some, such as lists, it is terrible and must be overridden.
See the haddock documentation for more information on sconcat and stimes.
The only law is that (<>) must be associative:
Monoid
Many semigroups have a special element for which the binary operation is the identity, that is, for every element . Such a semigroup-with-identity-element is called a monoid.
The definition of the Monoid type class (defined in Data.Monoid; haddock) is:
class Monoid a where
mempty :: a
mappend :: a -> a -> a
mconcat :: [a] -> a
mconcat = foldr mappend mempty
The mempty value specifies the identity element of the monoid, and mappend is the binary operation. The default definition for mconcat “reduces” a list of elements by combining them all with mappend, using a right fold. It is only in the Monoid class so that specific instances have the option of providing an alternative, more efficient implementation; usually, you can safely ignore mconcat when creating a Monoid instance, since its default definition will work just fine.
The Monoid methods are rather unfortunately named; they are inspired by the list instance of Monoid, where indeed mempty = [] and mappend = (++), but this is misleading since many monoids have little to do with appending (see these Comments from OCaml Hacker Brian Hurt on the Haskell-cafe mailing list). The situation is made somewhat better by (<>), which is provided as an alias for mappend.
Note that the (<>) alias for mappend conflicts with the Semigroup method of the same name. For this reason, Data.Semigroup re-exports much of Data.Monoid; to use semigroups and monoids together, just import Data.Semigroup, and make sure all your types have both Semigroup and Monoid instances (and that (<>) = mappend).
Of course, every Monoid instance should actually be a monoid in the mathematical sense, which implies these laws:
mempty `mappend` x = x
x `mappend` mempty = x
(x `mappend` y) `mappend` z = x `mappend` (y `mappend` z)
There are quite a few interesting Monoid instances defined in Data.Monoid.
[a] is a Monoid, with mempty = [] and mappend = (++). It is not hard to check that (x ++ y) ++ z = x ++ (y ++ z) for any lists x, y, and z, and that the empty list is the identity: [] ++ x = x ++ [] = x.
As noted previously, we can make a monoid out of any numeric type under either addition or multiplication. However, since we can’t have two instances for the same type, Data.Monoid provides two newtype wrappers, Sum and Product, with appropriate Monoid instances.
> getSum (mconcat . map Sum $ [1..5])
> getProduct (mconcat . map Product $ [1..5])
sum [1..5] and product [1..5]. Nevertheless, these instances are useful in more generalized settings, as we will see in the section on Foldable.
Any and All are newtype wrappers providing Monoid instances for Bool (under disjunction and conjunction, respectively).
There are three instances for Maybe: a basic instance which lifts a Monoid instance for a to an instance for Maybe a, and two newtype wrappers First and Last for which mappend selects the first (respectively last) non-Nothing item.
Endo a is a newtype wrapper for functions a -> a, which form a monoid under composition.
There are several ways to “lift” Monoid instances to instances with additional structure. We have already seen that an instance for a can be lifted to an instance for Maybe a. There are also tuple instances: if a and b are instances of Monoid, then so is (a,b), using the monoid operations for a and b in the obvious pairwise manner. Finally, if a is a Monoid, then so is the function type e -> a for any e; in particular, g `mappend` h is the function which applies both g and h to its argument and then combines the results using the underlying Monoid instance for a. This can be quite useful and elegant (see example).
The type Ordering = LT | EQ | GT is a Monoid, defined in such a way that mconcat (zipWith compare xs ys) computes the lexicographic ordering of xs and ys (if xs and ys have the same length). In particular, mempty = EQ, and mappend evaluates to its leftmost non-EQ argument (or EQ if both arguments are EQ). This can be used together with the function instance of Monoid to do some clever things (example).
There are also Monoid instances for several standard data structures in the containers library (haddock), including Map, Set, and Sequence.
Monoid is also used to enable several other type class instances. As noted previously, we can use Monoid to make ((,) e) an instance of Applicative:
Monoid can be similarly used to make ((,) e) an instance of Monad as well; this is known as the writer monad. As we’ve already seen, Writer and WriterT are a newtype wrapper and transformer for this monad, respectively.
Monoid also plays a key role in the Foldable type class (see section Foldable).
Monoids got a fair bit of attention in 2009, when a blog post by Brian Hurt complained about the fact that the names of many Haskell type classes (Monoid in particular) are taken from abstract mathematics. This resulted in a long Haskell-cafe thread arguing the point and discussing monoids in general.
∗ May its name live forever.
However, this was quickly followed by several blog posts about Monoid ∗. First, Dan Piponi wrote a great introductory post, Haskell Monoids and their Uses. This was quickly followed by Heinrich Apfelmus’ Monoids and Finger Trees, an accessible exposition of Hinze and Paterson’s classic paper on 2-3 finger trees, which makes very clever use of Monoid to implement an elegant and generic data structure. Dan Piponi then wrote two fascinating articles about using Monoids (and finger trees): Fast Incremental Regular Expressions and Beyond Regular Expressions
In a similar vein, David Place’s article on improving Data.Map in order to compute incremental folds (see the Monad Reader issue 11) is also a good example of using Monoid to generalize a data structure.
Some other interesting examples of Monoid use include building elegant list sorting combinators, collecting unstructured information, combining probability distributions, and a brilliant series of posts by Chung-Chieh Shan and Dylan Thurston using Monoids to elegantly solve a difficult combinatorial puzzle (followed by part 2, part 3, part 4).
As unlikely as it sounds, monads can actually be viewed as a sort of monoid, with join playing the role of the binary operation and return the role of the identity; see Dan Piponi’s blog post.
Failure and choice: Alternative, MonadPlus, ArrowPlus
Several classes (Applicative, Monad, Arrow) have "monoidal" subclasses, intended to model computations that support "failure" and "choice" (in some appropriate sense).
The Alternative type class (haddock) is for Applicative functors which also have a monoid structure:
class Applicative f => Alternative f where
The basic intuition is that empty represents some sort of "failure", and (<|>) represents a choice between alternatives. (However, this intuition does not fully capture the nuance possible; see the section on Laws below.) Of course, (<|>) should be associative and empty should be the identity element for it. Instances of Alternative must implement empty and (<|>); some and many have default implementations but are included in the class since specialized implementations may be more efficient than the default.
The default definitions of some and many are essentially given by
(though for some reason, in actual fact they are not defined via mutual recursion). The intuition is that both keep running v, collecting its results into a list, until it fails; some v requires v to succeed at least once, whereas many v does not require it to succeed at all. That is, many represents 0 or more repetitions of v, whereas some represents 1 or more repetitions. Note that some and many do not make sense for all instances of Alternative; they are discussed further below.
Likewise, MonadPlus (haddock) is for Monads with a monoid structure:
class Monad m => MonadPlus m where
mzero :: m a
mplus :: m a -> m a -> m a
Finally, ArrowZero and ArrowPlus (haddock) represent Arrows (see below) with a monoid structure:
Although this document typically discusses laws before presenting example instances, for Alternative and friends it is worth doing things the other way around, because there is some controversy over the laws and it helps to have some concrete examples in mind when discussing them. We mostly focus on Alternative in this section and the next; now that Applicative is a superclass of Monad, there is little reason to use MonadPlus any longer, and ArrowPlus is rather obscure.
Maybe is an instance of Alternative, where empty is Nothing and the choice operator (<|>) results in its first argument when it is Just, and otherwise results in its second argument. Hence folding over a list of Maybe with (<|>) (which can be done with asum from Data.Foldable) results in the first non-Nothing value in the list (or Nothing if there are none).
[] is an instance, with empty given by the empty list, and (<|>) equal to (++). It is worth pointing out that this is identical to the Monoid instance for [a], whereas the Alternative and Monoid instances for Maybe are different: the Monoid instance for Maybe a requires a Monoid instance for a, and monoidally combines the contained values when presented with two Justs.
Let's think about the behavior of some and many for Maybe and []. For Maybe, we have some Nothing = (:) <$> Nothing <*> many Nothing = Nothing <*> many Nothing = Nothing. Hence we also have many Nothing = some Nothing <|> pure [] = Nothing <|> pure [] = pure [] = Just []. Boring. But what about applying some and many to Just? In fact, some (Just a) and many (Just a) are both bottom! The problem is that since Just a is always "successful", the recursion will never terminate. In theory the result "should be" the infinite list [a,a,a,...] but it cannot even start producing any elements of this list, because there is no way for the (<*>) operator to yield any output until it knows that the result of the call to many will be Just.
You can work out the behavior for [] yourself, but it ends up being quite similar: some and many yield boring results when applied to the empty list, and yield bottom when applied to any non-empty list.
In the end, some and many really only make sense when used with some sort of "stateful" Applicative instance, for which an action v, when run multiple times, can succeed some finite number of times and then fail. For example, parsers have this behavior, and indeed, parsers were the original motivating example for the some and many methods; more on this below.
Since GHC 8.0 (that is, base-4.9), there is an instance of Alternative for IO. empty throws an I/O exception, and (<|>) works by first running its left-hand argument; if the left-hand argument throws an I/O exception, (<|>) catches the exception and then calls its second argument. (Note that other types of exceptions are not caught.) There are other, much better ways to handle I/O errors, but this is a quick and dirty way that may work for simple, one-off programs, such as expressions typed at the GHCi prompt. For example, if you want to read the contents of a file but use some default contents in case the file does not exist, you can just write readFile "somefile.txt" <|> return "default file contents".
Concurrently from the async package has an Alternative instance, for which c1 <|> c2 races c1 and c2 in parallel, and returns the result of whichever finishes first. empty corresponds to the action that runs forever without returning a value.
Practically any parser type (e.g. from parsec, megaparsec, trifecta, ...) has an Alternative instance, where empty is an unconditional parse failure, and (<|>) is left-biased choice. That is, p1 <|> p2 first tries parsing with p1, and if p1 fails then it tries p2 instead.
some and many work particularly well with parser types having an Applicative instance: if p is a parser, then some p parses one or more consecutive occurrences of p (i.e. it will parse as many occurrences of p as possible and then stop), and many p parses zero or more occurrences.
Of course, instances of Alternative should satisfy the monoid laws
The documentation for some and many states that they should be the "least solution" (i.e. least in the definedness partial order) to their characterizing, mutually recursive default definitions. However, this is controversial, and probably wasn't really thought out very carefully.
Since Alternative is a subclass of Applicative, a natural question is, "how should empty and (<|>) interact with (<*>) and pure?"
Almost everyone agrees on the left zero law (though see the discussion of the right zero law below):
Right Zero:
Another obvious law would be
f <*> empty = empty
This law is satisfied by most instances; however, it is not satisfied by IO. Once the effects in f have been executed, there is no way to roll them back if we later encounter an exception. Now consider the Backwards applicative transformer from the transformers package. If f is Applicative, then so is Backwards f; it works the same way but performs the actions of the arguments to (<*>) in the reverse order. There is also an instance Alternative f => Alternative (Backwards f). If some f (such as IO) satisfies left zero but not right zero, then Backwards f satisfies right zero but not left zero! So even the left zero law is suspect. The point is that given the existence of Backwards we cannot privilege one direction or the other.
Left Distribution:
(a <|> b) <*> c = (a <*> c) <|> (b <*> c)
This distributivity law is satisfied by [] and Maybe, as you may verify. However, it is not satisfied by IO or most parsers. The reason is that a and b can have effects which influence execution of c, and the left-hand side may end up failing where the right-hand side succeeds.
For example, consider IO, and suppose that a always executes successfully, but c throws an I/O exception after a has run. Concretely, say, a might ensure that a certain file does not exist (deleting it if it does exist or doing nothing if it does not), and then c tries to read that file. In that case (a <|> b) <*> c will first delete the file, ignoring b since a is successful, and then throw an exception when c tries to read the file. On the other hand, b might ensure that the same file in question does exist. In that case (a <*> c) <|> (b <*> c) would succeed: after (a <*> c) throws an exception, it would be caught by (<|>), and then (b <*> c) would be tried.
This law does not hold for parsers for a similar reason: (a <|> b) <*> c has to "commit" to parsing with a or b before running c, whereas (a <*> c) <|> (b <*> c) allows backtracking if a <*> c fails. In the particular case that a succeeds but c fails after a but not after b, these may give different results. For example, suppose a and c both expect to see two asterisks, but b expects to see only one. If there are only three asterisks in the input, b <*> c will be successful whereas a <*> c will not.
Right Distribution:
a <*> (b <|> c) = (a <*> b) <|> (a <*> c)
This law is not satisfied by very many instances, but it's still worth discussing. In particular the law is still satisfied by Maybe. However, it is not satisfied by, for example, lists. The problem is that the results come out in a different order. For example, suppose a = [(+1), (*10)], b = [2], and c = [3]. Then the left-hand side yields [3,4,20,30], whereas the right-hand side is [3,20,4,30].
IO does not satisfy it either, since, for example, a may succeed only the second time it is executed. Parsers, on the other hand, may or may not satisfy this law, depending on how they handle backtracking. Parsers for which (<|>) by itself does full backtracking will satisfy the law; but for many parser combinator libraries this is not the case, for efficiency reasons. For example, parsec fails this law: if a succeeds while consuming some input, and afterwards b fails without consuming any input, then the left-hand side may succeed while the right-hand side fails: after (a <*> b) fails, the right-hand side tries to re-run a without backtracking over the input the original a consumed.
Left Catch:
(pure a) <|> x = pure a
Intuitively, this law states that pure should always represent a "successful" computation. It is satisfied by Maybe, IO, and parsers. However, it is not satisfied by lists, since lists collect all possible results: it corresponds to [a] ++ x == [a] which is obviously false.
This, then, is the situation: we have a lot of instances of Alternative (and MonadPlus), with each instance satisfying some subset of these laws. Moreover, it's not always the same subset, so there is no obvious "default" set of laws to choose. For now at least, we just have to live with the situation. When using a particular instance of Alternative or MonadPlus, it's worth thinking carefully about which laws it satisfies.
There are a few Alternative-specific utility functions worth mentioning:
guard :: Alternative f => Bool -> f ()
checks the given condition, and evaluates to pure () if the condition holds, and empty if not. This can be used to create a conditional failure point in the middle of a computation, where the computation only proceeds if a certain condition holds.
optional :: Alternative f => f a -> f (Maybe a)
reifies potential failure into the Maybe type: that is, optional x is a computation which always succeeds, returning Nothing if x fails and Just a if x successfully results in a. It is useful, for example, in the context of parsers, where it corresponds to a production which can occur zero or one times.
There used to be a type class called MonadZero containing only mzero, representing monads with failure. The do-notation requires some notion of failure to deal with failing pattern matches. Unfortunately, MonadZero was scrapped in favor of adding the fail method to the Monad class. If we are lucky, someday MonadZero will be restored, and fail will be banished to the bit bucket where it belongs (see MonadPlus reform proposal). The idea is that any do-block which uses pattern matching (and hence may fail) would require a MonadZero constraint; otherwise, only a Monad constraint would be required.
A great introduction to the MonadPlus type class, with interesting examples of its use, is Doug Auclair’s MonadPlus: What a Super Monad! in the Monad.Reader issue 11.
Another interesting use of MonadPlus can be found in Christiansen et al, All Sorts of Permutations, from ICFP 2016.
The logict package defines a type with prominent Alternative and MonadPlus instances that can be used to efficiently enumerate possibilities subject to constraints, i.e. logic programming; it's like the list monad on steroids.
The Foldable class, defined in the Data.Foldable module (haddock), abstracts over containers which can be “folded” into a summary value. This allows such folding operations to be written in a container-agnostic way.
The definition of the Foldable type class is:
class Foldable t where
fold :: Monoid m => t m -> m
foldr :: (a -> b -> b) -> b -> t a -> b
foldr' :: (a -> b -> b) -> b -> t a -> b
foldl :: (b -> a -> b) -> b -> t a -> b
foldl' :: (b -> a -> b) -> b -> t a -> b
foldr1 :: (a -> a -> a) -> t a -> a
foldl1 :: (a -> a -> a) -> t a -> a
toList :: t a -> [a]
null :: t a -> Bool
length :: t a -> Int
elem :: Eq a => a -> t a -> Bool
sum :: Num a => t a -> a
This may look complicated, but in fact, to make a Foldable instance you only need to implement one method: your choice of foldMap or foldr. All the other methods have default implementations in terms of these, and are included in the class in case more efficient implementations can be provided.
Instances and examples
The type of foldMap should make it clear what it is supposed to do: given a way to convert the data in a container into a Monoid (a function a -> m) and a container of a’s (t a), foldMap provides a way to iterate over the entire contents of the container, converting all the a’s to m’s and combining all the m’s with mappend. The following code shows two examples: a simple implementation of foldMap for lists, and a binary tree example provided by the Foldable documentation.
data Tree a = Empty | Leaf a | Node (Tree a) a (Tree a)
foldMap f Empty = mempty
foldMap f (Leaf x) = f x
The Foldable module also provides instances for Maybe and Array; additionally, many of the data structures found in the standard containers library (for example, Map, Set, Tree, and Sequence) provide their own Foldable instances.
Implement fold in terms of foldMap.
What would you need in order to implement foldMap in terms of fold?
Implement foldMap in terms of foldr.
Implement foldr in terms of foldMap (hint: use the Endo monoid).
What is the type of foldMap . foldMap? Or foldMap . foldMap . foldMap, etc.? What do they do?
Derived folds
Given an instance of Foldable, we can write generic, container-agnostic functions such as:
-- Compute the size of any container.
containerSize :: Foldable f => f a -> Int
containerSize = getSum . foldMap (const (Sum 1))
-- Compute a list of elements of a container satisfying a predicate.
filterF :: Foldable f => (a -> Bool) -> f a -> [a]
filterF p = foldMap (\a -> if p a then [a] else [])
-- Get a list of all the Strings in a container which include the
-- letter a.
aStrings :: Foldable f => f String -> [String]
aStrings = filterF (elem 'a')
The Foldable module also provides a large number of predefined folds. These used to be generalized versions of Prelude functions of the same name that only worked on lists; but as of GHC 7.10, the generalized versions themselves are now exported from the Prelude: for example, concat, concatMap, and, or, any, all, sum, product, maximum(By), minimum(By), elem, notElem, and find. For example, before GHC 7.10, length used to have type length :: [a] -> Int; now it has type Foldable t => t a -> Int (and is in fact the same as the containerSize function shown above).
The important function toList is also provided, which turns any Foldable structure into a list of its elements in left-right order; it works by folding with the list monoid.
There are also generic functions that work with Applicative or Monad instances to generate some sort of computation from each element in a container, and then perform all the side effects from those computations, discarding the results: traverse_, sequenceA_, and others. The results must be discarded because the Foldable class is too weak to specify what to do with them: we cannot, in general, make an arbitrary Applicative or Monad instance into a Monoid, but we can make m () into a Monoid for any such m. If we do have an Applicative or Monad with a monoid structure—that is, an Alternative or a MonadPlus—then we can use the asum or msum functions, which can combine the results as well. Consult the Foldable documentation for more details on any of these functions.
Note that the Foldable operations always forget the structure of the container being folded. If we start with a container of type t a for some Foldable t, then t will never appear in the output type of any operations defined in the Foldable module. Many times this is exactly what we want, but sometimes we would like to be able to generically traverse a container while preserving its structure—and this is exactly what the Traversable class provides, which will be discussed in the next section.
Implement toList :: Foldable f => f a -> [a] in terms of either foldr or foldMap.
Show how one could implement the generic version of foldr in terms of toList, assuming we had only the list-specific foldr :: (a -> b -> b) -> b -> [a] -> b.
Pick some of the following functions to implement: concat, concatMap, and, or, any, all, sum, product, maximum(By), minimum(By), elem, notElem, and find. Figure out how they generalize to Foldable and come up with elegant implementations using fold or foldMap along with appropriate Monoid instances.
asum :: (Alternative f, Foldable t) => t (f a) -> f a takes a container full of computations and combines them using (<|>).
sequenceA_ :: (Applicative f, Foldable t) => t (f a) -> f () takes a container full of computations and runs them in sequence, discarding the results (that is, they are used only for their effects). Since the results are discarded, the container only needs to be Foldable. (Compare with sequenceA :: (Applicative f, Traversable t) => t (f a) -> f (t a), which requires a stronger Traversable constraint in order to be able to reconstruct a container of results having the same shape as the original container.)
traverse_ :: (Applicative f, Foldable t) => (a -> f b) -> t a -> f () applies the given function to each element in a foldable container and sequences the effects (but discards the results).
for_ is the same as traverse_ but with its arguments flipped. This is the moral equivalent of a "foreach" loop in an imperative language.
For historical reasons, there are also variants of all the above with overly-restrictive Monad(-like) constraints: msum is the same as asum specialized to MonadPlus, and sequence_, mapM_, and forM_ respectively are Monad specializations of sequenceA_, traverse_, and for_.
Implement traverse_ in terms of sequenceA_ and vice versa. One of these will need an extra constraint. What is it?
Foldable actually isn't
The generic term "fold" is often used to refer to the more technical concept of catamorphism. Intuitively, given a way to summarize "one level of structure" (where recursive subterms have already been replaced with their summaries), a catamorphism can summarize an entire recursive structure. It is important to realize that Foldable does not correspond to catamorphisms, but to something weaker. In particular, Foldable allows observing only the left-right traversal order of elements within a structure, not the actual structure itself. Put another way, every use of Foldable can be expressed in terms of toList. For example, fold itself is equivalent to mconcat . toList.
This is sufficient for many tasks, but not all. For example, consider trying to compute the depth of a Tree: try as we might, there is no way to implement it using Foldable. However, it can be implemented as a catamorphism.
The Foldable class had its genesis in McBride and Paterson’s paper introducing Applicative, although it has been fleshed out quite a bit from the form in the paper.
An interesting use of Foldable (as well as Traversable) can be found in Janis Voigtländer’s paper Bidirectionalization for free!.
For more on the relationship between fold, foldMap, and foldr, see foldr is made of monoids.
There was quite a bit of controversy in the Haskell community about a proposal to integrate Foldable (and Traversable) more tightly into the Prelude, known as the FTP. Some of the controversy centered around Foldable instances such as the one for ((,) a), which, together with generalized types for functions such as length :: Foldable t => t a -> Int, allow one to derive seemingly nonsensical results such as length (2,3) = 1. Here is a humorous talk poking fun at the situation.
Traversable
The Traversable type class, defined in the Data.Traversable module (haddock), is:
class (Functor t, Foldable t) => Traversable t where
traverse :: Applicative f => (a -> f b) -> t a -> f (t b)
mapM :: Monad m => (a -> m b) -> t a -> m (t b)
sequence :: Monad m => t (m a) -> m (t a)
As you can see, every Traversable is also a Foldable Functor. To make a Traversable instance, it suffices to implement either traverse or sequenceA; the other methods all have default implementations in terms of these. Note that mapM and sequence only exist for historical reasons; especially now that Applicative is a superclass of Monad, they are nothing more than copies of traverse and sequenceA, respectively, but with more restrictive types.
The key method of the Traversable class is traverse, which has the following type:
This leads us to view Traversable as a generalization of Functor. traverse is an "effectful fmap": it allows us to map over a structure of type t a, applying a function to every element of type a in order to produce a new structure of type t b; but along the way the function may have some effects (captured by the applicative functor f).
Alternatively, we may consider the sequenceA function. Consider its type:
This answers the fundamental question: when can we commute two functors? For example, can we turn a tree of lists into a list of trees?
The ability to compose two monads depends crucially on this ability to commute functors. Intuitively, if we want to build a composed monad M a = m (n a) out of monads m and n, then to be able to implement join :: M (M a) -> M a, that is, join :: m (n (m (n a))) -> m (n a), we have to be able to commute the n past the m to get m (m (n (n a))), and then we can use the joins for m and n to produce something of type m (n a). See Mark Jones’ paper for more details.
It turns out that given a Functor constraint on the type t, traverse and sequenceA are equivalent in power: either can be implemented in terms of the other.
There are at least two natural ways to turn a tree of lists into a list of trees. What are they, and why?
Give a natural way to turn a list of trees into a tree of lists.
What is the type of traverse . traverse? What does it do?
Implement traverse in terms of sequenceA, and vice versa.
What’s an example of a Traversable instance? The following code shows an example instance for the same Tree type used as an example in the previous Foldable section. It is instructive to compare this instance with a Functor instance for Tree, which is also shown.
traverse g Empty = pure Empty
traverse g (Leaf x) = Leaf <$> g x
traverse g (Node l x r) = Node <$> traverse g l
<*> g x
<*> traverse g r
fmap g Empty = Empty
fmap g (Leaf x) = Leaf $ g x
fmap g (Node l x r) = Node (fmap g l)
(g x)
(fmap g r)
It should be clear that the Traversable and Functor instances for Tree are structurally identical; the only difference is that the Functor instance involves normal function application, whereas the applications in the Traversable instance take place within an Applicative context, using (<$>) and (<*>). This same pattern will hold for any type.
Any Traversable functor is also Foldable, and a Functor. We can see this not only from the class declaration, but by the fact that we can implement the methods of both classes given only the Traversable methods.
The standard libraries provide a number of Traversable instances, including instances for [], ZipList, Maybe, ((,) e), Sum, Product, Either e, Map, Tree, and Sequence. Notably, Set is not Traversable, although it is Foldable.
Implement fmap and foldMap using only the Traversable methods. (Note that the Traversable module provides these implementations as fmapDefault and foldMapDefault.)
Implement Traversable instances for [], Maybe, ((,) e), and Either e.
Explain why Set is Foldable but not Traversable.
Show that Traversable functors compose: that is, implement an instance for Traversable (Compose f g) given Traversable instances for f and g.
Any instance of Traversable must satisfy the following two laws, where Identity is the identity functor (as defined in the Data.Functor.Identity module from the transformers package), and Compose wraps the composition of two functors (as defined in Data.Functor.Compose):
traverse Identity = Identity
traverse (Compose . fmap g . f) = Compose . fmap (traverse g) . traverse f
Additionally, suppose eta is an "Applicative morphism", that is,
and eta preserves the Applicative operations: eta (pure x) = pure x and eta (x <*> y) = eta x <*> eta y. Then, by parametricity, any instance of Traversable satisfying the above two laws will also satisfy eta . traverse f = traverse (eta . f).
The Traversable class also had its genesis in McBride and Paterson’s Applicative paper, and is described in more detail in Gibbons and Oliveira, The Essence of the Iterator Pattern, which also contains a wealth of references to related work.
Traversable forms a core component of Edward Kmett's lens library. Watching Edward's talk on the subject is a highly recommended way to gain better insight into Traversable, Foldable, Applicative, and many other things besides.
For references on the Traversable laws, see Russell O'Connor's mailing list post (and subsequent thread), and this paper by Jaskelioff and Rypacek for a more in-depth discussion. Daniel Mlot also has this very nice blog post explaining how Traversable arises by considering a variant on the usual Kleisli category of a monad, which also sheds light on where the Traversable laws come from.
This blog post by Will Fancher shows how to use Traversable along with a clever choice of Applicative to efficiently sort any Traversable container.
Bifunctor
Recall that a Functor is a type of kind * -> * where one can "map" a function over the type parameter. (Either e) is a Functor (with fmap :: (a -> b) -> Either e a -> Either e b), as is ((,) e). But there is something oddly asymmetric about these two examples: in principle, there is no reason we can't map over the e instead of the a, for example, like so: lmap :: (e -> e') -> Either e a -> Either e' a. This observation leads directly to the definition of Bifunctor, a class for types of kind * -> * -> * where one can functorially map over both type parameters.
Here is the type class declaration for Bifunctor, defined in Data.Bifunctor (since base-4.8, which came with GHC 7.10):
bimap :: (a -> b) -> (c -> d) -> p a c -> p b d
first :: (a -> b) -> p a c -> p b c
We can infer from the fact that p is applied to two type arguments that its kind must be * -> * -> *. The most fundamental method of the Bifunctor class is bimap, which allows mapping over both type arguments at once. For example,
first and second are also provided for mapping over only one type argument at a time. One is required to define either bimap, or both first and second, since default definitions are provided for each in terms of the others, namely:
first f = bimap f id
The laws for Bifunctor are entirely analogous to the laws for Functor. First, mapping with the identity function should have no effect:
first id = id
second id = id
Second, mapping with a composition should be the same as a composition of maps:
first (f . g) = first f . first g
These composition laws actually come "for free" (that is, by parametricity) once the identity laws are satisfied. One can also check that the default implementations of first and second will satisfy the requisite laws if and only if bimap does, and vice versa.
There is one additional law that relates bimap, first, and second, namely,
However, this law will hold automatically if one defines only bimap, or only first and second, using the default implementation for the others. So you only need to worry about this law if for some reason (e.g. efficiency) you define all three of the methods by hand.
One might wonder about the symmetric law bimap f g = second g . first f; it turns out that once bimap f g = first f . second g is satisfied, the symmetric version also follows from parametricity.
In summary, there are many laws that can be stated, but most of them follow automatically from default definitions or from parametricity. For example, if you define only bimap, then the only law you actually need to check is bimap id id = id; all the other laws come for free. Likewise, if you define only first and second, you only need to check that first id = id and second id = id.
(,) and Either are instances in the evident way.
Some larger tuple constructors are also instances; for example, the instance for (,,) maps over the last two components, leaving the first alone. Why anyone would ever want to use this is unclear.
A value of type Const a b (to be discussed more in a later section) consists simply of a value of type a; bimap f g maps f over the a and ignores g.
Category is a relatively recent addition to the Haskell standard libraries. It generalizes the notion of function composition to general “morphisms”.
∗ GHC 7.6.1 changed its rules regarding types and type variables. Now, any operator at the type level is treated as a type constructor rather than a type variable; prior to GHC 7.6.1 it was possible to use (~>) instead of `arr`. For more information, see the discussion on the GHC-users mailing list. For a new approach to nice arrow notation that works with GHC 7.6.1, see this message and also this message from Edward Kmett, though for simplicity I haven't adopted it here. The definition of the Category type class (from Control.Category; haddock) is shown below. For ease of reading, note that I have used an infix type variable `arr`, in parallel with the infix function type constructor (->). ∗ This syntax is not part of Haskell 2010. The second definition shown is the one used in the standard libraries. For the remainder of this document, I will use the infix type constructor `arr` for Category as well as Arrow.
id :: a `arr` a
class Category cat where
id :: cat a a
(.) :: cat b c -> cat a b -> cat a c
Note that an instance of Category should be a type which takes two type arguments, that is, something of kind * -> * -> *. It is instructive to imagine the type variable cat replaced by the function constructor (->): indeed, in this case we recover precisely the familiar identity function id and function composition operator (.) defined in the standard Prelude.
Of course, the Category module provides exactly such an instance of Category for (->). But it also provides one other instance, shown below, which should be familiar from the previous discussion of the Monad laws. Kleisli m a b, as defined in the Control.Arrow module, is just a newtype wrapper around a -> m b.
newtype Kleisli m a b = Kleisli { runKleisli :: a -> m b }
The only laws that Category instances should satisfy are that id should be the identity of (.), and (.) should be associative. This is kind of like being a monoid, except that, unlike with monoids, not any two values can be composed with (.)---their types have to match up.
Finally, the Category module exports two additional operators: (<<<), which is just a synonym for (.), and (>>>), which is (.) with its arguments reversed. (In previous versions of the libraries, these operators were defined as part of the Arrow class.)
The name Category is a bit misleading, since the Category class cannot represent arbitrary categories, but only categories whose objects are objects of Hask, the category of Haskell types. For a more general treatment of categories within Haskell, see the category-extras package. For more about category theory in general, see the excellent Haskell wikibook page, Steve Awodey’s new book, Benjamin Pierce’s Basic category theory for computer scientists, or Barr and Wells category theory lecture notes. Benjamin Russell’s blog post is another good source of motivation and category theory links. You certainly don’t need to know any category theory to be a successful and productive Haskell programmer, but it does lend itself to much deeper appreciation of Haskell’s underlying theory.
The Arrow class represents another abstraction of computation, in a similar vein to Monad and Applicative. However, unlike Monad and Applicative, whose types only reflect their output, the type of an Arrow computation reflects both its input and output. Arrows generalize functions: if arr is an instance of Arrow, a value of type b `arr` c can be thought of as a computation which takes values of type b as input, and produces values of type c as output. In the (->) instance of Arrow this is just a pure function; in general, however, an arrow may represent some sort of “effectful” computation.
The definition of the Arrow type class, from Control.Arrow (haddock), is:
∗ In versions of the base package prior to version 4, there is no Category class, and the Arrow class includes the arrow composition operator (>>>). It also includes pure as a synonym for arr, but this was removed since it conflicts with the pure from Applicative.
The first thing to note is the Category class constraint, which means that we get identity arrows and arrow composition for free: given two arrows g :: b `arr` c and h :: c `arr` d, we can form their composition g >>> h :: b `arr` d ∗.
As should be a familiar pattern by now, the only methods which must be defined when writing a new instance of Arrow are arr and first; the other methods have default definitions in terms of these, but are included in the Arrow class so that they can be overridden with more efficient implementations if desired.
Note that first and second conflict with methods of the same name from Data.Bifunctor. If you want to use both for some reason, you will need to import one or both qualified. It used to be common to import Control.Arrow just to get the (->) instance for use in editing pairs using first or second; now it is recommended to import Data.Bifunctor for this purpose instead. (Notice that for the (->) instance of Arrow and the (,) instance of Bifunctor, first and second specialize to the same type.)
Let’s look at each of the arrow methods in turn. Ross Paterson’s web page on arrows has nice diagrams which can help build intuition.
The arr function takes any function b -> c and turns it into a generalized arrow b `arr` c. The arr method justifies the claim that arrows generalize functions, since it says that we can treat any function as an arrow. It is intended that the arrow arr g is “pure” in the sense that it only computes g and has no “effects” (whatever that might mean for any particular arrow type).
The first method turns any arrow from b to c into an arrow from (b,d) to (c,d). The idea is that first g uses g to process the first element of a tuple, and lets the second element pass through unchanged. For the function instance of Arrow, of course, first g (x,y) = (g x, y).
The second function is similar to first, but with the elements of the tuples swapped. Indeed, it can be defined in terms of first using an auxiliary function swap, defined by swap (x,y) = (y,x).
The (***) operator is “parallel composition” of arrows: it takes two arrows and makes them into one arrow on tuples, which has the behavior of the first arrow on the first element of a tuple, and the behavior of the second arrow on the second element. The mnemonic is that g *** h is the product (hence *) of g and h. For the function instance of Arrow, we define (g *** h) (x,y) = (g x, h y). The default implementation of (***) is in terms of first, second, and sequential arrow composition (>>>). The reader may also wish to think about how to implement first and second in terms of (***).
The (&&&) operator is “fanout composition” of arrows: it takes two arrows g and h and makes them into a new arrow g &&& h which supplies its input as the input to both g and h, returning their results as a tuple. The mnemonic is that g &&& h performs both g and h (hence &) on its input. For functions, we define (g &&& h) x = (g x, h x).
The Arrow library itself only provides two Arrow instances, both of which we have already seen: (->), the normal function constructor, and Kleisli m, which makes functions of type a -> m b into Arrows for any Monad m. These instances are:
∗ See John Hughes: Generalising monads to arrows; Sam Lindley, Philip Wadler, Jeremy Yallop: The arrow calculus; Ross Paterson: Programming with Arrows.
There are quite a few laws that instances of Arrow should satisfy ∗:
arr id = id
arr (h . g) = arr g >>> arr h
first (arr g) = arr (g *** id)
first (g >>> h) = first g >>> first h
first g >>> arr (id *** h) = arr (id *** h) >>> first g
first g >>> arr fst = arr fst >>> g
first (first g) >>> arr assoc = arr assoc >>> first g
assoc ((x,y),z) = (x,(y,z))
Note that this version of the laws is slightly different than the laws given in the first two above references, since several of the laws have now been subsumed by the Category laws (in particular, the requirements that id is the identity arrow and that (>>>) is associative). The laws shown here follow those in Paterson’s Programming with Arrows, which uses the Category class.
∗ Unless category-theory-induced insomnolence is your cup of tea.
The reader is advised not to lose too much sleep over the Arrow laws ∗, since it is not essential to understand them in order to program with arrows. There are also laws that ArrowChoice, ArrowApply, and ArrowLoop instances should satisfy; the interested reader should consult Paterson: Programming with Arrows.
ArrowChoice
Computations built using the Arrow class, like those built using the Applicative class, are rather inflexible: the structure of the computation is fixed at the outset, and there is no ability to choose between alternate execution paths based on intermediate results. The ArrowChoice class provides exactly such an ability:
left :: (b `arr` c) -> (Either b d `arr` Either c d)
A comparison of ArrowChoice to Arrow will reveal a striking parallel between left, right, (+++), (|||) and first, second, (***), (&&&), respectively. Indeed, they are dual: first, second, (***), and (&&&) all operate on product types (tuples), and left, right, (+++), and (|||) are the corresponding operations on sum types. In general, these operations create arrows whose inputs are tagged with Left or Right, and can choose how to act based on these tags.
If g is an arrow from b to c, then left g is an arrow from Either b d to Either c d. On inputs tagged with Left, the left g arrow has the behavior of g; on inputs tagged with Right, it behaves as the identity.
The right function, of course, is the mirror image of left. The arrow right g has the behavior of g on inputs tagged with Right.
The (+++) operator performs “multiplexing”: g +++ h behaves as g on inputs tagged with Left, and as h on inputs tagged with Right. The tags are preserved. The (+++) operator is the sum (hence +) of two arrows, just as (***) is the product.
The (|||) operator is “merge” or “fanin”: the arrow g ||| h behaves as g on inputs tagged with Left, and h on inputs tagged with Right, but the tags are discarded (hence, g and h must have the same output type). The mnemonic is that g ||| h performs either g or h on its input.
The ArrowChoice class allows computations to choose among a finite number of execution paths, based on intermediate results. The possible execution paths must be known in advance, and explicitly assembled with (+++) or (|||). However, sometimes more flexibility is needed: we would like to be able to compute an arrow from intermediate results, and use this computed arrow to continue the computation. This is the power given to us by ArrowApply.
ArrowApply
The ArrowApply type class is:
If we have computed an arrow as the output of some previous computation, then app allows us to apply that arrow to an input, producing its output as the output of app. As an exercise, the reader may wish to use app to implement an alternative “curried” version, app2 :: b `arr` ((b `arr` c) `arr` c).
This notion of being able to compute a new computation may sound familiar: this is exactly what the monadic bind operator (>>=) does. It should not particularly come as a surprise that ArrowApply and Monad are exactly equivalent in expressive power. In particular, Kleisli m can be made an instance of ArrowApply, and any instance of ArrowApply can be made a Monad (via the newtype wrapper ArrowMonad). As an exercise, the reader may wish to try implementing these instances:
app = -- exercise
newtype ArrowApply a => ArrowMonad a b = ArrowMonad (a () b)
return = -- exercise
(ArrowMonad a) >>= k = -- exercise
ArrowLoop
The ArrowLoop type class is:
class Arrow a => ArrowLoop a where
loop :: a (b, d) (c, d) -> a b c
trace :: ((b,d) -> (c,d)) -> b -> c
trace f b = let (c,d) = f (b,d) in c
It describes arrows that can use recursion to compute results, and is used to desugar the rec construct in arrow notation (described below).
Taken by itself, the type of the loop method does not seem to tell us much. Its intention, however, is a generalization of the trace function which is also shown. The d component of the first arrow’s output is fed back in as its own input. In other words, the arrow loop g is obtained by recursively “fixing” the second component of the input to g.
It can be a bit difficult to grok what the trace function is doing. How can d appear on the left and right sides of the let? Well, this is Haskell’s laziness at work. There is not space here for a full explanation; the interested reader is encouraged to study the standard fix function, and to read Paterson’s arrow tutorial.
Arrow notation
Programming directly with the arrow combinators can be painful, especially when writing complex computations which need to retain simultaneous reference to a number of intermediate results. With nothing but the arrow combinators, such intermediate results must be kept in nested tuples, and it is up to the programmer to remember which intermediate results are in which components, and to swap, reassociate, and generally mangle tuples as necessary. This problem is solved by the special arrow notation supported by GHC, similar to do notation for monads, that allows names to be assigned to intermediate results while building up arrow computations. An example arrow implemented using arrow notation, taken from Paterson, is:
rec output <- idA -< if reset then 0 else next
next <- delay 0 -< output + 1
idA -< output
This arrow is intended to represent a recursively defined counter circuit with a reset line.
There is not space here for a full explanation of arrow notation; the interested reader should consult Paterson’s paper introducing the notation, or his later tutorial which presents a simplified version.
An excellent starting place for the student of arrows is the arrows web page, which contains an introduction and many references. Some key papers on arrows include Hughes’ original paper introducing arrows, Generalising monads to arrows, and Paterson’s paper on arrow notation.
Both Hughes and Paterson later wrote accessible tutorials intended for a broader audience: Paterson: Programming with Arrows and Hughes: Programming with Arrows.
Although Hughes’ goal in defining the Arrow class was to generalize Monads, and it has been said that Arrow lies “between Applicative and Monad” in power, they are not directly comparable. The precise relationship remained in some confusion until analyzed by Lindley, Wadler, and Yallop, who also invented a new calculus of arrows, based on the lambda calculus, which considerably simplifies the presentation of the arrow laws (see The arrow calculus). There is also a precise technical sense in which Arrow can be seen as the intersection of Applicative and Category.
Some examples of Arrows include Yampa, the Haskell XML Toolkit, and the functional GUI library Grapefruit.
Some extensions to arrows have been explored; for example, the BiArrows of Alimarine et al. ("There and Back Again: Arrows for Invertible Programming"), for two-way instead of one-way computation.
The Haskell wiki has links to many additional research papers relating to Arrows.
Comonad
The final type class we will examine is Comonad. The Comonad class is the categorical dual of Monad; that is, Comonad is like Monad but with all the function arrows flipped. It is not actually in the standard Haskell libraries, but it has seen some interesting uses recently, so we include it here for completeness.
The Comonad type class, defined in the Control.Comonad module of the comonad library, is:
As you can see, extract is the dual of return, duplicate is the dual of join, and extend is the dual of (=<<). The definition of Comonad is a bit redundant, giving the programmer the choice on whether extend or duplicate are implemented; the other operation then has a default implementation.
A prototypical example of a Comonad instance is:
-- 'extend' computes a new Stream from an old, where the element
-- at position n is computed as a function of everything from
-- position n onwards in the old Stream
extend g s@(Cons x xs) = Cons (g s) (extend g xs)
Dan Piponi explains in a blog post what cellular automata have to do with comonads. In another blog post, Conal Elliott has examined a comonadic formulation of functional reactive programming. Sterling Clover’s blog post Comonads in everyday life explains the relationship between comonads and zippers, and how comonads can be used to design a menu system for a web site.
Comonadic Notions of Computation
The dual of substitution is redecoration (Also available as ps.gz.)
Recursive coalgebras from comonads
Recursion schemes from comonads
The Essence of Dataflow Programming.
Gabriel Gonzalez's Comonads are objects points out similarities between comonads and object-oriented programming.
The comonad-transformers package contains comonad transformers.
A special thanks to all of those who taught me about standard Haskell type classes and helped me develop good intuition for them, particularly Jules Bean (quicksilver), Derek Elkins (ddarius), Conal Elliott (conal), Cale Gibbard (Cale), David House, Dan Piponi (sigfpe), and Kevin Reid (kpreid).
I also thank the many people who provided a mountain of helpful feedback and suggestions on a first draft of the Typeclassopedia: David Amos, Kevin Ballard, Reid Barton, Doug Beardsley, Joachim Breitner, Andrew Cave, David Christiansen, Gregory Collins, Mark Jason Dominus, Conal Elliott, Yitz Gale, George Giorgidze, Steven Grady, Travis Hartwell, Steve Hicks, Philip Hölzenspies, Edward Kmett, Eric Kow, Serge Le Huitouze, Felipe Lessa, Stefan Ljungstrand, Eric Macaulay, Rob MacAulay, Simon Meier, Eric Mertens, Tim Newsham, Russell O’Connor, Conrad Parker, Walt Rorie-Baety, Colin Ross, Tom Schrijvers, Aditya Siram, C. Smith, Martijn van Steenbergen, Joe Thornber, Jared Updike, Rob Vollmert, Andrew Wagner, Louis Wasserman, and Ashley Yakeley, as well as a few only known to me by their IRC nicks: b_jonas, maltem, tehgeekmeister, and ziman. I have undoubtedly omitted a few inadvertently, which in no way diminishes my gratitude.
Finally, I would like to thank Wouter Swierstra for his fantastic work editing the Monad.Reader, and my wife Joyia for her patience during the process of writing the Typeclassopedia.
Brent Yorgey (blog, homepage) is (as of November 2011) a fourth-year Ph.D. student in the programming languages group at the University of Pennsylvania. He enjoys teaching, creating EDSLs, playing Bach fugues, musing upon category theory, and cooking tasty lambda-treats for the denizens of #haskell.
The Typeclassopedia was written by Brent Yorgey and initially published in March 2009. Painstakingly converted to wiki syntax by User:Geheimdienst in November 2011, after asking Brent’s permission.
%s/\\section{\([^}]*\)}/=\1=/gc
%s/\\subsection{\([^}]*\)}/==\1==/gc
%s/^ *\\item /\r* /gc
%s/---/—/gc
%s/\$\([^$]*\)\$/<math>\1\\ <\/math>/gc Appending “\ ” forces images to be rendered. Otherwise, Mediawiki would go back and forth between one font for short <math> tags, and another more TeX-like font for longer tags (containing more than a few characters)""
%s/|\([^|]*\)|/<code>\1<\/code>/gc
%s/\\dots/.../gc
%s/^\\label{.*$//gc
%s/\\emph{\([^}]*\)}/''\1''/gc
%s/\\term{\([^}]*\)}/''\1''/gc
The biggest issue was taking the academic-paper-style citations and turning them into hyperlinks with an appropriate title and an appropriate target. In most cases there was an obvious thing to do (e.g. online PDFs of the cited papers or CiteSeer entries). Sometimes, however, it’s less clear and you might want to check the original Typeclassopedia PDF with the original bibliography file.
I then went for the next best solution, which seemed to be extracting all instances of “\cite{something}” from the source and in that order pulling the referenced entries from the .bib file. This way you can go through the source file and sorted-references file in parallel, copying over what you need, without searching back and forth in the .bib file. I used:
egrep -o "\cite\{[^\}]*\}" ~/typeclassopedia.lhs | cut -c 6- | tr "," "\n" | tr -d "}" > /tmp/citations
for i in $(cat /tmp/citations); do grep -A99 "$i" ~/typeclassopedia.bib|egrep -B99 '^\}$' -m1 ; done > ~/typeclasso-refs-sorted
Retrieved from "https://wiki.haskell.org/index.php?title=Typeclassopedia&oldid=63003"
Applicative Functor
Standard classes
Standard libraries
Standard packages
Standard types
|
cc/2020-05/en_middle_0102.json.gz/line2123
|
__label__cc
| 0.533922
| 0.466078
|
Issue146
Differences between revisions 9 and 10
Editor: 117
Editor: liraz-siri
Comment: bug stats, release changes, translation stats, usn
## Bug stats only take a second to do.
## Data can be found at: http://launchpad.net/distros/ubuntu/+bugs
## See last week's UWN to calculate change over last week.
## NOTE: To be done ONLY on the release date of the UWN (or latter if late).
* Open (#) +/- # over last week
* Critical (#) +/- # over last week
* Unconfirmed (#) +/- # over last week
* Unassigned (#) +/- # over last week
* All bugs ever reported (#) +/- # over last week * Open (57357) -221 over last week
* Critical (19) +1 over last week
* Unconfirmed (26734) +191 over last week
* Unassigned (49494) -135 over last week
* All bugs ever reported (288007) +1406 over last week
## Translation stats only take a second to do.
## Data can be found at: https://translations.launchpad.net/ubuntu/jaunty (or current release)
## List the top 5 untranslated languages.
1. Language (#) +/- # over last week
5. Language (#) +/- # over last week * Spanish (13590) -436 over last week
* French (42699) -125 over last week
* Brazilian Portuguese (53405) -58 over last week
* Swedish (54417) +/-0 over last week
* English (United Kingdom) (59006) +/-0 over last week
# NEEDS UPDATING.
#=== 5-a-day bug stats ===
#==== Top 5 contributors for the past 7 days ====
# * person (#)
#==== Top 5 teams for the past 7 days ====
# * team (#)
#5-A-Day stats provided by Daniel Holbach. See http://daniel.holba.ch/5-a-day-stats/
## http://www.ubuntu.com/usn
## List all security advisories since last UWN.
## Format: * USN-###-#: <package name> vulnerability - http://www.ubuntu.com/usn/usn-###-#
## Ex: * USN-389-1: GnuPG vulnerability - [WWW] http://www.ubuntu.com/usn/usn-389-1 * USN-784-1: Image``Magick vulnerability - http://www.ubuntu.com/usn/USN-784-1
* USN-785-1: ipsec-tools vulnerabilities - http://www.ubuntu.com/usn/USN-785-1
* USN-775-2: Quagga regression - http://www.ubuntu.com/usn/USN-775-2
* USN-786-1: apr-util vulnerabilities - http://www.ubuntu.com/usn/USN-786-1
* USN-787-1: Apache vulnerabilities - http://www.ubuntu.com/usn/USN-787-1
* USN-779-1: Firefox and Xulrunner vulnerabilities - http://www.ubuntu.com/usn/USN-779-1
## https://lists.ubuntu.com/archives/edgy-changes
## List all uploads since last UWN.
## Format: * <packagename> - <link to mailing list message>
## Ex: * postgresql-8.1_8.1.11-0ubuntu0.6.10.1 - https://lists.ubuntu.com/archives/edgy-changes/2008-January/008478.html * langpack-locales 2.3.18.21 - https://lists.ubuntu.com/archives/dapper-changes/2009-June/012781.html
## https://lists.ubuntu.com/archives/hardy-changes/
## Ex: * tzdata 2007h-0ubuntu0.8.04 - https://lists.ubuntu.com/archives/hardy-changes/2008-May/009951.html * vzctl 3.0.22-5ubuntu1.1 - https://lists.ubuntu.com/archives/hardy-changes/2009-June/012243.html
* partman-basicfilesystems 56ubuntu5 - https://lists.ubuntu.com/archives/hardy-changes/2009-June/012244.html
* tzdata 2009i-0ubuntu0.8.04 - https://lists.ubuntu.com/archives/hardy-changes/2009-June/012245.html
## https://lists.ubuntu.com/archives/intrepid-changes/
## Format: * <packagename> - <link to mailing list message> * tzdata 2009i-0ubuntu0.8.10 - https://lists.ubuntu.com/archives/intrepid-changes/2009-June/009745.html
## https://lists.ubuntu.com/archives/jaunty-changes/
## Format: * <packagename> - <link to mailing list message> * tzdata 2009i-0ubuntu0.9.04 - https://lists.ubuntu.com/archives/jaunty-changes/2009-June/009828.html
* hal 0.5.12~rc1+git20090403-0ubuntu3 - https://lists.ubuntu.com/archives/jaunty-changes/2009-June/009829.html
* Liraz Siri
UWN Translations
General Community News
MOTU Council
Ubuntu Stats
Bug Stats
Infamous Bugs
Translation Stats Jaunty
Ubuntu Brainstorm Top 5 this week
LoCo News
New in Jaunty Jackalope
Launchpad News
Ubuntu Forums News
Ubuntu aims for ten second boot time
Upgrading Ubuntu 8.04 to 9.04
Testing Out ATI Kernel Mode-Setting On Ubuntu
GRUB2 To Be Used By Default In Ubuntu 9.10
Explaining Ubuntu's 10 Second Boot Time
Ubuntu One Beta Finally Kicks Off
Ubuntu 9.04 vs. Fedora 11 Performance
Ubuntu 9.04: New Intel Graphics Drivers
Ubuntu 9.10 Alpha 2 Released
In The Blogosphere
Sandisk collaborates to improve Ubuntu netbook SSD performance
GRUB 2 now default for Ubuntu 9.10
Dell's new inexpensive Linux notebook
Trouble Brews With Ubuntu Users Mailing List
Memo to Canonical: Don’t Repeat IBM’s Mistakes
Fair is Fair - Ubuntu Netbook Remix
Review: Ubuntu 9.04 on my ASUS Eee PC 901
Updates and Security for 6.06, 8.04, 8.10 and 9.04
Ubuntu 6.06 Updates
UWN #: A sneak peek
Archives and RSS Feed
Additional Ubuntu News
Ubuntu - Get Involved
Welcome to the Ubuntu Weekly Newsletter, Issue 146 for the week June 8th - June 14th, 2009. In this issue we cover ...
Note to translators and our readers: We are trying a new way of linking to our translations pages. Please follow the link below for the information you need.
https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/Translations
Please give Stephen Stalcup a warm welcome to the team, where he's continue to work on KDE packages and sponsoring.
We're very pleased to welcome a new member to the MOTU team: Nick Ellery. Nick has been working a lot on merging changes from Debian and lowering the delta between Debian and Ubuntu.
Stéphane Graber wants to expand his activities a bit and work some more on server packages and Edubuntu and applied for Core Dev. The MC recommends Stéphane.
Open (57357) -221 over last week
Critical (19) +1 over last week
Unconfirmed (26734) +191 over last week
Unassigned (49494) -135 over last week
All bugs ever reported (288007) +1406 over last week
As always, the Bug Squad needs more help. If you want to get started, please see https://wiki.ubuntu.com/BugSquad
Spanish (13590) -436 over last week
French (42699) -125 over last week
Brazilian Portuguese (53405) -58 over last week
Swedish (54417) +/-0 over last week
English (United Kingdom) (59006) +/-0 over last week
Remaining strings to translate in Ubuntu 9.04 "Jaunty Jackalope," see more at: https://translations.launchpad.net/ubuntu/jaunty/
Keep current gnome interface, instead of using gnome shell - http://brainstorm.ubuntu.com/idea/20171/
Firewall activates when connected to insecure network - http://brainstorm.ubuntu.com/idea/20170/
Adding an application launcher to startup is very difficult - http://brainstorm.ubuntu.com/idea/20210/
File roller process is another window to deal with - http://brainstorm.ubuntu.com/idea/20202/
What bluefish needs - http://brainstorm.ubuntu.com/idea/20180/
Ubuntu Brainstorm is a community site geared toward letting you add your ideas for Ubuntu. You can submit your own idea, or vote for or against another idea. http://brainstorm.ubuntu.com/
ARS Technica's Ryan Paul notes that the growing adoption of the Linux operating system on netbook devices has compelled Linux distributors to focus on improving startup performance. Ubuntu 9.04, which was released last month, is one distribution where these improvements are particularly noticeable. In a presentation at the Ubuntu Developer Summit in Barcelona, developer Scott James Remnant noted that boot time decreased from 65 seconds in version 8.10 to only 25 seconds in 9.04. This is already a substantial improvement, but he believes that there is still room for more aggressive optimization. Canonical will continue pushing the limits of boot performance during the upcoming development cycle for Ubuntu 9.10, which is codenamed Karmic Koala. According to Remnant, the company aims to achieve a ten-second boot time next year for Ubuntu 10.04, the release that will follow after Karmic. This emphasis on boot performance will make Ubuntu a more competitive option for hardware makers who are seeking a fast and lean distribution to preinstall on netbook devices. http://arstechnica.com/open-source/news/2009/06/ubuntu-aims-for-ten-second-boot-time.ars
The Linux Loop tells us that around the time Ubuntu 8.10 was released, their hard drive died and they figured that, as long as they were reinstalling anyway, they should try upgrading to 8.10. Unfortunately, They experienced a couple of problems with 8.10 and so they reverted to 8.04. Recently they have been encountering situations where the packages in the repositories were too outdated so rather than continually patching these outdated packages, they decided to upgrade to 9.04. The only thing they had to reconfigure was my fingerprint reader, and that leads to their one complaint about the upgrade process. From beginning the first upgrade to finishing the second the process took six hours, but it would have been a lot faster if the upgrade tool hadn’t kept asking questions in the middle of the upgrade. Whenever the installer runs into a configuration file that has been modified, it pauses the upgrade and asks if you want to replace it. In the Linux Loop's opinion the option to set a default behavior should be given at the beginning or you should have the option to deal with all the issues at the end to help speed up the upgrade process. http://www.linuxloop.com/news/2009/06/07/upgrading-ubuntu-804-to-904/
Michael Larabel of Phoronix tells us that the kernel mode-setting for Intel graphics hardware can already be found in the mainline Linux kernel and will be included by default in the release of Ubuntu 9.10 later this year. While Intel's kernel mode-setting support has been maturing in a steadfast manner, this support has not been moving along quite as fast for ATI and NVIDIA hardware. It is possible we will see ATI/AMD kernel mode-setting along with the necessary memory management support enter the Linux 2.6.31 kernel and potentially see this feature appear in Ubuntu 9.10 as an end-user option, but currently this support is still deemed under development. For those with ATI Radeon hardware looking to test out kernel mode-setting, there is now a Launchpad PPA and a LiveCD available for testing out these mode-setting capabilities atop Ubuntu. http://www.phoronix.com/scan.php?page=article&item=ubuntu_ati_kms&num=1
Phoronix's Michael Larabel reports that starting with Ubuntu 9.10, and beginning with daily CD builds starting June 9th, GRUB2 will be the default boot-loader on new Ubuntu installations. GRUB2 will bring internationalization support, support for newer systems, and many other improvements considering this GNU boot-loader has been in development for a number of years. This change was announced today on the Ubuntu development list after discussions took place recently at the Ubuntu Developer Summit. More on Ubuntu's GRUB2 implementation can be found via their kernel team Wiki. http://www.phoronix.com/scan.php?page=news_item&px=NzMxMg
Phoronix's Michael Larabel tells us that two weeks ago he reported that Plymouth would not be making its way to Ubuntu with the next 9.10 release as was once planned. Instead Canonical is putting their focus on improving the boot time so that there is less rationale for spending time on making a fashionable boot experience. With Ubuntu 10.04 LTS, Canonical is looking to achieve a ten second or less boot when using the Dell Mini 9 or similar devices. With Ubuntu 9.10, they hope to be on their way to accomplishing this goal. Canonical's Scott James Remnant has now outlined more on their plans for the Ubuntu boot performance targets with Ubuntu 9.10 and 10.04 LTS. The main areas that developers will be working on is speeding up the X Server start-up process and improving initramfs. http://www.phoronix.com/scan.php?page=news_item&px=NzMxMw
Martin Kaba of Kabatology reports that Ubuntu One Beta, the Dropbox type of service by Canonical has finally kicked off, but not for all. When his invitation arrived he quickly moved on to test it. Kaba states, "it is very intuitive, yes, but damn slow and often breaks - - that certainly why it’s still a beta." To install, just read through the Installation Instructions. After that, get connected and start syncing. A right-click on the Ubuntu One icon menu, gives you the options to disconnect, report a problem, open a folder, or go to web. Kaba also reminds everyone that if they are amongst the few selected to test Ubuntu One, Don’t forget to report any problems! http://www.kabatology.com/06/09/ubuntu-one-beta-finally-kicks-off/
Michael Larabel of Phoronix notes that Fedora 11 was released earlier this week so they have set out to see how its desktop performance compares to that of Ubuntu 9.04, which was released back in April. In a number of the benchmarks the results were close, but in a few areas there are some major performance differences. In particular, with the test profiles that stress the system disk, Fedora 11 generally did much better -- in part due to the EXT4 file-system and newer Linux kernel. Fedora also did much better with the database tests like SQLite and PostgreSQL. Ubuntu 9.04 though had done a better job with the Apache Benchmark and C-Ray. http://www.phoronix.com/scan.php?page=article&item=fedora11_ubuntu904_perf&num=1
Linux Pro's Kristian Kissling tells us that there is hope for Ubuntu users with Intel graphics. As it appears, the current 2D drivers solve most of the recent graphics problems with Intel chips, according to Ubuntu developer Bryce Harrington in a developer mailing list. A nuisance to owners of Ubuntu 9.04 and Intel graphics chips has been the problems with the graphics drivers. Even though Intel manages its drivers in an exemplary open source way, 2D and 3D acceleration has fairly much dragged so far. The reason is an unhappy pairing of the current Kernel 2.6.28's Kernel Mode Setting (KMS) with Intel's new UXA acceleration architecture that replaces EXA and the newly added Graphics Execution Manager (GEM) in the Kernel. The solution should come in the form of the Intel 2.7.99.1 driver. Harrington mentions that Jaunty users have the advantage of the Kernel 2.6.30 installation to resolve the issue. Harrington suggests activating the UXA module in the xorg.conf file, but not KMS, which is deactivated by default. http://www.linuxpromagazine.com/online/news/ubuntu_9_04_new_intel_graphics_drivers
Phoronix's Michael Larabel reports that Ubuntu 9.10 "Karmic Koala" Alpha 2 is now available. This second testing release for the forthcoming Ubuntu 9.10 doesn't bring too much in the way of exciting features or major changes since the release of Alpha 1. There is, however, GRUB2 as the default boot-loader. There are also some updated X.Org bits, the Linux 2.6.30 kernel, the latest GNOME 2.27.x packages, and other updated packages pulled in from Debian. Unlike the first alpha release, a desktop LiveCD build of Ubuntu 9.10 Alpha 2 is also available. Updates to Kubuntu and Xubuntu are also available at this time. The Ubuntu 9.10 Alpha 2 release announcement can be read on their development announcement list. http://www.phoronix.com/scan.php?page=news_item&px=NzMyMw
http://www.ubuntu.com/news/sandisk-ssd-netbooks
http://www.fsdaily.com/EndUser/GRUB_2_now_default_for_Ubuntu_9_10_Karmic_Koala
http://blogs.computerworld.com/dells_new_inexpensive_linux_notebook
http://www.workswithu.com/2009/06/10/trouble-brews-with-ubuntu-users-mailing-list/
http://www.workswithu.com/2009/06/10/memo-to-canonical-dont-repeat-ibms-mistakes/
http://community.zdnet.co.uk/blog/0,1000000567,10012930o-2000498448b,00.htm
http://blog.hydrasystemsllc.com/2009/06/11/review-ubuntu-904-on-my-asus-eee-pc-901/
USN-784-1: ImageMagick vulnerability - http://www.ubuntu.com/usn/USN-784-1
USN-785-1: ipsec-tools vulnerabilities - http://www.ubuntu.com/usn/USN-785-1
USN-775-2: Quagga regression - http://www.ubuntu.com/usn/USN-775-2
USN-786-1: apr-util vulnerabilities - http://www.ubuntu.com/usn/USN-786-1
USN-787-1: Apache vulnerabilities - http://www.ubuntu.com/usn/USN-787-1
USN-779-1: Firefox and Xulrunner vulnerabilities - http://www.ubuntu.com/usn/USN-779-1
langpack-locales 2.3.18.21 - https://lists.ubuntu.com/archives/dapper-changes/2009-June/012781.html
vzctl 3.0.22-5ubuntu1.1 - https://lists.ubuntu.com/archives/hardy-changes/2009-June/012243.html
partman-basicfilesystems 56ubuntu5 - https://lists.ubuntu.com/archives/hardy-changes/2009-June/012244.html
tzdata 2009i-0ubuntu0.8.04 - https://lists.ubuntu.com/archives/hardy-changes/2009-June/012245.html
tzdata 2009i-0ubuntu0.8.10 - https://lists.ubuntu.com/archives/intrepid-changes/2009-June/009745.html
tzdata 2009i-0ubuntu0.9.04 - https://lists.ubuntu.com/archives/jaunty-changes/2009-June/009828.html
hal 0.5.12~rc1+git20090403-0ubuntu3 - https://lists.ubuntu.com/archives/jaunty-changes/2009-June/009829.html
You can always find older Ubuntu Weekly Newsletter issues at: https://wiki.ubuntu.com/UbuntuWeeklyNewsletter
You can subscribe to the Ubuntu Weekly News via RSS at: http://fridge.ubuntu.com/uwn/feed
As always you can find more news and announcements at:
http://www.ubuntu.com/news
http://fridge.ubuntu.com/
Thank you for reading the Ubuntu Weekly Newsletter.
The Ubuntu Weekly Newsletter is brought to you by:
Sayak Banerjee
Liraz Siri
The Ubuntu community consists of individuals and teams, working on different aspects of the distribution, giving advice and technical support, and helping to promote Ubuntu to a wider audience. No contribution is too small, and anyone can help. It's your chance to get in on all the community fun associated with developing and promoting Ubuntu. http://www.ubuntu.com/community/participate
This document is maintained by the Ubuntu Weekly News Team. If you have a story idea or suggestions for the Weekly Newsletter, join the Ubuntu News Team mailing list at https://lists.ubuntu.com/mailman/listinfo/Ubuntu-news-team and submit it. Ideas can also be added to the wiki at https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/Ideas. If you'd like to contribute to a future issue of the Ubuntu Weekly Newsletter, please feel free to edit the appropriate wiki page. If you have any technical support questions, please send them to ubuntu-users@lists.ubuntu.com.
Except where otherwise noted, content on this site is licensed under a Creative Commons Attribution 3.0 License Creative Commons License 3.0 BY SA
UbuntuWeeklyNewsletter/Issue146 (last edited 2009-06-15 17:06:20 by cpe-76-176-127-51)
|
cc/2020-05/en_middle_0102.json.gz/line2126
|
__label__cc
| 0.605213
| 0.394787
|
Self-Study Home
2008 Self-Study
President's Introduction
Responses to 2003 Regular Interim Report Recommendations
Summary Chapter
View source for Standard 5
From selfstudy
← Standard 5
The action you have requested is limited to users in the group: editors.
===Standard Five: Library and Information Resources=== ==Standard 5.A== Standard 5.A – Purpose and Scope ''The primary purpose for library and information resources is to support teaching, learning, and, if applicable, research in ways consistent with, and supportive of, the institution’s mission and goals. Adequate library and information resources and services, at the appropriate level for degrees offered, are available to support the intellectual, cultural, and technical development of students enrolled in courses and programs wherever located and however delivered.'' ====Supporting the Academic Mission of the College==== Library and information resources at The Evergreen State College support students as they learn to reason and communicate about freely chosen inquiries whose outcomes remain to be discovered or created (Smith, Standard 2). Library and information resources at Evergreen must therefore balance the open-ended demands of free inquiry with the need for stability, security, and efficiency in systems and services. Historically, the library has been well funded when compared to many public baccalaureates, in recognition of the extraordinary demands of open-ended inquiry and independent study. All library and information resources are shaped by the primary mission of teaching and providing state-of-the-art facilities for academic programs and individual students in this interdisciplinary, liberal arts curriculum. Strong collaboration among library, computing and media staff, faculty, and administration assures the development of the library and information resources as centers for teaching and learning. ====The Founding Vision of the Library: Any Medium, Any Location==== In 1969, when the founding Dean of Library Services James Holly wrote his “Position Paper No. 1,” he proposed a model which he called the generic library, in some ways anticipating the concept of today's virtual library. “By generic I include man’s [sic] recorded information, knowledge, folly, and wisdom in whatever form put down, whether in conventional print, art forms, magnetic tape, laser storage, etc. By generic, I also eliminate physical boundaries such as [a] specific building or portion limited and identified as ‘the library.’” Holly's vision motivated many aspects of library, media, and computer services, but proved in many ways untenable due to technical and budgetary constraints and because the college community expressed traditional longings for a bounded space. Today, laptops and networked data are ubiquitous and most students expect remote access to information resources, regardless of medium. Technology, as well as community values, have caught up with Holly’s founding vision, and Evergreen's library and learning resources now include all media, distributed to almost any location. Display of networked and audiovisual information now brings information technology to almost any classroom on campus. Active involvement in new consortia has led to quick access to expanded collections and information resources from around the region. Academic programs and students off-campus have access to rich, academically sound journal holdings. A wide selection of digitized media applications and advanced media labs provide access to media production. Increasingly seamless access to media, computing, and traditional information resources benefits all students. At the same time, the physical library has expanded its role as a social and intellectual space and now provides an increasingly hospitable center for learning and gatherings of all kinds. A $22-million remodel connected previously disparate areas and created a more cohesive information-technology wing, providing one central entrance for the Library, Media Services, the Computer Center, and the Computing and Communications offices. ====Functions and Facilities Covered in Standard Five==== Reflecting these developments, Standard Five considers information resources and services from several disparate administrative units: Library Services, including Media Services (administratively part of the Academic division); Academic Computing (administratively part of the Finance and Administration division); and the Computer Applications Lab (CAL) (administratively part of the Academic division, with a historical role supporting the science curriculum). The phrase "library and information resources" in Standard 5 should be understood to refer to these units collectively, while comments about separate areas will use more specific language such as the Library, Media Services, CAL, or Academic Computing. Occasional references to Computing and Communications will address technology infrastructure when relevant to instructional and academic support functions. The information resources offered and supported by the Library, Academic Computing and the CAL represent facilities and functions commonly found in libraries and computer centers elsewhere in academia. The Media Services section of the Library requires some explanation, as its role and location in the institution are unique. Media Services provides not only the usual audiovisual support for instruction, but also extensive collections and facilities in support of media production by students across the curriculum. Media production labs, a large circulating collection of portable media equipment, and extensive instruction represent activities, facilities and functions which will not be found within the library at most institutions. Some media arts, communications or education departments might provide some such services to students of their curriculum, but not the library, and certainly not for general use. In the context of an interdisciplinary college, and in the light of the original ideal of the generic library, these services are provided through the Library in order to assure cross-curricular access and opportunity for students from anywhere in the curriculum, whether those students are studying media or simply wish to communicate academic content using media beyond print. ===Sufficiency of Information Resources and Services (5.A.1)=== 5.A.1 ''The institution’s information resources and services include sufficient holdings, equipment, and personnel in all of its libraries, instructional media and production centers, computer centers, networks, telecommunication facilities, and other repositories of information to accomplish the institution’s mission and goals.'' Throughout this study library and information resources will be found to be strongly linked via face-to-face collaboration and consultation with faculty, staff, and students. These interconnections, within a flat organizational structure, assure constant feedback and redevelopment of services and facilities. Library funding generally compares very well with public institutions and correlates strongly to average funding for private liberal arts peers, peers with whom our use statistics compare favorably. An external assessment performed by Edutech described budgetary support for information technology as comparable to that of institutions with similar missions. There are no comparable institutions for studying the large activity of cross-curricular media services; however, advocacy from both the cross-curricular perspective of the library and from the specific needs of the media faculty help ensure support. Rapid expansion in information technology access and aspirations have led to changes in personnel allocation and expertise and will continue to make increasing demands on a staff and faculty already stretched in many areas. Description of Facilities, see [[media: Major_Facilities_List.doc |Major Facilities]] and Areas 1 & 2 of the [[media:TESC_Information_Environment_Review.doc | Edutech Technology Peer Review Report]] Holdings and Equipment, see [[Standard_5#Equipment_and_Materials_to_Support_the_Educational_Program_.28Standard_5.B.1.29 | 5.B.1]] Personnel, see [[Standard_5#Sufficiency_of_Staffing_.28Standard_5.D.1.29|5.D.1]] Evaluation of Budgetary Support, see [[Standard_5#Library_and_Information_Resources_Budgets_.285.D.6.29 |5.D.6]] ===Sufficiency of Core Collection and Related Resources (5.A.2)=== 5.A.2 ''The institution’s core collection and related information resources are sufficient to support the curriculum.'' Broad institutional support for cross-curricular library and information services has historically generated sufficient institutional budgetary support for core collections and facilities. During the study period, inflation and budget cuts reduced base budgets for local monograph collections. Non-state resources made up for some of the gap without building the base budget permanently. Consortial agreements created opportunities for cost-effective collective purchase of serials and for efficient resource sharing, resulting in better support for the intensive work by individual students formerly more difficult to support effectively. Collection Development, see [[Standard_5#Equipment_and_Materials_to_Support_the_Educational_Program_.28Standard_5.B.1.29 |5.B.1]] & [[Standard_5#Networks_Extend_Information_Resources_.28Standard_5.B.5.29|5.B.5]] ===Education Program Drives Resources and Services (5.A.3)=== 5.A.3 ''Information resources and services are determined by the nature of the institution’s educational programs and the locations where programs are offered.'' Strong connections to the curriculum inform all library and information services. An entirely distinctive library rotation system deeply connects the library and teaching faculty in the shared project of curriculum and program planning. Teaching alliances between media services professionals and media faculty determine the character of media services. A strong liaison system connects Academic Computing instructors and services with teaching faculty. Meanwhile, a deeply experienced staff with substantial managerial responsibilities manages day-to-day library services while also implementing services in response to the new opportunities which advancing information technology affords. See [[Standard_5#Teaching_and_Instruction_.28Standard_5.B.2.29 | Teaching and Instruction 5.B.2]] Information technology planning and governance are discussed in Area 5 (Planning and Governance) of the [[media: TESC_Information_Environment_Review.doc|Edutech Information Environment Review]]. The study notes that planning is collaborative and responsive to academic needs, and could be strengthened through a stronger role for ITCH (IT Collaborative Hive). ==Standard 5.B== Standard 5.B – Information Resources and Services ''Information resources and services are sufficient in quality, depth, diversity, and currency to support the institution’s curricular offerings.'' === Equipment and Materials to Support the Educational Program (Standard 5.B.1)=== 5.B.1 ''Equipment and materials are selected, acquired, organized, and maintained to support the educational program.'' ====Collection Development Procedures & Methods==== The library faculty develops collections to support Evergreen's changeable interdisciplinary curriculum without the usual benefit departmental allocation or structures. The librarians build collections and vendor profiles on the basis of their work as both library and teaching faculty (See [[Standard_5#Teaching_and_Instruction_.28Standard_5.B.2.29 |5.B.2]]), work which involves full-time teaching, faculty governance, extensive colleagial engagement with the teaching faculty, and affiliation with planning units. The curriculum committee is the faculty as a whole, who develop the curriculum in curricular planning units, curriculum retreats, and governance groups. The library faculty's overall knowledge of the curriculum is strengthened by teaching faculty who rotate into the library and lavish their attention on areas of the collection related to their disciplinary expertise. Finally, librarians honor most requests from individuals for additions to the collection, working from the fact that free inquiry and individual research are central to the library’s mission. In the past, the Library has struggled to satisfy incidental research demands outside the boundaries defined by the core, repeating curriculum. The substantial part of the curriculum which varies from year to year, the significant amount of work by independent contract students (almost 1300 independent study contracts in 2006-07), and the opportunity for intensive individual projects within full-time, multi-quarter programs have all driven demand for specialized materials outside the core collection. Resource sharing and large, shared purchases, all made efficient because of networking technology, have eradicated this problem, although budget cuts and inflation create some difficulties keeping up with the core collection. The budget for core monograph purchases has been supplemented with allocations from non-State resources in order to help bridge this gap. See [[Standard_5#Networks_Extend_Information_Resources_.28Standard_5.B.5.29 | Networks Extend Information Resources 5.B5]] below. ====Media Services==== Close work with the curriculum and faculty also informs the development of media facilities and services. Media staff attend the Expressive Arts Planning Unit meetings, in particular the Moving Image subgroup. Budgetary processes for equipment purchase and operating costs include multiple avenues for consideration of educational program needs. Through the Planning Units needs are communicated to the Academic budget planners. Through the Library, cross-curricular media demands are communicated to the Academic budget planners. Through the Information Technology Collaborative Hive (ITCH), cross-unit needs are coordinated and passed up to the campus-wide budget process. These three avenues help assure that the budget process addresses both broad and specific curricular demands for media. Some stresses develop. Like the library, Media Services serves the entire academic community, from programs to individuals. And, like the library, Media Services strains under the pressure of answering the needs of independent study as well as a fluid curriculum. Students working on independent media productions compete with Expressive Arts programs over scarce resources, from equipment to laboratories to teaching staff. In order to balance these competing demands, Media Services requires students and faculty to submit Media Request Forms, which are reviewed by the Media Services Manager and the Head of Instruction Media, who allocate resources, both human and technological. Individual Contract forms include a question about the need for special equipment or facilities, and this serves as a safety net for screening intensive media use. In these ways Media Services assures that students who embark on media studies do so with the appropriate support. The Expressive Arts planning unit also instituted a Student Originated Studies (SOS) group contract in media in order to assure that students have more consistent access to facilities and instructional support as they pursue their independent projects. ====Information Technology Equipment & Facilities==== The [[Media: TESC_Information_Environment_Review.doc| Edutech Information Environment Review]] includes equipment in its discussion of technological facilities in Area 1 of the report. The report states, "Computing, networking and information technology facilities at Evergreen are extensive and impressive. In most cases, Evergreen facilities are at or near standards for similar institutions, and in some cases surpass them. However, these standards are a moving target, and there are areas in which the College will probably have to make upgrades in the near future." The report lauded the computer labs, classroom technology and access to computers. Recommended improvements were to extend wireless to the entire campus and permanently fund a replacement cycle for equipment. ===Teaching and Instruction (Standard 5.B.2)=== 5.B.2 ''Library and information resources and services contribute to developing the ability of students, faculty, and staff to use the resources independently and effectively.'' ====Defining Information Technology Literacy==== Standard 2 links the Five Foci and Six Expectations of an Evergreen education are linked to the idea of [[Standard_2#Reflexive_Thinking | reflexive thinking]]. "Reflexive thinking begins with a question, an interrogation of the world, and an encounter with the other. As such it involves the student in the whole process of substantive learning about subjects, disciplines and methods that is the standard domain of learning. But reflexivity is the capacity that a learner has to think about the situation and conditions that underlie her own personal and collective experience of thinking and knowing." This work is engaged and supported through the broad and deep resources of the collections and instruction within the library and information resources. The professional literature and practice of librarianship defines information literacy as a reflective process. To be clear a '''reflective''' process considers, evaluates, synthesizes and in general engages information discovered through research. In contrast, a '''reflexive''' process goes on to consider one's own learning and knowledge as influenced through exposure to the information under consideration. According to Jeremy J. Shapiro and Shelley K. Hughes, in their article entitled [http://www.educause.edu/pub/er/review/reviewarticles/31231.html| 'Information Literacy as a Liberal Art.'], "Information literacy is a new liberal art which extends beyond technical skills and is conceived as one's critical reflection on the nature of information itself, its technical infrastructure and its social, cultural, and even philosophical context and impact... The information literacy curriculum includes * Tool literacy - The ability to use print and electronic resources including software and online resources. * Resource literacy - The ability to understand the form, format, location and methods for accessing information resources. * Social-structural literacy - Knowledge of how information is socially situated and produced. It includes understanding the scholarly publishing process. * Research literacy - The ability to understand and use information technology tools to carry out research, including the use of discipline-related software and online resources. * Publishing literacy - The ability to produce a text or multimedia report of research results." ====ITL in the Context of Holly's Generic Library==== Information literacy at Evergreen is itself a reflexive practice, in addition to being central to the process of reflexive thinking in the broader context of undergraduate education at Evergreen. That is, the student uses library and information resources to put herself in relation to information and thinking from a variety of sources and, further, reflects about herself and her learning as she researches and learns. Within the context of library and information resources as understood and managed at Evergreen, this literacy includes not just print scholarship, but media and computing, to become not just information literacy but Information Technology Literacy. Reflection upon information includes reflection upon the nature and role of the tools themselves. Reflexive thinking includes the relation of the user to the information and to the tools. Thus, in order to assure that students have the skills to communicate about their open inquiries, and the resources to support deeply reflexive thinking, library and information resources take a broad role in the curriculum. Two of the “Six Expectations of an Evergreen Graduate” relate directly to the library and information resources commitment to help students achieve intellectual independence, creativity, and critical acumen. Expectation Two states that our graduates will communicate creatively and effectively; Expectation Four, that our graduates apply qualitative, quantitative, and creative modes of inquiry appropriately to practical and theoretical problems across the disciplines. Not only should literate students read and write astutely, they also should access, view, critique and produce media and writing that is eloquent and complete. In this way, digital scholarship merges seamlessly with individual and formal educational goals, just as print scholarship has in the past. ====Cross-Curricular Media Instruction==== Library and information resources support ITL as an agenda for students across programs, disciplines and media. Library and information resources staff and faculty collaborate with teaching teams as they instruct students in media and students who create films, multimedia or musical works for programs or for independent study. These are the challenges of the "freely chosen inquiry," challenges that cannot all be met at all times. However, the location of Media Services administratively and physically within Library Services is meant to insure that media studies and media production are supported appropriately both within the programs that media faculty teach and elsewhere in the inquiries of students. The spread of entry-level media applications into the general-use computer labs increases access to media production across the curriculum. Although library and information resources instructors work to fuse teaching with program content, students are nevertheless able to access any media application or information technology beyond or without considering program content. Likewise, many programs focus entirely on technical skill building, without any formal attempt to link these practices to disciplinary content. And in other areas of the curriculum, such as CTL, critical media and information studies are often taught in a theoretical mode, without hands-on media production— the thing itself. The point is that, when skills are valorized over content, or when theory ignores practice, students neglect concrete critical reflection on how technology impacts the message, the creators, the audience, or society. However, Holly's generic library model, the founding principle for library and information resources at Evergreen, has emphasized and counterbalanced the tendency to isolate skills from content. Students who read texts expect to write as well; why should view media and not expect to create it? Early on, a rotating faculty member who helped link instruction with critical media studies and with interdisciplinary programs directed Media Services. Library and information resources continue to struggle to advocate for the critical study of media and information technology across the curriculum. Academic computing also provides access to and instruction in information technologies through a balance of specialized and open computing facilities. With the migration of many media applications to commonly available personal computer platforms, instruction and facilities to support entry-level media production have spread to academic computing and even to the library proper. Library and information resources faculty and staff instruct and teach in multiple modes, from basic skills instruction to more complex, content-driven teaching by faculty and professionals in the curriculum. In addition, the teaching faculty contribute substantively and collaboratively to planning and implementing information services, collections and policies. This dynamic collaboration between the teaching faculty and the library and information resources has shaped the primary mission to support inquiry-based education. Each area within library and information resources has developed structures to connect teaching and instruction closely to the faculty, the curriculum and the academic mission of the college. Utilization, satisfaction, and curricular surveys demonstrate the breadth and effectiveness of this work (See [[Standard_5#Standard_5.E | Planning and Evaluation 5.E]]). ====Faculty Librarians and Library Teaching==== In the case of the library, Evergreen requires rotation between the librarians and the teaching faculty. Briefly stated, faculty librarians rotate out of the library to teach full-time on a regular basis and, in exchange, teaching faculty rotate into the library to serve as librarians providing reference, instruction and collection development. (See [[media:Learning_Communities_and_the_Academic_Library.pdf | Pedersen]] pp. 41-44 for more discussion of this system). Faculty who rotate into the library leave with updated skills for developing information literacy within their programs and teams across the curriculum. Library faculty develop their subject specialties and enhance their ability to work across pedagogical and disciplinary realms. Perpetual faculty-wide interactions in faculty governance and team-teaching reinforce the strong connections between the library faculty and the teaching faculty. Librarians know the faculty as colleagues and teaching faculty know the librarians (probably the only basis for widespread and effective library instruction in a curriculum without requirements). Teaching teams also spread effective library instruction practices as experienced teaching faculty introduce their new faculty teammates to their library colleagues and the teaching they offer. Most new faculty also bring updated information technology skills and experience to share with their colleagues. A loose liaison system links each librarian with a subset of the curriculum, based on subject expertise, planning unit affiliation, and personal alliances. Faculty librarians provide a wide array of library and information technology related teaching. One-time workshops designed to engage sources particular to the research projects within an academic program represent the most common format. Librarians and teaching faculty design these workshops with the assumption that the skills imparted are embedded in the interests and needs of the program learning community. At a minimum, the faculty for the program usually 1) create a research assignment which informs and motivates the students’ work; 2) attend the research workshop and take part, adding their expertise and/or questions; 3) provide the library liaison a syllabus and a copy of the assignment and a list of the topics students are considering and 4) ask the students to begin considering their topic before attending the workshop so that they are primed to begin actual research during the workshop. Librarians teach series of workshops on research most frequently in the graduate programs, the sciences, and the off campus programs. The teaching models for these more extended situations vary according to the library faculty involved and the role in the curriculum and they evolve significantly year to year. Each year library faculty affiliate deeply with a few such programs, meeting weekly to create stepped learning conjoined with research assignments. For documents exemplifying this teaching see [[media:Forensics_week-by-week.doc | Forensics Syllabus]] and [[media:Chemistry_Health_Professions_Project_Description.doc | Chemistry Health Professions Project]]. During several academic years an information technology seminar linked library internship opportunities with a hands-on web technology workshop. In that model, a small group of students explored contemporary questions in the world of rapid digitization and its social implications. They paralleled that study with real library work and web production practice, including wikis and webpages designed to support library functions. The seminar and workshop have provided a venue for library faculty, staff and Academic Computing instructors to gather and consider both the past and future of information technologies. For syllabi for these programs see the web pages for [http://academic.evergreen.edu/curricular/stilllooking/| Still Looking], [http://academic.evergreen.edu/curricular/infolandscapes/| Information Landscapes] and [http://academic.evergreen.edu/curricular/commonknowledge/| Common Knowledge]. Each year one librarian also offers research methods through the evening and weekend curriculum. In depth, extended library-related teaching within programs and service to off-campus and evening and weekend programs can be a challenge in the context of a reduced core of library faculty. During the self-study period, one faculty line was cut during budget reductions, and this causes significant stress on the quality and quantity of instruction the area is able to provide. ====Library Faculty as Service Providers==== Within the library, the library faculty see themselves primarily as teachers. They tend to understand the services of the library in the context of teaching and learning, specifically teaching as it actually happens in the Evergreen curriculum. Thus, they do not tend to work from externally defined "best practices" nor do they function in a reactive mode. They take a proactive approach to the work, suggesting tools and strategies for designing library instruction, and finding the intellectual work in the world of research instruction. They position themselves to work across administrative as well as curricular boundaries and sustain an important role in the crossroads of traditional research methods, contemporary information technology and the world of the curriculum and their teaching colleagues. ====Service and Teaching==== Over time, the faculty librarians have transformed the reference desk into a teaching space, which goes well beyond traditional service models. For this reason, there is generally a librarian at the desk during the hours that the library is open to the public. Each contact between a librarian and a patron represents an opportunity to teach and learn. In collections, web page design, signage, collection organization, and creation of virtual services, the librarians ask, not just what is easiest or matches the expectations of inexperienced users, but what can be taught through the new design, service or collection. For example, broad aggregate databases have been purchased because they are cost-effective, but the librarians also emphasize and teach comparatively complex digitized indexes which refer students more deeply into the discipline-based literature of their inquiries. As discussed throughout this document, library and information resources are designed, planned, taught and supported in the context of college-wide teaching and learning. ====Library Faculty and Off-Campus Programs==== Library support for the two major off-campus offerings, the Tacoma and the Reservation-Based, Community-Determined programs, focuses heavily on instruction, with additional support from networked technology, including specialized webpages for these programs. See [http://www.evergreen.edu/library/catalog/na_services.htm Services for Reservation-Based Students]and [http://www.evergreen.edu/library/reference/Tacoma1.htm Services for Tacoma-Based Students] Students of these programs have limited access to the physical library, and must be alerted to the many high quality resources made available to them on-line through the Library. End-of-Program reports show very high engagement with information technology in these programs (See [[Media: End-of-program_Review_Results_for_2006-07_%E2%80%93_Information_Technology_Literacy_by_Planning_Unit.pdf |End-of-program Review Results for 2006-07 - Information Technology Literacy by Planning Unit]]). Most years, librarians work closely with the Research Methods class at Tacoma, providing laboratory-based instruction on location several weeks per quarter. As of 2007-08, this work has taken on a more formalized structure, and has developed into credit-generating research classes. Library instruction at the upper-division off-campus sites of the Reservation-Based Community-Determined programs has varied widely year-by-year. Recently the program has focused on building library methods into the lower division bridge curriculum, which has not involved the library faculty directly. Reservation-Based programs report 100% teaching and use of library and internet research in 2007, however, this work has not engaged the Library's holdings or services significantly. Rebuilding this connection should be a high priority, and a planned faculty rotation from a former directory of the Reservation-Based program will be an opportunity to do so. Perusal of the [[Media: Achievements2.doc |Achievements]] list for the self study period demonstrates that almost every development supports distant access to collections and services, and thus the off-campus programs. ====Modes of Instruction in Media and Academic Computing==== In all major computer and media labs, staff instructors provide group instruction designed to support the needs of specific academic programs, covering particular applications and tools relevant to the disciplines involved. Media and computing instructors teach workshops in different spaces and in different modes, depending on the discipline and the technology. There are no constraints upon which facilities may be used. In one quarter, a science program might have workshops in the Computer Center focusing on blogs; a math workshop using Excel in the Computer Applications Lab; a session on video documentation for field research in the Multimedia Lab; and a library research workshop in one of the general-purpose labs in the Computer Center. In this way, academic programs leverage staff expertise and facilities as needed. Teaching faculty must be able to easily identify and contact the appropriate staff member to coordinate computer instruction which may require significant logistical support such as lab scheduling, equipment check-out, server space, password access, personnel scheduling and other details. In Academic Computing, program liaisons work with faculty in order to coordinate how programs will teach technology. For instance, the staff liaison helps set up file shares and web spaces and schedules and teaches workshops. In Media Services, the Head of Instructional Media provides a central location for faculty and students requesting instructional support in media to connect with appropriate media instructors and to schedule facilities and instruction. The Media Services staff work with faculty to design and integrate media into their programs. Media Services staff meet regularly with Media faculty in the Expressive Arts planning unit so that they can develop facilities, plan for access, and foster integration of media into academic programs. Students who work independently on media or computing projects or who decide to tackle media projects within non-media oriented programs also receive many forms of instructional support. Academic Computing offers regularly scheduled technology workshops, which are open to all. In addition, Evergreen students can access Lynda.com, which tutors students in software applications and programming languages. The Library recently subscribed to Safari Books Online, which supports the computer science curriculum as well as technical inquiries of students across the curriculum. Academic Computing began a computing wiki in 2006-07 which hosts approximately 2,000 pages of instructions and tutorials and which continues to expand. Increasingly, students, faculty and staff rely on the Academic Computing wiki to stay abreast of technologies hosted on campus. Any student may access most media production facilities and check out portable media equipment once they have completed relevant hands-on training sessions called proficiencies. Media instructors run hundreds of these quick, skills-focused instructional sessions annually, serving thousands of students, ensuring proper use of the equipment, and providing supportive technical background for systems. The number of formal instructional sessions provided to programs has doubled since 2000, suggesting the rapidly expanding use and breadth of college-supported media technology. Finally, the Evening and Weekend Studies curriculum provides a coherent, regular pathway for learning more complex media production processes. Like the library faculty, media instructors teach in a variety of modes: full-time, part-time, introductory, intensive, general, sustained, intermittent, specialized, individual, within programs or collaboratively in small groups. Many of the media staff are artists, professionals, and faculty in their own right with MFA’s in their fields. They teach photography, electronic music, web design, and digital imaging as adjuncts in Evening & Weekend Studies and in Extended Education. Media staff who teach as adjunct faculty are often also called to teach full time as visiting artists. Their contributions to the part and full time curriculum are substantial and sustained, some of them having taught for over 20 years. Their work supports the Expressive Arts. It also assures access and instruction for students who do not consider themselves artists who want nevertheless to engage in technologies that constitute not just important developing communication media but also define the visual aesthetics of science, history, political science, psychology, and other narratives. Additionally, Photo, Electronic Media and Media Loan staff annually teach as field supervisors for up to eight student interns who are critical to the effective functioning of labs and services. These students typically not only gain high level technical production skills, but also develop instructional, collaborative and administrative experience by working closely with students, faculty and technical staff. Finally, all Media staff sponsor many individual contracts which provide opportunities for students who have identified intensive individual inquiries which are not supported in the curriculum at large.In general, media staff are central to the success of media-based programs and are viewed as colleagues by the Expressive Arts faculty, whose programs they support, and as gurus by less media-literate faculty. These working relationships form the backbone of Media Services. ====Faculty Institutes==== As described thus far, library and information resources instructors regularly work with, instruct and support the teaching faculty through individual collaboration. In addition, they design and teach several faculty institutes each summer. Faculty institutes create valuable connections among faculty, library, media and academic computing instructors. Recent information technology institutes have focused on specific applications such as teaching statistics with Excel, using online collaborative tools to foster learning communities, or creating program web pages. Some years, substantive discussions of information technology literacy as opposed to hands-on training, have been offered. During institutes, faculty are also often afforded paid time for self-directed work that focuses on their program planning. In these instances, faculty evaluate technology, practice using it, and plan how to incorporate applications into their programs. ===Availability of Policies (Standard 5.B.3)=== 5.B.3 ''Policies, regulations, and procedures for systematic development and management of information resources, in all formats, are documented, updated, and made available to the institution’s constituents.'' The web provides a venue for all policies, regulations and procedures for all information resources and services. See [[Supporting_Documentation_for_Standard_Five#Policies,_regulations,_and_procedures_for_the_development and_management_of_library_and_information_resources,_including_collection_development_and_weeding|Required Exhibit 2: Policies, Regulations, and Procedures for the Development and Management of Library and Information Resources]] ===Participatory Planning (Standard 5.B.4)=== 5.B.4 ''Opportunities are provided for faculty, staff, and students to participate in the planning and development of the library and information resources and services.'' Faculty, staff and students participate in the planning and development of library information resources and services. The college community values face-to-face communication and formal procedures for consultation are minimal. All learning and information resources staff and faculty receive and welcome direct requests and suggestions. As an example, good hiring represents an important decision determining how library and information services evolve and prosper. Hiring processes are broadly consultative. Committees with representation from different work units interview and recommend for all staff positions. Students, staff and faculty representatives join in hiring committees for any major positions, especially those of administrators and faculty. These hiring processes also routinely include public presentations by the candidates, announced to the entire college community, so that the opinions of staff, faculty and students from all sectors of the college may be included in these major decisions. More broadly, collaborative work with teaching faculty and other clients drives the design and planning for almost all instructional and technical support. Face-to-face planning and direct engagement with teaching faculty in a program-by-program context defines the work of library and information resources across all units. See [[Standard_5#Participatory_Planning_.28Standard_5.E.1.29 | Participatory Planning 5.E.1]] ===Networks Extend Information Resources (Standard 5.B.5)=== 5.B.5 ''Computing and communications services are used to extend the boundaries in obtaining information and data from other sources, including regional, national, and international networks.'' Consortial arrangements in the Orbis-Cascade regional system offer Summit, a resource-sharing system which makes it possible to satisfy almost any book and most media request generated by the individualistic interests of students working on independent projects. The Summit system, which currently includes 35 academic libraries from Oregon and Washington, delivers resources within two or three days. Students also use many highly specialized materials from many more periodicals databases which have expanded the number of journal subscriptions Evergreen holds eight to nine times over the self-study period largely due the Cooperative Library Project (CLP), a state-funded resource sharing project among the four-year Washington State baccalaureates. Consortial purchases have reduced per-title costs dramatically and have strengthened areas of the curriculum not necessarily the focus of a core liberal arts collection. For example, psychology, education and business were heavily emphasized in the most recent round of shared purchasing by CLP. Finally, ILLiad, the on-line interlibrary loan system, brings journal articles to the mailboxes and email accounts of students within a few days (or even hours). There are almost no discernible limits to accessing published information for any researcher except those who need to present within 24 hours. Effective campus networks supported by Computing and Communications technical support staff make all this work possible. College-wide steps which have made efficient resource sharing and online information possible have included implementing the Banner student records system and establishing email as the official communications medium for students. ==Standard 5.C== Standard 5.C – Facilities and Access ''The institution provides adequate facilities for library and information resources, equipment, and personnel. These resources, including collections, are readily available for use by the institution’s students, faculty, and staff on the primary campus and where required off-campus.'' ===Availability of Information Resource Facilities (Standard 5.C.1)=== 5.C.1 ''Library and information resources are readily accessible to all students and faculty. These resources and services are sufficient in quality, level, breadth, quantity, and currency to meet the requirements of the educational program.'' For a description of facilities, see [[Media: Major_Faciities_List.doc |Major Facilities]] and Areas 1 & 2 of the Edutech [[Media:TESC_Information_Environment_Review.doc|TESC Information Environment Review]]. The Edutech [[media: TESC_Information_Environment_Review.doc|TESC Information Environment Review]] specifically considered networking, telecommunications and other information technology relevant to accessibility. The campus network was lauded as "solid and reliable." The network itself is described technically in Area 1 of the report. Expansion of wireless access from 75% to the entire campus was recommended; this work is proceeding and has the budgetary support to continue into the future. Most classrooms have been networked with display capability, spreading library and information technology access to large portions of the curriculum. This changes the presumptions of the faculty and students and greatly increases the frequency with which social software, digitized presentations and other multi-media information technology is incorporated in programs. The Edutech report also recommended establishing at least one dedicated teleconferencing space for general use, which is planned within the [[media: CNM.doc|Center for Creative and Applied Media (CCAM)]]. According to Eductech, "student access to computers at Evergreen does not seem to be a problem." ====The Information Technology Wing==== =====LIR Facilities and Services Visibly Interconnect===== With the generic library as a foundation and the interdisciplinary curriculum as the context, merged collections and services build upon an alternative past. Library and information resources thus collaborate actively across academic and administrative departmental boundaries. The major remodel, implementing a newly consolidated Information Technology Wing, substantially strengthened opportunities for connecting services, facilities and staff. One central, broad entrance now provides access to the Library, the Computer Center, Media Loan and the stairs to Electronic Media, Photo Services and Computing and Communications. See [[media: Consultant%27s_Site_Visit_Report_2004.doc | Consultant Pre-Remodel Report]] for an assessment of facility requirements produced before the project. For further detail, extensive documents describing the project are available in the documents room. =====More Teaching and Study Spaces===== The ideal of collaborative learning shaped the remodel. Shared study spaces predominate, whether open area study tables, grouped lounge furniture, pod-shaped arrangements in labs or small group study and media viewing rooms. Wireless access allows informal group work around personal or library-owned laptops. Additional laboratory spaces provide easier scheduling for program work and more computers for individuals when classes do not use the labs. Limited quiet study areas provide an alternative for the solitary scholar, at the same time that small group work is facilitated and encouraged. Overall, the Information Technology Wing has shed barren hallways and utilitarian desks in favor of lounge areas and comfortable study spaces. Overstuffed couches and chairs, large tables, task lighting, and more room for collections all contribute to the conviviality that informs shared inquiry. =====Hospitable Spaces and Blended Access===== Art exhibitions invite patrons into lounge and study areas and help define the library as a public space. The new basement lounge, affectionately dubbed the Library Underground, hosts frequent campus gatherings and public readings, although flooding (a new issue since the remodel) disrupted the area several times in 2006-07. Groups from across campus meet, study and teach in library spaces, which are open to all and where food and drink have always been allowed. The Sound and Image Library (SAIL) media collections are prominently located in the reference area, where SAIL staff work closely with the reference librarians. The newly established Assisted Technology Lab conjoins SAIL and has become a vital meeting place for students to work and show their art and media productions. Again, SAIL and reference staff provide service and technical support for ATL patrons. As the physical reference collection continues to shrink, reference, SAIL, the ATL, and Circulation will continue forming a more blended and prominent shared public presence. ====More General Access Lab Facilities==== Rapid developments in networked information technology have blurred between general and specialized technology labs. The main computer center includes many specialized scientific software packages such as ArcGIS and Mathematica, while common graphic manipulation software, such as Photoshop and Illustrator, appear in the CAL. Similarly, the Computer Center supports high-level statistics applications such as R as well as digital music editing. The library computers provide basic Office applications and general web access in addition to library-specific searches, but specific library computers also provide GIS, Dreamweaver, Photoshop, assistive/adaptive technology, and scanning applications while SAIL provides multiple stations for basic media dubbing, transfer and editing. Switching to a single user domain and sign-on mean simpler, more consistent access to networked resources across campus. The Digital Imaging and Multimedia facilities provide applications for advanced media production, but are open to all students. Some specialty labs have self-contained resources, such as large format printers or applications requiring more sophisticated hardware. However, the primary distinction among labs is the level of expertise and specialized knowledge of the staff. Students benefit when they know that the specialized character of a lab means there will be more skilled assistance as well. ===Cooperative Agreements (Standard 5.C.2)=== 5.C.2 ''In cases of cooperative arrangements with other library and information resources, formal documented agreements are established. These cooperative relationships and externally provided information sources complement rather than substitute for the institution’s own adequate and accessible core collection and services.'' Despite greatly expanded information access through Summit and shared purchasing agreements, the library continues strong support for the core collection within budgetary constraints created by budget cuts and inflation. Over time, Summit circulation data will provide specific reports on areas of the collection where students and faculty consistently or repeatedly demonstrate the need for more depth. Additionally, the Orbis Cascade consortium is working on shared collection development guidelines to help design complementary collections. See [[Standard_5#Collection_Development_Procedures_.26_Methods | Collection Development Procedures and Methods]] See [[Supporting_Documentation_for_Standard_Five#Formal.2C_written_agreements_with_other_libraries |Required Exhibit 11 Formal Agreements with Other Libraries]] ==Standard 5D== Standard 5.D – Personnel and Management ''Personnel are adequate in number and in areas of expertise to provide services in the development and use of library and information resources.'' ===Sufficiency of Staffing (Standard 5.D.1)=== 5.D.1 ''The institution employs a sufficient number of library and information resources staff to provide assistance to users of the library and to students at other learning resources sites.'' The chart below suggests that library and information resources staffing is similar to that of comparable public institutions, falling between the averages of peer public liberal arts colleges (COPLAC) and the larger regional universities in the state (WA State Public in the table below). Note that Evergreen and other public college library staffing averages are significantly below the staffing for groups made up largely of private ivies: DEEP (Documenting Effective Educational Practices); CTCL (Colleges That Change Lives) and CIEL (Consortium of Innovative Environments for Learning). {| cellspacing="0" cellpadding="0" border="1"| class="wikitable" |+'''Staffing Comparisons''' | Library || Professionals/FTE || Total Staff/FTE |- | TESC || 1.93 || 7.5 |- | DEEP || 4.65 || 16.32 |- | CTCL || 4.79 || 14.71 |- | CIEL || 5.51 || 13.43 |- | COPLAC || 2.67 || 8.55 |- | WA Regionals || 1.41 || 5.62 |} (N.B. The staff count for Evergreen has been halved in recognition that approximately 50% of Library and Media Services staffing is devoted to Media Services production, instruction and equipment check-out. At other institutions, these services, if they are offered at all, reside in academic departments such as Media Arts or Education.) Source: IPEDS 2006 (See [[Media: DEEP_2006.xls | DEEP 2006]]; [[Media: CTCL_2006.xls | CTCL 2006]];[[Media:CIEL_2006.xls | CIEL 2006]]; [[Media: COPLAC_2006.xls | COPLAC 2006]]; [[Media: WA_state_public_2006.xls | WA State Public 2006]]) The Edutech [[Media: TESC_Information_Environment_Review.doc | Information Environment Review]] discusses staffing in Area 3. The report shows staffing when compared to similar institutions in terms of size, mission and culture, to be average. Because library use at Evergreen compares favorably to more heavily staffed private liberal arts colleges and because all areas sustain a substantial instructional role, there are areas of strain. The rapid expansion of technology-driven services and collections also creates stresses, despite reallocation of staff as media and technologies shift. Following are the primary areas of concern: * Support for rapidly expanded classroom technology, an additional demand on top of general institutional growth * Staffing for greater focus on curriculum planning and engagement with faculty in Academic Computing * Staffing to support expanding electronic library resource collections (ordering, contracts, management, evaluation, etc.) * Weakened presence of faculty librarians due to the loss of one line in budget cuts during the self study period ===Staff Qualifications (5.D.2)=== 5.D.2 ''Library and information resources staff include qualified professional and technical support staff, with required specific competencies, whose responsibilities are clearly defined.'' The balance of librarians to other library staff is weighted toward non-professionals, when compared to other liberal arts college libraries. Further, as librarians rotate into the full-time curriculum, they temporarily leave behind reference work, management, administration, and collection development. Any sustained work, such as web-page development, is interrupted by these regular absences. Further, full-time teaching faculty rotate into the library as neophytes who need training and who present with widely disparate skills, abilities, and ambitions. Beyond the system of rotation, with its concomitant duties, librarians are contractually obligated to participate in college governance, curriculum planning, not to mention their own scholarly projects and sabbaticals. Librarians have nine-month contracts and several are absent during the summer sessions when the Library is minimally staffed. These organizational facts mean that Evergreen has no managerial class of librarians. Instead, the team of faculty librarians share management with staff. Paraprofessionals head almost all departments, including Circulation, Government Publications, Periodicals, Technical Services, and Acquisitions. Their year-round presence and regular workdays provide consistency for development of services, maintenance of collections, public service, and supervision of both classified staff and students workers. In this collaborative environment, staff often lead the way in adopting new services. The tremendous commitment by the staff grounds the Library and makes it an ideal teaching environment. Most library faculty carry both subject and library masters credentials in order to support their teaching as well as their role as professional librarians. See [[Supporting_Documentation_for_Standard_Five#Vitae_of_professional_library_staff | CVs of professional library staff]] As if the case with librarians, many media staff and instructors also carry additional graduate training. Graduate degrees noted by staff other than librarians include three MPAs, two MFAs, an MA in art history, an MEd and EdS, an MSE (Technical Engineering), an MS in Chemistry, and an MS in Computer Information Systems. The library faculty, who's role requires substantial attention to teaching and governance outside of the Library, must depend upon Library staff as managers of major services and functions within the Library. Highly experienced staff with significant levels of responsibility keep the library not just open, but anticipating and embracing change and new opportunities for service. See [[Standard_5.B#Modes_of_Instruction_in_Media_and_Academic_Computing |Modes of Instruction in Media and Academic Computing]] for a discussion of media instructors as artists and teaching faculty. In the realm of technical support, the Edutech report recommended assigning "staff responsibilities more specifically." More specific responsibilities and positions have been implemented in Technical Support Services. In the smaller units which provide distributed service and instruction such as the CAL, Academic Computing and Media Services, this stricter delineation of support functions is not as clearly appropriate. Instead, it is often valuable for staff to be able to work on all or most aspects of the instruction or service required, in direct communication with the student, staff or faculty who needs help. For example, the liaison system in Academic Computing assumes that in most cases a faculty member will receive all aspects of support from one liaison, or that liaison will coordinate the support and instruction required. All staff and faculty have engaged new skills as the information technology evolves. Multiple reclassifications have assured that staff job descriptions and pay scales match new expectations for technological expertise. Staff have also shifted the location of their work partially or in its entirety as budget cuts and new programs such as Summit and Illiad have changed where the greatest stresses occur. Increased emphasis on technology in many positions have lead to reclassifications and increases in salaries for some staff, resulting in compression of salaries for some managers. A campus-wide study of exempt salaries is expected to address this issue. ===Professional Growth (5.D.3)=== 5.D.3 ''The institution provides opportunities for professional growth for library and information resources professional staff.'' The library faculty are fully funded for professional activities through the central faculty professional development funds and policies as well as through faculty institutes. See [http://www.evergreen.edu/deans/profdevelopment.htm Faculty Development at Evergreen] See [http://www.evergreen.edu/policies/policy/professionalleave Professional Leave (Faculty Handbook 6.1)] See [http://www.evergreen.edu/policies/policy/professionaltravel Professional Travel (Faculty Handbook 6.2)] See [http://www.evergreen.edu/policies/policy/facultydevelopmentactivities Faculty Development (Faculty Handbook 6.3)] The remaining library and media services staff may request up to $500 annually from a pool of $2500. The Library has requested additional funding to bring the maximum benefit up to $750 in order to be consistent with the rest of Academics, but this funding has not been granted thus far. Non-state funds from the Friends of the Library have been allocated for retreats and other staff meetings in order to compensate for some of this differential access to professional development funds. Computing and Communications allocates in excess of $40,000 per year to support attendance of technical staff at technical conferences and trainings. These trainings provide an opportunity for staff to expand their skills with current technology; increase their knowledge of new and advancing technology; and connect with peers from other institutions and experts in specific technologies. These training opportunities are critical to the team’s ability to support teaching and learning and to provide management of the college’s administrative systems. See [[Media:CC Training spreadsheet.xls | CC Training Spreadsheet]]. ===Organizational Structure (5.D.4)=== 5.D.4 ''Library and information resources and services are organized to support the accomplishment of institutional mission and goals. Organizational arrangements recognize the need for service linkage among complementary resource bases (e.g., libraries, computing facilities, instructional media and telecommunication centers).'' The fundamental organizing principle of library and information resources at Evergreen is that an interdisciplinary curriculum demands integrated services. Beyond that, the founding vision aspired to provide all media, in any location. Contemporary networked technology and the expectations of students now create a climate in which barriers between different informations can and must be dissolved. For all these reasons, blended resources, facilities and services predominate throughout Standard 5. See [[Standard_5#The_Founding_Vision_of_the_Library:_Any_Medium.2C_Any_Location|The Founding Vision: Any Medium, Any Location]] See [[Standard_5#The_Information_Technology_Wing|The Information Technology Wing]] ====Shared Technology Creates the Need for More Shared Work==== Today, media applications, once physically limited to Media Services, are located, maintained, taught and used throughout the facilities administered by Academic Computing and, to a degree, the Library. Similarly, library resources, once physically limited to the library building, are found anywhere within reach of the web. Public computers, once found only in the Computer Center, are everywhere, as are privately owned laptops. These shifts have accelerated over the past ten years and have changed the instructional roles of the areas and their relationship to the curriculum. Undoubtedly, library and information resources will continue to distribute their budgets, facilities and staff to continue expanding access to information technology in academic programs and for individual students. As technologies have changed, so have the relationships among the Library, Media Services, and Computing, which now share in the communal project of interconnecting, teaching and supporting our information and technological resources. At this juncture, there seems little point in redesigning the administrative structures that oversee these areas because new relationships and responsibilities have evolved organically, based on need, demand, and interest and will continue to do so. In order to make sure that these effective working relationships continue to develop, reinforcing connections such as joint staffing, deliberately planning together, and continuing involvement across the areas when hiring for new staff and particularly administrators must be emphasized. The Edutech [[Media: TESC_Information_Environment_Review.doc | TESC Information Environment Review]] suggested that the existing distributed structures were valuable, but recommended greatly enhancing the role and formal responsibilies of the ITCH in order to assure better planning in consonance with the mission of the college. See 5.E for fuller discussion of this recommendation. Edutech did not capture the centrality of the teaching role in major portions of the information resources environment at Evergreen. It is teaching and its development which assures the most important connections between the academic mission of the college, the educational program and IT services of all kinds. While the Library and Media Services collaborate, as a matter of course, with Academic Computing, the real challenge remains: How to more thoroughly engage the teaching faculty across the curriculum in defining the role of information technology in the academic careers of our students. ===Engagement in Curriculum Development (5.D.5)=== 5.D.5 ''The institution consults library and information resources staff in curriculum development.'' See [[Standard_5#Collection_Development_Procedures_.26_Methods | Collection Development Procedures & Methods 5.B.1]] ===Library and Information Resources Budgets (5.D.6)=== 5.D.6 ''The institution provides sufficient financial support for library and information resources and services, and for their maintenance and security.'' Similar to staffing levels noted above, the library is well-funded compared to other regional public baccalaureates in the state (WA State Public in the table below) and peer public liberal arts libraries nationally (COPLAC in the table below). This comparatively rich funding reflects a historical recognition of the demands of open inquiry and independent research and the centrality of library research in a liberal arts education. Both funding and use rates closely match those of the private liberal arts libraries which predominate the DEEP (Documenting Effective Educational Practices), CTCL (Colleges That Change Lives) and CIEL (Consortium of Innovative Environments for Learning) peer groups. Thus the general funding level for the Evergreen Library compares closely to that of institutions with similar missions, services and roles within their institutions. For further discussion of the role of libraries in liberal arts colleges see [[Standard_5#Comparing_Use_Statistics_With_Other_Libraries | Comparing Use Statistics With Other Libraries (5.E)]]. On the other hand, the Library budget reported below includes Media Services (approximately 50% of library staffing falls into this category). Most libraries do not include any of the functions of provides by Media Services at Evergreen. Instead, these functions, including media instruction, media production facilities, media production to support college activities and portable media production equipment check-out, if offered at all, would be part of an academic department such as Education or Media Arts. If Media Services costs and services were not considered, then budgets are close to those of other public institutions, while use statistics are comparable to private liberal arts institutions. {| class="wikitable" ! Library ! FTE ! Circulation+ILL/FTE ! Expenditures/FTE |- | '''TESC''' | '''4153''' | '''31''' | '''$782''' |- | DEEP Colleges | 2046 | 18 | $829 |- | CTCL | 1506 | 23 | $859 |- | COPLAC | 3742 | 16 | $464 |- | CIEL | 7042 | 25 | $794 |- | WA State Public | 11,415 | 15 | $373 |} Source: IPEDS 2006 (See [[Media: DEEP_2006.xls | DEEP 2006]]; [[Media: CTCL_2006.xls | CTCL 2006]];[[Media:CIEL_2006.xls | CIEL 2006]]; [[Media: COPLAC_2006.xls | COPLAC 2006]]; [[Media: WA_state_public_2006.xls | WA State Public 2006]]) As budget cuts have reduced both staffing and collections, diversified revenue sources have become a high priority for Library Administration. Generous biennial infusions from the central Academic Budget have withered since earlier study periods. Indirect funds from activity grants to the faculty, major gifts from donors, book sales, and fines for lost or destroyed books have all increased to make up important non-state sources for collection development. The development of facilities and programming have been supported through major donors with the Library Dean and the campus fundraisers focusing significant attention on these efforts. The Edutech [[Media: TESC_Information_Environment_Review.doc| TESC Information Environment Review]] discusses budgets in Area 4 and compares Evergreen to similar schools on the basis of physical environment, enrollment numbers, education goals and aspirations, residential nature, tuition, and governance structure and determined that Evergreen devotes considerable resources to IT and is consistent with its peers in that regard. In 2005, Evergreen’s expenditure on IT—expressed as a percentage of total institutional expenditures—was 6.7%. This percentage aligns with the 6.7% reported by Computing in a 2006 survey of public four-year colleges. The average for all institutions was 6.5%. Generally, IT is funded comparably to institutions with similar missions and culture. The report recommended that budget processes should be addressed which take into account the heavy demands upon replacement, operation and maintenance as IT becomes ubiquitous in the classroom as well as labs. See [[Supporting_Documentation_for_Standard_Five#Comprehensive_budget.28s.29_for_library_and_information_resources |Comprehensive Budget (Required Exhibit 9)]] ==Standard 5.E== Standard 5.E – Planning and Evaluation ''Library and information resources planning activities support teaching and learning functions by facilitating the research and scholarship of students and faculty. Related evaluation processes regularly assess the quality, accessibility, and use of libraries and other information resource repositories and their services to determine the level of effectiveness in support of the educational program.'' ====Evaluating Information Services and Collections==== Assessments of Evergreen's library and information resources confirm support for the academic mission of the college as a public liberal arts college which expects a substantial number of students to engage in self-selected independent inquiry. Utilization patterns among Evergreen students correlate closely to the intensive use found among library arts colleges as opposed to lower use rates found among more comprehensive institutions. =====Comparing Use Statistics With Other Libraries===== In 2002, Washington's four-year public baccalaureate institutions implemented the Cascade resource sharing consortium. This start-up provided an amazing new service and also an opportunity to assess how rapidly a major new service might be implemented. Evergreen patrons borrowed 9,723 during the first year, more than any other library, even though Evergreen was by far the smallest institution in the consortium at that time. Although ten times bigger than Evergreen, the University of Washington borrowed just under 7,000 items during that first year. The quick acceptance of Cascade testified to the efficient connection between the library, library instruction and the teaching faculty and curriculum at large. Cascade became Orbis/Cascade as the Washington and Oregon academic consortia merged. The new on-line resource sharing service, entitled Summit, provides ongoing comparative statistics. To continue comparison within the original members of Cascade, in 2006, Evergreen borrowed 4.52 per FTE; almost 4 times the next heaviest user at 1.15 items borrowed per student. Although one might assume that small collection size drives this higher demand, the fact is that the Evergreen collection circulates at a high rate per student as well, according to federal IPEDS data. IPEDS data for 2006 also provide the opportunity to compare use statistics of liberal arts colleges with Evergreen and with small masters level universities (Carnegie Class Masters I), where strong distinctions appear again. When both circulation and interlibrary loan are counted, Evergreen circulates 31 items per FTE, liberal arts colleges national average 24 items per FTE and the Masters I institutions circulate 8.34 per FTE. The same dramatic distinction between liberal arts colleges and comprehensive institutions appears in the Summit consortium, which covers a full gamut of colleges and universities in Oregon and Washington. The following table lists the heaviest users from the member libraries, based upon their rates of use per FTE in 2006. Evergreen places high on the list, among the most highly ranked liberal arts colleges, all well above usage rates at more comprehensive institutions. {| class="wikitable" ! Library ! # Items borrowed ! FTE ! Items/FTE |- | Reed | 20,480 | 1,268 | 16.15 |- | G. Fox U. | 14,427 | 2,392 | 6.03 |- | Marylhurst | 4,548 | 852 | 5.34 |- | Lewis/Clark | 14,386 | 2,953 | 4.87 |- | '''TESC''' | '''16,118''' | ''' 4,200''' | '''3.84''' |- | Whitman | 6,672 | 1,803 | 3.70 |- | Willamet | 9,164 | 2,511 | 3.65 |- | UPS | 7,570 | 2,742 | 2.76 |- | Seattle Pacific | 8,589 | 3,466 | 2.48 |- | Linfield | 5,354 | 2,331 | 2.30 |- | Western Ore. | 8,623 | 3,992 | 2.16 |- | U Portland | 6,764 | 3,211 | 2.11 |- | U Oregon | 38,796 | 18,880 | 2.05 |- | E. Ore. U. | 4,620 | 2,306 | 2.00 |- | Pacific U. | 4,232 | 2,341 | 1.81 |} (Source: [http://www.orbiscascade.org/staffhome/Borr_stats,06FY.htm | Summit Borrowing Statistics FY06]) Thus it is clear that, as of 2006, Evergreen library utilization mirrors the practices of liberal arts colleges. High use rates also seem to reflect an academic emphasis on major student projects. For instance, Reed College, which requires a senior thesis, circulates or borrows 120 items per student. On the other hand, looking ahead, ''academic library use patterns are in a period of dramatic change.'' In 2007, the University of Washington implemented WorldCat Local which provides immediate click-though prompts, leading the user from local catalog to Summit to some journal databases, periodical holdings and interlibrary loan if appropriate. Summit use at the University of Washington doubled since implementation and interlibrary loan has also increased steeply. A large increase in borrowing at the University of Washington drives lending rates throughout the Summit system, but even more important, it suggests that discovery tools will dramatically increase usage without change in the library instructional program or academic practices. The Orbis/Cascade consortium will be implementing WorldCat as the shared Summit catalog soon and many libraries in the consortium will undoubtedly implement WorldCatLocal as their local library catalog as well. =====Library and Computer Center Use & Satisfaction Rates===== The comparative data above demonstrates that library and information resources are comparatively well-utilized. While high rates of use suggest something about effectiveness, surveys of popularity (frequency of use and satisfaction with use), provide further affirmation. Institutional Research routinely surveys alumni and students about campus resources. A summary of campus resource utilization (See [[Media: Alumni_Surveys_2002-2006_-_Campus_Utilization_Statistics.pdf | Alumni Surveys 2002-2006 - Campus Resource Utilization]]) shows that over the six year period, the Library and the computing facilities have been the top two most used campus facilities, trading off for first place. Alumni who were somewhat or very satisfied with the services have reported in at between 87% and 92% over the period surveyed. Starting in 2006, the [[media: Evergreen_Student_Experience_Survey_2006_%E2%80%93_Campus_Resources_Utilization_%E2%80%93_Olympia_Campus_Students.pdf | Evergreen Student Experience Survey (ESES)]] included questions about using library resources online and found that 85.2% of respondents use online library resources. Internal records also suggest phenomenal growth in online use of library resources. In 2000, when the library subscribed to three aggregate journal databases (Proquest, Ebscohost and JSTOR), users conducted 80,000 searches. In 2007, among approximately 30 subscription databases, there were well over 250,000 searches. Careful review of variations of use from year to year reveals the direct impact a fluid curriculum has on database use. For example, Modern Language Association International Bibliography statistics are quite erratic; one major project in a large academic program explains a five-fold increase of use in one year. As JSTOR has developed into a more deeply and broadly multi-interdisciplinary tool, use statistics show a shift away from heavy dependence on the less scholarly aggregates. Extensive lobbying by faculty and librarians encourages this shift toward use of scholarly resources such as JSTOR. Use statistics for periodicals and databases drive selection and instruction planning. When use statistics are low for a database seen by the library faculty as critical to a discipline or of particularly high academic value, then library faculty focus instruction on that database whenever appropriate. =====Media Services User Surveys===== The [[media: Alumni_Surveys_2002-2006_-_Campus_Utilization_Statistics.pdf | Alumni Survey]] added Media Services to its survey of campus resource utilization starting in 2004. Since then, Media Services has been listed as the fifth post utilized resource. Alumni reported being somewhat or very satisfied at a rate of 89% and 90% in the two years of survey. The [[media: Evergreen_Student_Experience_Survey_2006_%E2%80%93_Campus_Resources_Utilization_%E2%80%93_Olympia_Campus_Students.pdf |Evergreen Student Experience Survey (ESES) of 2006]] asked students about their use of Media Services, which showed 48% use of Media Loan and 89.6% somewhat or very satisfied. A survey designed and implemented by staff member Lin Crowley supplemented this data. Crowley’s respondents reported an average satisfaction level for each service ranging from 3.07 to 3.62 (out of 4), which indicated that those who used current services were generally fairly satisfied with each of the services that they use. Although respondents to Crowley’s survey were predominantly active Media Services users, many respondents were uninformed about some services. Respondents supported investment in new digital technologies, but most were unaware of new or planned digital facilities. One clear conclusion of the survey is that visibility and access could be better for some services. Suggested improvements often focussed on access, whether longer hours, more workshops or more facilities. The survey project director recommended that future follow-up surveys be conducted to compare whether the reasons people use each service change and to evaluate the satisfaction levels for each type of services by patron types. See [[Media : TESC_Media_Services_Assessment_Project.doc | TESC Media Services Assessment Project]] ====Evaluation of Teaching & Instructional Programs: Information Technology Literacy==== The strong focus on teaching throughout library and information resources suggests the following questions: 1) In a college without requirements, does information technology instruction reach enough students to assure that the vast majority of graduates develop their skills broadly in support of their inquiries? 2) Which students are taught? Do students receive their information technology instruction in an array of disciplinary and developmentally varied situations or is it happening only in pockets of the curriculum? 3) Is it working? Are students acquiring cross-curricular information technology, including media literacy? =====How many students are taught?===== Within recent years about 3,000 students attend program-based library instruction workshops annually. These statistics exclude most cases of repeated contacts with the same student and thus represent very broad coverage of the student body. From 2000 to 2007, Media Services offered a total of more than 1500 workshops to approximately 156 academic programs. This number does not include the thousands of quick proficiencies also provided by this area. The number of formal media workshops given and students reached in 2005 and 2006 were each more than double the numbers provided in 2000. Workshops have increased along with new technologies, especially in Media Loan and in the new Multimedia and DIS labs. Most instruction provided by the Academic Computing and CAL serves specific academic programs. These sessions are represented in the following table: {| cellspacing="0" cellpadding="0" border="1"| class="wikitable" |+'''Computer Lab Workshops for Academic Programs''' (cells represent academic programs/# of students) | Year || 2004-05 || 2005-06 || 2006-07 |- | Computer Center || 221/4423 || 171/3418 || 253/4880 |- | Computer Applications Lab || 50/1368 || 50/1248 || 52/1344 |- | Totals || 271/5791 || 191/4666 || 305/6224 |} Up until 2007, Academic Computing offered 30 to 40 general computer skills workshops per year in the Computer Center, attended by approximately 350 students annually. Professional staff focused these workshops on general technical skill building, independent of academic programs. Fewer students were attending these workshops over time, presumably because more students come to college with strong technical skills and with specialized self-determined needs for support. In response to waning attendance, Academic Computing redesigned the workshops as student-centered support sessions to which students bring their questions or projects. This student-centered structure should more effectively meet the specific demands of students. Computing will evaluate the success of this reinvented structure. All areas of library, media and computing find the strongest teaching and the greatest demand for instruction occurs in conjunction with programs. =====Which Students?===== The number of teaching contacts shows that library and information resources staff reach a large number of academic programs, but not which programs. End-of-program surveys conducted from 2001-2006 by the Office of Institutional Research and Assessment asked faculty, “Did your students use technology to present work, conduct research (including library research), or solve problems? If yes, How?” Not surprisingly, faculty answered that library/internet research skills were the most commonly used at 50%, followed by some form of presentation technology. Ninety percent of programs reported some substantial use of information technology. (See[[Media: Summary_of_Information_Technology_Literacy_Emphasis_in_Programs.pdf | Summary of Information Technology Literacy Emphasis in Programs]]) In 2006-07, questions were revised to more accurately identify programs where there was intentional focus on teaching ITL: "Did your program include activities to improve information technology literacy?" With this more restrictive language, 70% of programs reported including ITL. (See[[Media: End-of-program_Review_Results_for_2006-07_%E2%80%93_Information_Technology_Literacy_by_Planning_Unit.pdf | End-of-program Review Results for 2006-07 - Information Technology Literacy by Planning Unit]]) Further, in 2006-07, a follow-up question asked specifically which kind of technology was taught. Significantly different technologies predominate in different parts of the curriculum. No standard set of applications comes into play, although as of 2006/07 presentation technologies (at 42% of all programs) have increased by 70% over their use in the 2001-2006 reports and now begin to approach library and internet research in their prevalence at 50%. Online communication applications were reported by 32% of programs, an increase of 19% over the 2001-2006 data. Reservation-Based programs reported library and internet research at the highest rate, at 100% of programs, although this work was weakly connected to library instruction and therefore it is unclear whether academic library-supplied resources were used. At the other end of the spectrum, Culture, Text, and Language was lowest with 21% reporting library or internet searching. The remainder of planning units ranged between 43% and 50% library/internet use, with Core at the low end with 43%. The substantial move toward presentation media and online communication in programs drives increases in multi-media applications. Presentation technology and online communication applications encourage the use of still and moving images, sound clips, graphs and charts. They mix these media with traditional print communication written by students or linked from web resources. While these media and print applications involve basic, commonly used applications of information technology, they easily migrate toward more advanced media production. The increasing presence of multi-media information technology in Evergreen's learning communities drives further demand upon Media Services and upon Academic Computing, along with increased overlap of their teaching and service roles. Since its inception in the context of Holly’s generic library, Media Services has followed its mission to support media literacy and instruction across the curriculum. Over the last ten years, media services have changed dramatically as the personal computer has become the platform for entry-level media production and consumption. One measure of this change has materialized in how media staff have served programs through formal workshops since fall 2000. The scheduling data shows that almost 90% of formal program-based workshops serve Expressive Arts faculty. While this scheduling data does not cover equipment proficiency workshops or one-on-one instruction, both used more broadly across the curriculum, it is nevertheless clear that formal instruction by media staff focuses heavily on Expressive Arts programs, with an emphasis on advanced production applications, the exclusive provenance of expressive arts faculty. Media Services provides this advanced instruction in specialized labs, which were enhanced and expanded during the remodel. One effect of this specialization is that entry-level students have migrated to Academic Computing where the staff works in collaboration with media staff to provide instruction on entry-level media production applications. In fact, during fall and winter 2006-07, 68% of the faculty who requested workshops in Computer Center were from planning units other than Expressive arts, and many of these workshops included media instruction (Photoshop, Imovie, Flash, etc.). Just as in the Computer Center, the Computer Applications Lab also shows a trend toward more broadly used applications. Although the CAL has traditionally focused on the science curriculum in ES and SI, these users have begun to share their space with those who have less specialized demands. Roughly 60%-70% of the classes in the CAL now work with statistical or numeric analysis, primarily Excel, but also including Graphical Analysis, R, and SPSS. Ninety percent of CAL users prepare presentations, most often with Powerpoint, Word, Illustrator, and Excel. Approximately 60% of the programs meeting in the CAL still use analytical tools, including (in order of usage) ArcGIS, Mathematica, and Stella, which were once the focal point of all CAL applications. Science faculty have shifted their emphasis to on-site analysis, using advanced applications in specialized scientific labs in ways that parallel the shift in Media Services toward advanced applications. Meanwhile, the CAL and the Computer Center serve increasing numbers of students who seek instruction or support for the more and more powerful personal computing applications in media production, statistical analysis and presentation media. =====Does Library Instruction Result in ITL Gains?===== The Library, consistent with college-wide practices, rejects requirements and embraces students who engage in open inquiry and independent judgment. In this context, the Library supports a fluid curriculum and responds to changes that drive the needs and expectations of an innovative teaching faculty. Because the Library shapes teaching according to individual students, a fluid curriculum, and highly diverse pedagogy, standard or standardized assessment methods do not apply. Instead, the Library commits to the intensive and never ending task of recreating learning goals, student-by-student, program-by-program. Context is everything, which obviates the role of abstract standardized measures. On the other hand, the Library does engage in qualitative assessment, the descriptive characterization of ITL teaching and learning. As is the case throughout the faculty (see Standard 2.B.3, Engagement and Reflection), library faculty write annual evaluations of themselves and their library and teaching colleagues. They also engage in five-year reviews in which a panel of teaching colleagues discusses their work. These evaluations consistently address instructional aspirations, successes and failures. See [[Media: Reflections_on_library_instruction.doc | Reflections on Library Instruction]]. Further, under the leadership of the Office of Institutional Research, the librarians designed a project that assessed students as they worked through real research inquiries. The study, [[media: ActivityInfomationLiteracy.pdf |The Activity of Information Literacy]], documented the techniques and processes and even the thinking of several small samples of students as they collaborated intensively on research questions. The study showed that these particular students were stronger in their grasp of content than they were in their command of library research tools for their specific inquiries. In other words, a question about history might not lead them to Historical Abstracts. They were also strong in their ability to develop their research questions and to evaluate and synthesize the results. What these results suggest is that “Faculty may want to assess their students’ abilities to obtain information and offer tutorials or refer students to the Library when deficiencies are detected.” Beyond the immediate results, this qualitative assessment also suggested that the students benefited greatly when they collaborated. Certainly, this observation is corroborated by the gains that students make when they work together in skill building instead of in canned computer workshops outside of programs. Additionally, peer groups are widely used across the curriculum as a way to encourage students to develop research topics and individual projects. Given the results of the qualitative assessment and given the widely practiced use of peer groups, library faculty should seek ways to implement collaborative research activities when they link their instruction to programs. This model of cooperation would build on the more isolated collaborations that take place, as a matter of course, between librarians and students at the reference desk. An enlarged vision of this basic transaction—discussion, exploration, and brainstorming—will enhance the relevance and effectiveness of library teaching and workshops. =====Student Assessment of their ITL Learning===== The Evergreen Student Experience Survey asks questions which elucidate what the students themselves think they learned at Evergreen. In the 2006, the ESES asked "To what extent have your Evergreen experiences contributed to your growth in ... the following computer-related fields...?" Responses generally matched fairly well with the perspectives found in the End of Program surveys. For the category 'Studying or Doing Research via the Internet or other online sources": * 30.5% of Olympia campus students reported at least some contribution; * 47.5% reported quite a bit or a lot, for a total of 77.5%. * More than 84% of Tacoma students reported at least some, of which 50% reported quite a bit. * More than 93% of reservation-based students reported at least some contribution; 86.2% reporting quite a bit or a lot. Considering just how many students seem to express self-confidence in their research skills, and as the internet provides so many increasingly powerful tools for personal research, it is heartening to see that a good majority of students think that they developed their research skills as part of their education at Evergreen. The ESES 2006 also asked about "Using the computer for artistic expression (e.g. music, other audio, still images, animation, video, etc.": * Just over 42% reported Evergreen contributed "Some", "Quite a Bit" or "A Lot" * Fully 36.8% said "Not at All" * and 20.9% said "Very Little." The ESES 2006 surveyed use of non-artistic computer tools, asking about specific types of applications such as spreadsheets, GIS, web development, posters, or programming. In general, as was found in end of program reviews, no single type of computer application dominated. No application type was used by more than 50% of students; instead different types of applications were used by smaller subsets of the students surveyed. ===Participatory Planning (Standard 5.E.1)=== 5.E.1 ''The institution has a planning process that involves users, library and information resource staff, faculty, and administrators.'' ====Overall Planning for Collections & Services==== The fluidity of interdisciplinary and individual study defines Library services. The Dean of Library Services strengthens the ties between academics and the library and Media Services through meeting weekly with the provost, Associate Vice President for Academic Budget and Planning and the Academic Dean of Budget and the weekly academic deans meeting. Once a month, the Director of Computing & Communications and the Manager of Academic Computing also join the Academic Deans meeting. The interconnection of the instructional role with the planning and support functions drives the efficacy of all the services in these areas. In the Edutech [[Media: TESC_Information_Environment_Review.doc | TESC Information Environment Review]], Area 5 discussed planning and governance in the Evergreen information environment. The review was somewhat critical of the lack of coordination in support, planning and governance of IT across campus and advocated for a stronger role for ITCH, an organization which links library, media and computing managers and instructors. However, the report did not emphasize how the teaching function and role in Academic Computing, CAL and Media Services creates strong collaboration in all service and instruction design. Further, placing library and information resources within the larger ethos of the college, any major policy discussions or long-term planning processes invoke the participatory college-wide DTF structure. Budgetary processes are generally collaborative and include opportunities for review and input from the campus community. See [[Standard_1#A_Participatory_Decision_Making_Culture | Participatory Decision-Making Culture (Standard 1 Section 2.3)]] and Standard 6. The college budget process and schedule drives most mid-term library planning. The college budget process is described in [[Standard_7#7.A.3 |Standard 7 Section 7.A.3]] Additional opportunities for community contributions to planning include faculty who rotate into the Library who focus on collection development and other planning projects. An annual Reference Services Group retreat establishes the year's work before classes start in the fall. Faculty development reviews, also known as five-year reviews and faculty institutes provide opportunities for conversations across campus about a range of teaching, learning and service questions as they impact information services. The library internship program provided a reading seminar for several years within which library faculty, staff and interns could discuss changing information technology and its cultural meaning. Finally, the librarians often engage in faculty reading seminars, frequently focused on library issues, where shared thinking about the future of libraries evolves. ====Loose Structures and Responsiveness to Rapid Change in the Information Environment==== Among the organizations included in library and information resources, the Library is the largest and most embedded in tradition and thus may be the most invested in preexisting professional structures and assumptions. Additionally, a comparative lack of top-down managerial structures could lead to a tendency to stagnation in some environments. How well does the Library balance the competing demands of conservation, teaching, and technological adaptation and innovation? The success of the Library’s flat organization can be measured by the impressive way in which the Library group has responded to institutional and profession-wide changes and challenges. [[Media: Achievements.doc |Achievements]] describes major changes in services, faculties and collections implemented during the study period. Most of the changes are responses to opportunities provided by technological developments and external engagement in consortia. The consortia relieve any single library from much of the burden of research and develop into new technologies, an overwhelming burden for a comparatively small library such as Evergreen. Additionally, Evergreen's Library Administration and staff have worked actively in leadership roles in the Orbis-Cascade consortium to assure that the consortium supports efficient, cost-effective movement into the world of networked and shared resources. ===Planning Linkages (Standard 5.E.2)=== 5.E.2 ''The institution, in its planning, recognizes the need for management and technical linkages among information resource bases (e.g., libraries, instructional computing, media production and distribution centers, and telecommunications networks).'' ====Planning Across LIR==== With networked information technology and almost universal access to digitized academic information resources, coordination of planning across library and information resources has become increasingly critical. The information technology staff and librarians from across the administrative units engaged found that while administrative restructuring did not appear to provide a more effective connection among services, that it was nevertheless wise to imagine a new structure to foster collaboration. A cross-areas collaborative group entitled the Information Technology Collaborative Hive (ITCH) was created, which provides the most formal mechanism for collaboration around technology across the various parts of the college. Evergreen supports three ITCH groups: Academic, Administrative, and Core. The Academic ITCH meets at least once a month and includes professional staff from each of the primary technology labs, faculty, and interested students. The Academic ITCH coordinates general academic IT initiatives, helps develop general academic computing policy, and guides strategic planning. Professional staff members in each of the primary technology areas have developed strong connections to discipline-specific slices of the curriculum, faculty and academic administration. As ITCH develops, the members will explore ways to communicate and plan in cross-disciplinary and cross-divisional programs. ITCH provides one of the necessary cross-curricular and cross-division contexts for developing information technology across administratively distinct areas. Administrative ITCH plans for administrative IT support and Core ITCH acts as the coordinating body for all areas of IT represented in ITCH. ITCH created a strategic plan in conjunction with the campus-wide strategic planning process in 2007. Strategic Direction number 7 addresses technology. The statement is notable for the breadth of its concerns, with aspirations addressing media, library and computing technology: 7. Use technology to enhance teaching and learning and administrative support at Evergreen. Evergreen will intentionally foster secure, sustainable, flexible, easy-to-use, and accessible information technologies (IT) that support and enhance our teaching and learning philosophies and the administrative needs of the institution. Evergreen’s continuing commitment to technology and media literacies as critical components of a liberal arts education has led us to re-envision our Television Studio into a Center for New Media [now entitled the Center for Creative and Applied Media (CCAM)] that will provide cross curricular and extra curricular support for computer mediated production, performance, interactivity, teleconferencing, live broadcasts, digital image storage, processing, re-broadcasting and format conversion for all areas of the college. Accuracy and quality of information will improve and strong support will make technology and a broad range of information services available to on-and off-campus users. Security requirements of networks, software, hardware and data will be met while ensuring appropriate user access, including control of access to confidential information and the need for academic exploration. Classroom spaces will be technologically current and functional for meeting curricular needs. The complete [http://www2.evergreen.edu/wikis/itch/index.php?title=IT_Strategic_Plan|IT Strategic Plan Wiki] provides more detail. The Edutech [[media: TESC_Information_Environment_Review.doc |TESC Information Environment Review]] recommended a stronger, more formal role and status for ITCH, which has not found support from higher level administrators who have budgetary responsibility over the divisions of the college. This means ITCH continues to serve as a bottom-up structure of collaboration based on the experience of direct collaboration with and support for students, staff and faculty users. ====Continue Blending More Functions within Library and Information Resources==== Library and information resources support a surprisingly diverse infrastructure of technologies and media in the curriculum. For greatest efficiency, library and information resources should considered even more coordination across boundaries to provide technology support. Students should be able to move seamlessly between different areas, such as CAL, MML, and the Computer Center. Certainly, the pathways between areas could be more clearly articulated by identifying and developing more common services, including printing, building and maintaining image sets, server filespace, and common software. By taking better advantage of the network infrastructure, students will experience less confusion, and IT staff who directly support the curriculum could dedicate more energy toward coordinating, developing and designing IT strategies with academic programs instead of maintaining redundant infrastructures. Library and information resources could develop a shared perspective about their public presence. One possibility for representing blended facilities and services would be a central help desk for the Information Technology Wing. The shared entrance to the wing has become a prominent architectural feature and an opportunity to reshape the community’s understanding of what the areas collectively represent. A central help desk could provide basic information about facilities, services, and staff, and it would help facilitate how efficiently patrons move between the various floors of the wing. Continued attention to the best use of the Library Underground and how to assure its connection to other floors should be part of this process; a large, flexible teaching and gathering space is developing there and appropriate equipment will be needed to support that vision. Concurrently, assuring safe conditions for the adjacent Archives and Rare Books Collections are critical. Construction of the CCAM will begin soon. This project has distinct relevance to the changing roles of Media Services, the Library and Academic Computing within the evolving digital liberal arts. The CCAM will comprise a collection of media production studios and equipment to complement and complete existing Media Services and Academic Computing media resources and provide the primary bridge between the campus media infrastructure and networked digital resources. For a discussion of the CCAM and related curricular projects see [[media: CNM.doc | Center for Creative and Applied Media]]. ===Evaluation and The Future (Standard 5.E.3)=== 5.E.3 ''The institution regularly and systematically evaluates the quality, adequacy, and utilization of its library and information resources and services, including those provided through cooperative arrangements, and at all locations where courses, programs, or degrees are offered. The institution uses the results of the evaluations to improve the effectiveness of these resources.'' As part of an institution constantly engaged in processes of narrative evaluation and other forms of assessment, library and information resources engage in and are the subject of extensive assessment both within library and information resources and externally through Institutional Research and Assessment surveys and studies. In addition to formal annual processes such as budget building and annual library faculty retreats, the results of these assessments feed into the development of ongoing teaching and services through constant face-to-face interactions among faculty, administrators, staff and students which inform all operations. Institutional Research and Assessment, as cited throughout this report, provides annual surveys about library and information resources, several of which are broken down by campus. See [[ Media: Alumni_Surveys_2002-2006_-_Campus_Utilization_Statistics.pdf | Alumni Surveys 2002-2006 - Campus Utilization]] [[Media: Summary_of_Information_Technology_Literacy_Emphasis_in_Programs.pdf | Summary of Information Technology Literacy Emphasis in Programs]] [[Media: End-of-program_Review_Results_for_2006-07_%E2%80%93_Information_Technology_Literacy_Overview.pdf | End-of program Review Results for 2006-07 - Info Technology Literacy Overview]] [[Media: End-of-program_Review_Workshop_-_Information_Technology_Across_the_Curriculum.pdf | End-of-program Review Workshop - Info Technology Across the Curriculum]] [[Media: Evergreen_New_Student_Survey_2005_%E2%80%93_Computer_Skills_%E2%80%93_First-time%2C_First-years.pdf | Evergreen New Student Survey 2005 - Computer Skills - First-time, First-years]] [[Media: Evergreen_New_Student_Survey_2005_%E2%80%93_Computer_Skills_%E2%80%93_Transfer_Students.pdf | Evergreen New Student Survey 2005 - Computer Skills - Transfer Students]] [[Media: Evergreen_Student_Experience_Survey_2004_-_Information_Technology_Literacy_and_Technology-related_Resources.pdf | Evergreen Student Experience Survey 2004 - Info Technology Literacy and Technology-related Resources]] [[Media: Evergreen_Student_Experience_Survey_2006_%E2%80%93_Growth_in_Computer_Skills_%E2%80%93_Olympia_Campus_Students.pdf | Evergreen Student Experience Survey 2006 - Growth in Computer Skills - Oly Campus]] [[Media: Evergreen_Student_Experience_Survey_2006_-_Satisfaction_of_Olympia_Campus_Students.pdf | Evergreen Student Experience Survey 2006 - Satisfaction of Olympia Campus Students]] [[Media: End-of-program_Review_Results_for_2006-07_%E2%80%93_Information_Technology_Literacy_by_Planning_Unit.pdf | End-of-program Review Results for 2006-07 - Information Technology Literacy by Planning Unit]] ====Collections and Access==== The web presence of the library will, of course, continue to evolve. The library continues work on a new library front page and database search pages. It is likely that the new library front page will become the responsibility of the college-wide web team, freeing library staff from this unfunded work. A new federated search is being implemented. Meanwhile, the Orbis-Cascade consortium is migrating to WorldCat, which the library will consider for local use as well. A local catalog designed on the principle of web discovery tools can be expected to generate significant changes in library use. In this context, changes in staffing may be required to support increases in use of services such as Summit and Illiad and the content and focus of instruction may require substantial revision. Evaluation of service and instruction via peer comparisons will change, as discovery tools will generate higher uses without increased instruction. Instruction will likely need to focus even more on evaluating sources and finding those resources not easily located via discovery tools. The continued expansion of audio/visual media collections represents a critical part of the vision of the generic library. To that end, one-time funds have frequently been infused into a small base budget for film and sound recordings, and the collection has grown significantly. SAIL staff and selectors have emphasized both new titles and replacement of older formats and worn copies. The library anticipates circulating the collection through SUMMIT, which will increase wear. See [[media:SAILacq.xls|SAIL Acquisition Statistics]]. Selectors will continue a recent change of policy allowing the purchase of any medium from their funds allocated for print monographs, but a stable and larger allocation for the SAIL budget would lessen the need to do so and reduce variations in expenditures, workload and processing. The Resource Selection Committee is currently reviewing materials budgets with the intention of reallocating funds according to the curricular demands for video and digitized reference resources. If these discussions result in a larger budget for SAIL, there will be more work, but also more consistency. Additionally, the staff will be more deeply involved in researching web-based media collections. This additional workload represents a challenge for SAIL. Digital collection development should go forward in concert with the push to digitize archival collections, including photographs, video, and copies of faculty artwork. The CCAM will take the lead in this ongoing project. Because of the Summit and ILLiad systems, the core collections do not need to support individual students who engage in inquiries that lie outside the collection profile, based upon the core curriculum. However, Summit use will also allow the library to identify whether there are any consistent weaknesses in the collection that show up as subject areas driving high borrowing rates from other institutions. The data from SUMMIT should be analyzed over a three year period, due to the fluidity of the curriculum, at which point the library will decide if such data are useful in guiding collection development. The library will continue to take advantage of the significantly increased purchasing power created by consortial agreements for periodical and other database purchases. The library needs to keep an eye on the time and expertise required to keep up with the ever-increasing work of evaluating these agreements, purchases and contracts and the technical work to support electronic resources and may want to consider creating a position for managing electronic resources. A centralized specialist working on electronic resources would potentially help the selectors, by consistently researching and disseminating information about new products. Overall, long-standing assumptions about budgets for collections must be re-evaluated. While major cuts were made to the monographic budget early in the study period and were only partially restored over time, it is not clear that simply restoring those funds and adding funds for inflation are the desirable next moves. The Resource Selection Committee will need to continue to explore more flexible responses to a rapidly changing publishing environment in order to match collection budgets to evolving research needs. Private fundraising and other non-state funds have helped close collection development gap in some cases, such as the SAIL budget. Library and information resources overall have begun to receive private support for equipment and facilities projects as well. More work with the Office of College Advancement should be emphasized as many alumni have demonstrated willingness to support the library and information resources. =====Support for Rapidly Evolving Information Technology===== While the Edutech [[media:TESC_Information_Environment_Review.doc | TESC Information Environment Review]] gave Evergreen good marks for its budgetary support of information technology, the report also recommended that “to follow current best practices, the replacement cycle should be permanently funded and the operations budgets need to be raised regularly to reflect the increase in technology-equipped classrooms, the increased number of servers and desktop computers that must be supported, and other increases in the technology base.” The college has begun to address this issue, proposing permanent line items in the next biennium for replacing the core server and desktops. This movement toward more permanent allocations for replacement and repair will help ensure that the infrastructure can support the curriculum. Although ITCH can play only an advisory role, it has participated actively in the process of establishing permanent allocations, setting priorities, and sharing resources. The remodeled Information Technology Wing and the construction of Seminar II created dramatically more technology-equipped teaching spaces. There are now 49 media and computer-capable classrooms, with more on the way. Labs are equipped with computers for each student, and most classrooms now include a computer along with projection and display systems. The library plans to convert one classroom in the Library Underground to a lab, and teaching spaces on campus still without computers or display technology are on the way to being equipped. At this point, library and information resources just manages to support the computer facilities distributed across campus. As more spaces are computerized and enrollment creeps up toward the target of 5,000, the college will have to add additional staff and funding for maintenance. All capital construction and remodelling plans must include consideration of maintenance, replacement and support for media and networked display. As media technology has changed, some faculty choose to continue teaching older analog equipment, often for good pedagogical and aesthetic reasons. In the context of doubling instruction loads, this breadth of technologies generates a daunting challenge for Media Loan as they stretch to maintain, house, and teach a very wide array of portable equipment. Media Loan should work with the Expressive Arts faculty and other major users to reduce the range of Media Loan equipment necessary to support the curriculum. ====Library Instruction==== The reduced number of library faculty has resulted in less ability to provide library instruction deeply and broadly to the entire curriculum. Further, reference desk service has changed as the Internet creates patrons who access our resources from remote locations. Most immediately, virtual patrons do not benefit from the teaching that takes place at the reference desk, although the transactions that do occur at reference tend to be more substantive. As traffic at the physical reference desk has diminished, faculty who rotate into the library have more limited opportunities to learn about library resources through interactions with patrons. These trends should inform the reference group as they consider how to proceed in allocating team responsibilities with or without an increase in the number of library faculty. The reference group should evaluate service to areas of the curriculum that report or demonstrate less involvement in the various forms of information technology instruction (as reflected in end of program reports)and consider whether more or different instructional support would be appropriate, feasible or desirable. Library instruction will evolve in the context of catalogs which imitate web discovery tools. It is entirely likely that patrons will frequently discover services which have, until now, had to be pointed out to them. For the near future, however, finding and using the most effective, appropriate journal databases still requires instruction or intervention on the part of librarians or faculty. Evaluation of library instruction based upon comparative use statistics will probably be less valuable than in this past study period, as academic library finding tools will vary greatly for some time to come, creating widely disparate use statistics. Thus close attention to database use trends and their correlation to the implementation of new finding tools will be important in the near future. Intensive, embedded library and media instruction remain the most desirable and effective models. Some librarians focus on such models, including work such as evaluating bibliographies, which become the basis for assessing the quality of student research and the basis for further instruction. Faculty librarians may want to explore evaluating research results more commonly as they develop their ties with programs and faculty in all disciplines, particularly if discovery tools generate easier access to resources beyond the immediate catalog search. As librarians become more involved in each stage of research, including writing or production, they should be able to provide more consistent support to students. Time for this work with students is restricted by the number of librarians, as is time for the more extended work essential to students from Tacoma and Reservation-Based programs who depend so heavily upon off-campus access and who have less opportunity to confer with librarians at the reference desk. Faculty who rotate into the library must be more fully engaged in this aspect of the librarians' work in order to help balance the external teaching demands upon library faculty. When the Quantitative and Symbolic Reasoning and Writing Centers were planned into the new Information Technology Wing, the hope was for substantial collaboration. While the location of these centers within the library brings more students into the library, aids the sense of hospitality and provides convenient resources for the students using the Centers, collaboration has remained minimal. Thus opportunities for shared instruction and service have yet to be exploited. =====Cross-Curricular Information Technology Literacy===== As discussed above, library and information resources and the teaching faculty assure that information technology infuses the curriculum. On the other hand, the faculty has not embraced any particular set of information technology skills as fundamental to the liberal arts undergraduate at Evergreen. Instead, faculty choose and adapt information and media technologies according to the pedagogical and disciplinary requirements of their chosen inquiry. There is little work across the curriculum about critical approaches to media or basic definitions of college level technical literacy for the liberal arts. In the immediate future, library and information resources should invite the teaching faculty into a discussion about whether the campus has any broad consensus about ITL, including critical approaches. Long ago, the college committed to writing across the curriculum and allocated significant institutional resources to encourage that work—without proscriptive limits or standards. A wider discussion about ITL could produce a similar vision and institutional support. In the long run, such a vision will shape our understanding of digital scholarship in the liberal arts. The expansion of entry-level media technology instruction raises questions about the staffing assumptions in Academic Computing. If critical approaches to information technology are to be addressed and if cross-curricular information technology literacy is a priority for the contemporary liberal arts, then instructional staffing based on historical models of canned skills workshops may be insufficient. Academic Computing should continue current efforts to recruit instructional staff who have the expertise to work intensively in program planning and curriculum development as well as on technical support for those activities. The numbers of such instructional IT staffing may also need to be evaluated, in response to these new and expanding demands for work within the curriculum. ===Conclusion: Holly's Generic Library Has Come to Fruition=== Library and information resources have been deeply influenced by the organizational habits of the college, habits of collaboration, egalitarian ideals, fluidity, face-to-face interactions, non-departmentalization, reflexive learning, and independent and interdisciplinary inquiry. The result is a responsive, flexible, evolving set of services and resources. Library and information resources faculty and staff work across the media, regardless of where services reside administratively, in order to fuse traditional library services, information services, computing, and media. Library and information resources assess technology within the context of Evergreen’s particular curriculum and implement new applications incrementally in collaborative processes involving all three areas of service and the teaching faculty. As part of that work, library and information resources have had the distinct historical advantage of presuming that information comes in all formats and that it is not only possible but advisable to break down as many barriers as possible to access information in all its forms. In this, library and information resources are shaped by their founding vision, the generic library, an idea whose time has come. ===Standard Five Findings and Conclusions=== Findings: 1) Overall, library and information resources at Evergreen demonstrate effective development of collaborative planning, services, and instruction in support of the academic mission and educational programs of the College. 2.) Over the past decade the library and Media Services have fully committed to networking and digital resources. This shift has implied a change in organization, reorganization of job classifications, and the creation of new patterns of work supported in all areas. 3.) Commitment to the use of networking digital information resources has allowed and promoted the integration of all sections of library and information resources and has pushed the staff in all areas to reconceptualize their work and to find new patterns of organization and collaboration. 4.) Students and faculty are thinking about and using information resources in all media. They can now reasonably expect to have seamless access to a wide array of high quality academic information, media and computer applications almost anywhere on campus. 5.) The library is funded like a public college, but the emphasis on projects, the array of inquiries and the fact that the library is a teaching library means that the library is used as if it were a part of a private liberal arts college. Conclusions: 1.) The Evergreen library has always been what other libraries have strive to become: a '''teaching library''' deeply connected to the faculty and curriculum. The result is that students use the library very actively. Historically Media Services has had the same teaching focus. Academic computing, with a longstanding instructional role, is also moving toward more substantive, teaching and collaboration with faculty. This cross-curricular emphasis on teaching must be continued. 2.) The original vision of the library was "generic," which means that it includes all media in all locations. The contemporary term in the profession is the '''virtual library. ''' Evergreen's library and information resources have finally been able to realize the vision due to the advent of effective, ubiquitous networking and digital resources. The new technology plus major consortial agreements have created an explosion of access to high quality scholarly information and media. 3. The remodeled and more unified Information Technology Wing is the physical manifestation of the blending of traditional print, media and computer technology which characterizes the virtual library and information in the digital age. Despite being spread across administrative divisions, the library, media services, academic computing, CAL and Computing and Communications all collaborate effectively to assure more and more seamless access to information resources. We must guard these interconnections and continue to seek opportunities for collaboration that will provide the best service, teaching and efficiency. Commendations: 1.) The Library has through consortial agreements and wise use of its resources made available to the college an extraordinary array of high quality academic resources. For example the number of academic journals now available through the library is nine time larger than at the outset of the review. Active leadership in consortia such as Orbis-Cascade and the Cooperative Libraries Project have supported these cost-effective approaches. 2.) The willingness of the staff from all areas to share, collaborate and dream as they have worked through the complex reorganizations and new work necessary to create an operative virtual library, has been extraordinary. 3.) The creation of an accessible, integrated, well conceived teaching space with the renovation of the B and C wings of the library has allowed the virtual library to have a physical presence that embodies the integration of these areas while providing hospitable spaces and programming to complement virtual use information resources. 4.) The spread of digital media and computer facilities to the campus as a whole in the Lecture Halls and especially in the new classrooms of Seminar II as well as the extension of wireless access to most of the campus has allowed the teaching resources of LIR to be used all over the campus. 5.) Both the development of the virtual library and a continued commitment to extensive instruction have lead to effective library and information resources for off-campus programs and users. Recommendations: 1.) Library and information resources must maintain the flexibility in staff’s capacity to respond to the rapidly changing digital environment. 2.) Continue to remain aware of developments in information technology, critically assess them and carefully integrate technological capacities into staff’s capacity for teaching. 3.) Library and information resources should assure that connections between the three units that make up library and information resources are as seamless as possible in the experience of users. 4.) Media Services instructors should consciously promote considerations of media among faculty across the curriculum, as well as continuing to work effectively with those who depend upon media as the center of their work. 5.) Staff from all areas should pursue and develop cross-curricular faculty conversations about information and technology as literacies for the liberal arts, including critical perspectives. 6.) Assure that instructional staffing and library faculty hiring is sufficient in training and numbers to support extensive, integrated information technology literacy instruction across the curriculum and to off-campus and weekend and evening programs. 7.) Continue to develop maintenance, and replacement funds to support rapidly expanding information technology, instruction and service throughout the campus. Plans: 1.) Library, Media Services and Academic Computing staff and faculty will collaborate in planning ongoing summer faculty institutes facilitating cross-curricular faculty conversations about information technology literacy for the liberal arts. 2.) The shape of expenditures on collections should evolve as inflation, consortia, networked access and digital publications continue to change the information environment. The Library Resource Selection Committee will continue to review database, Summit and local collection use as well as allocation of non-state funds in order to appropriately support collections in all media. As a member of the Orbis-Cascade Alliance, the Library will pursue collaborative collection development emphasizing strong core local collections and coordinated shared collections. 3.) The substantial instructional role in the Library, Media and Computing which is necessary to support information technology literacy across the curriculum, should be recognized in campus hiring priorities. 4.) The Library, Media Services and Academic Computing will continue to emphasize shared work. Several areas of potential collaboration in addition to faculty institutes include considering a shared public presence at the newly emphasized main entrance to the Information Technology Wing, an increased role for ITCH in planning and management of information technology on campus, shared staff positions, shared hiring processes and more collaborative instruction for academic programs. == Standards == === [[Standard 5.A|Standard 5.A - Purpose and Scope]] === === [[Standard 5.B|Standard 5.B - Information Resources and Services]] === === [[Standard 5.C|Standard 5.C - Facilities and Access]] === === [[Standard 5.D|Standard 5.D - Personnel and Management]] === === [[Standard 5.E|Standard 5.E - Planning and Evaluation]] === == Supporting Documentation == See [[Supporting Documentation for Standard Five|Supporting Documentation for Standard Five]]
Return to Standard 5.
Retrieved from "http://wikis.evergreen.edu/selfstudy/index.php/Standard_5"
|
cc/2020-05/en_middle_0102.json.gz/line2128
|
__label__cc
| 0.647306
| 0.352694
|
A Buffalo jury unanimously awarded Howard A. Underwood, a disabled Genesee County operating engineer, $5.7 million for the career-ending spinal injuries he suffered when a poorly built crane he was taking apart collapsed on him fracturing his pelvis and causing multiple spinal injuries eight years ago. His attorneys said, Underwood has undergone surgery five times and currently is able to walk on his own only because a stimulator has been implanted in his spine to control the constant pain he experiences.
Following a six-week trial, a jury ordered the crane’s manufacturer, Bucyrus-Erie Co. of Milwaukee, and Underwood’s employer, Iroquois Rock Products of Brockport, to pay the Mumford man and his wife. During the trial, Underwood’s lawyers presented evidence of dozens of similar crane collapse accidents, some involving fatalities, over the past 25 years. They also discussed a 1974 Bucyrus-Erie memo showing officials knew of the collapse hazard involving connecting pins on its older cranes.
Though the jury determined Underwood’s injuries merited a $7.19 million verdict, it found Underwood 20 percent liable for the noontime incident at Iroquois Rock Products’ Brockport facility March 17, 1994, reducing his award, officials said. The jury found Iroquois Rock Products partly at fault for the accident, and attorneys for both companies are believed to be considering an appeal and counterclaims against each other, according to court officials.
|
cc/2020-05/en_middle_0102.json.gz/line2132
|
__label__wiki
| 0.977265
| 0.977265
|
3 sentenced to prison over Algeria concert stampede deaths
3 sentenced to prison over Algeria concert stampede deaths /node/1591051/middle-east
The stadium in Algiers where at least five people were killed in a stampede before a concert by Algerian rap star Abderraouf Derradji on August 22, 2019. (Reuters)
Five people aged between 13 and 22 were killed and more than 80 injured on August 22
The former head of Algeria’s public body for organizing concerts was sentenced to six months in prison
ALGIERS: An Algerian court has handed three people prison sentences for “negligence” over a deadly stampede at an August concert, a judicial source told AFP Thursday.
Five people aged between 13 and 22 were killed and more than 80 injured on August 22 when fans thronged an entrance of a stadium in Algiers where France-based rapper Soolking was performing.
Samy Benchikh, the former head of Algeria’s public body for organizing concerts, was sentenced to six months in prison, with three months suspended, a judicial source said on condition of anonymity.
The manager of a ticket company was handed six months in jail with four months suspended, and the same sentence was handed to the head of the company handling security at the event.
All three were charged with “negligence” after the court dropped manslaughter charges, the judicial source added.
Eleven security guards also on trial were released.
The incident forced culture minister Meriem Merdaci to resign and led to the sacking of Benchikh and Algeria’s police chief, Abdelkader Kara Bouhadba.
Soolking, 29, is a major star in Algeria, and his song “La Liberte” (Freedom) became a mainstay of the anti-government protest movement that has swept Algeria since February.
The choice of the August-20 stadium, one of the country’s oldest, to host the rapper’s sole planned concert in Algeria since his international career took off in 2018, was heavily criticized, in particular by families of the victims.
The day of the concert, large numbers of spectators were still waiting to enter shortly before the show began, and fears of not being able to enter reportedly sparked the stampede.
Topics: Algeria prison Stampede Deaths
Algerian court jails protesters over election
Algeria kicks off presidential campaign, 5 candidates to run
Will Turkey abide by provisions of Berlin Summit? /node/1615921/middle-east
Expert says sudden end to Ankara’s intervention in Libyan conflict unlikely
JEDDAH: With the conclusion of the Libya peace summit in Berlin on Sunday, it remains to be seen whether Turkey is willing to implement the provisions of the final communique and stay out of the conflict.
Ankara is accused of sending Syrian fighters to the Libyan battlefront in support of Fayez Al-Sarraj’s Tripoli-based Government of National Accord (GNA) against military commander Khalifa Haftar’s forces.
During the summit, French President Emmanuel Macron voiced concerns over the arrival of Syrian and other foreign fighters in Tripoli, saying: “That must end.”
Samuel Ramani, a geopolitical analyst at Oxford University, speculates that Turkey will not deploy more troops.
But he told Arab News that a sudden end to Ankara’s intervention in the Libyan conflict is unlikely for the moment as Turkish President Recep Tayyip Erdogan said his country will remain present “until the GNA’s future is secured.”
Noting the difficulty of enforcing the Berlin agreement, Ramani said Turkey might not be the first mover in breaching a cease-fire in Libya.
But he added that Turkey will not hesitate to deploy forces and upend the agreement if Haftar makes any moves that it considers “provocative.”
The summit called for sanctions on those who violate the UN Security Council arms embargo on Libya.
Turkish opposition MPs recently criticized the expanded security pact between Ankara and the GNA, saying the dispatch of materials and equipment to Libya breaches the UN arms embargo.
Until we see what specific cease-fire monitoring and enforcement mechanisms will be implemented and by which foreign powers, we don’t know what arrangements, if any, have been agreed upon.
Micha’el Tanchum, Analyst
The summit does not seem to have resolved ongoing disputes regarding the Eastern Mediterranean pipeline, a planned natural gas pipeline connecting eastern Mediterranean energy resources to mainland Greece via Cyprus and Crete.
The Cypriot presidency accused Turkey of being a “pirate state,” citing Ankara’s recent drilling off its coasts just a day after Brussels warned Turkey that its plans were illegal.
Erdogan dismissed the warning and threatened to send to the EU some 4 million refugees that Turkey is hosting.
Turkey dispatched its Yavuz drillship to the south of Cyprus on Sunday, based on claims deriving from the maritime delimitation agreement with the GNA.
Turkey’s insistence on gas exploration in the region may be subject to sanctions as early as this week, when EU foreign ministers meet in Brussels on Monday.
Aydin Sezer, an Ankara-based political analyst, drew attention to Article 25 of the Berlin final communique, which underlined the “Libyan Political Agreement as a viable framework for the political solution in Libya,” and called for the “establishment of a functioning presidency council and the formation of a single, unified, inclusive and effective Libyan government approved by the House of Representatives.”
Sezer told Arab News: “Getting approval from Libya’s Haftar-allied House of Representatives would be a serious challenge for Ankara because Haftar recently considered all agreements with Turkey as a betrayal. This peace conference once more showed that Turkey should keep away from Libya.”
Many experts remain skeptical about the possible outcome of the summit.
Micha’el Tanchum, a senior fellow at the Austrian Institute for European and Security Policy, said: “Until we see what specific cease-fire monitoring and enforcement mechanisms will be implemented and by which foreign powers, we don’t know what arrangements, if any, have been agreed upon.”
Topics: Turkey GNA Berlin summit
|
cc/2020-05/en_middle_0102.json.gz/line2136
|
__label__wiki
| 0.847525
| 0.847525
|
Close and try again
Research – Education
Other source
Send Note
Send article with e-mail
Friend e-mail *
Register to Send Note
News: Palaeontology
The illustration shows the wing of Alcmonavis poeschli as it was found in the limestone slab. Alcmonavis poeschli is the second known specimen of a volant bird from the Jurassic period. Credit: O. Rauhut, LMU/SNSB
by Archaeology Newsroom
15 05 '19 11:01
First birds: Archaeopteryx gets company
Alcmonavis poeschli
Archaeopteryx’s throne is tottering. Since the discovery of the first fossil of the primal bird in 1861, it had been considered the only bird from the Jurassic geological period.
Today’s birds are thought to be direct descendants of carnivorous dinosaurs, with Archaeopteryx representing the oldest known flying representative of this lineage. All of the specimens that have been found up to now come from the region of the Solnhofen Archipelago, which during the Jurassic era spanned across what is today the Altmühl Valley, in the area between Pappenheim and Regensburg. Archaeopteryx lived here in a landscape of reef islands about 150 million years ago.
A team led by Professor Oliver Rauhut has taxonomically identified a bird unknown until now: Alcmonavis poeschli, the second bird from the era identified as capable of flight. “This suggests that the diversity of birds in the late Jurassic era was greater than previously thought,” says Rauhut, paleontologist at the Department of Earth and Environmental Sciences as well as the Bavarian State Collection of Paleontology and Geology.
Only a wing of Alcmonavis poeschli was discovered. “At first, we assumed that this was another specimen of Archaeopteryx. There are similarities, but after detailed comparisons with Archaeopteryx and other, geologically younger birds, its fossil remains suggested that we were dealing with a somewhat more derived bird,” says Rauhut. According to the team’s taxonomic studies, which are currently featured in the scientific journal eLife, Alcmonavis poeschli was not merely somewhat larger than Archaeopteryx; apparently it could also fly better. “The wing muscles indicate a greater capacity for flying,” says Rauhut. Alcmonavis poeschli exhibits numerous traits lacking in Archaeopteryx but present in more recent birds. This suggests that it was adapted better to active, flapping flight.
The discovery of Alcmonavis poeschli has implications for the debate over whether active flapping birds arose from gliding birds. “Its adaptation shows that the evolution of flight must have progressed relatively quickly,” says Dr. Christian Foth from the University of Fribourg (Switzerland), one of the co-authors of the study.
The bird now being described for the first time derives its name from the old Celtic word for the river Altmühl, Alcmona, and its discoverer Roland Pöschl, who leads the excavation at the Schaudiberg quarry close to Mörnsheim. A fossil of Archaeopteryx was also discovered in the same unit of limestones. The two primal birds thus apparently lived at the same time in what was then a subtropical lagoon landscape in southern Germany.
1. Ludwig-Maximilians-Universität München
Nazca archaeological sites in danger near Ica, Peru ‘Invasores’ (‘invaders’) have taken possession of two large tracts of land in a protected area.
Mystery Solved: The Skeleton Lake of India A massive hailstorm must have killed the group of people whose remains -scattered around the shores of Rookpund Lake- puzzled archaeologists for over half a century.
'Cowboy builders' blamed for Rome's crumbling Colosseum An ambitious attempt to save Rome's Colosseum from collapse is being undermined by the authorities' cost-cutting decision to employ ordinary builders rather than specialists to perform the delicate overhaul, restoration experts have claimed.
Prominent educational institutions in 19th century Athens Varvakeion plays an important part among the public buildings of 19th century Athens, constantly appearing in various state documents and writings by architects. The present article examines the reasons for this interest.
The Zominthos Archive has been found 217 tripod vessels are recorded on the tablet that was found, with an ideogram next to the symbols depicting numbers.
RELATED BY TAG
Taking a deeper look at ‘ancient wing’ by Archaeology Newsroom
Dino dinner, dead or alive by Archaeology Newsroom
Μarble panel from Pantanassa monastery has conserved and exhibited by Archaeology Newsroom
Green in tooth and claw by Archaeology Newsroom
RELATED BY GEOLOCATION
Byzantine Coin Hoard Found in Deir el-Bakhit by Archaeology Newsroom
Cat Domestication in Egypt Pushed Back By 2,000 Years by Archaeology Newsroom
|
cc/2020-05/en_middle_0102.json.gz/line2139
|
__label__cc
| 0.52882
| 0.47118
|
News, Traffic, Weather
Traffic Slows to a Crawl as Snow Covers Roads
Update at 7:25 p.m. — A downed tree has completely blocked westbound Lee Highway near HB Woodlawn. Separately, a tow truck is on the way to assist a stranded ambulance on Washington Boulevard near the Navy Annex.
Update at 7:00 p.m. — Downed power lines and falling tree limbs are being reported throughout the area. Dominion is reporting more than 1,200 customers without power in Arlington. Dominion spokeswoman Le-Ha Anderson tells WUSA 9 that it may take more time than usual to restore power due to gridlock on local streets and highways.
Update at 6:10 p.m. — Traffic is at a dead stop on westbound I-66 from the District to Spout Run.
Update at 5:40 pm. — Stranded vehicles are being reported on Glebe Road near Chain Bridge and at Washington Boulevard and I-395.
Update at 5:30 p.m. — Treacherous conditions are reported on parts of Carlin Springs Road and Patrick Henry Drive. Via a traffic camera (above) we witnessed a car slide down Carlin Springs near Route 50 and nearly strike a pole. The car was eventually able to reverse and continue on its way.
Update at 5:15 p.m. — Westbound Washington Boulevard has been shut down at Sycamore Street.
Traffic throughout the county has slowed to a crawl as roads become increasingly snow-covered and as nightfall sets in.
Southbound I-395, westbound I-66, southbound Route 1, westbound Route 50, westbound Columbia Pike, Washington Boulevard and Glebe Road are jammed.
Numerous accidents have been reported throughout the county. Numerous hills have been reported to be impassable.
Police and firefighters report being delayed responding to calls due to heavy traffic.
Emergency responders have now been instructed to put chains on their tires to improve traction.
Previous Image 1/9 Next Image
breaking news heavy traffic severe weather snow
Traffic Grows Thick as Roads Get Slick
Snowy Scenes Along Columbia Pike
|
cc/2020-05/en_middle_0102.json.gz/line2141
|
__label__wiki
| 0.898439
| 0.898439
|
SecArmy looks toward FY21 budget as continuing resolution impacts priorities
By Devon L. Suits, Army News ServiceNovember 22, 2019
1 / 1 Show Caption + Hide Caption – Secretary of the Army Ryan D. McCarthy speaks at the American Enterprise Institute's think tank in Washington, D.C., Nov. 21, 2019. Congress was just passing another continuing resolution to fund the government until Dec. 20 and McCarthy said the lack of long-term funding could have a detrimental impact on operations, readiness, maintenance and modernization. (Photo Credit: Sgt. Dana Clarke) VIEW ORIGINAL
WASHINGTON -- As Congress passed another continuing resolution Thursday to keep the federal government open until Dec. 20, Secretary of the Army Ryan D. McCarthy said the lack of long-term funding is having a detrimental impact on operations, readiness, maintenance and modernization.
With no approved fiscal year 2020 budget, the Army had to freeze about $3.5 billion in modernization funds, which impacts close to 80 new programs, and about 40 production-line increases, McCarthy said during a presentation at the American Enterprise Institute.
"From a readiness standpoint, we are very concerned. We need to get [the budget] turned back on as quickly as possible," he said.
Expenditures in operational maintenance had to be reduced by 2%, McCarthy said. The buying power of battalion and brigade commanders is declining, which means fewer spare parts and not as many training repetitions.
"Time is the variable that you don't get back," he said. "Even if you get the [budget after Dec. 20], you just lost 90 days. In our business, you got to get every repetition before we get on an airplane and go do the nation's business."
FY 21 BUDGET TO CONTINUE MODERNIZATION
The lack of an approved FY20 budget has not stopped Army senior leaders from putting final touches on the fiscal year 2021 budget proposal, McCarthy said. Readiness, modernization and people continue to be the Army's top priorities for FY21 and the fiscal 2022 spending plan, he said.
"Over half of our balance sheet is focused on people and training," McCarthy said. "What you will see over the course of this next year is a focus on strategic readiness … [to include] emergency deployment readiness exercises for brigade-sized elements to Europe and East Asia, and the Defender series [of exercises]."
The Army is also in the midst of a significant transformation with the launch of the modernization enterprise, McCarthy said. In turn, the Army looks to "finish what it started," all while maintaining a level of trust and commitment between the force and the Office of the Secretary of Defense, Congress, industry, and other key stakeholders.
"We worked very hard to communicate … our intent," said McCarthy, during an engagement at the Thursday. "One of the greatest things I think we did --- we published a modernization strategy and then we put the money against [that priority].
Last fiscal year, the Army moved over $40 billion to help develop 31 signature systems across the force's six modernization priorities, he said. The force is slated to receive a wide range of prototypes over the next two years.
To pay for new technology, the Army has already backloaded funding in its five-year spending plan, McCarthy said, but added leaders will still need to engage in future "night court" processes to reshape the Army's balance sheet to completely fund future projects.
"If we're successful in these next 18 months and these prototypes deliver, you are going to need a lot of money to start bringing [in] … hundreds of these widgets into the formations," he said. The future year's defense plan "helps Congress manage expectations. It allows us the time to see if the stuff's going to work and then collectively come together and make an adjustment downstream."
NEED FOR TEAMMATES
While people are, and will always be the Army's most precious resource, the Army has recently seen an alarming increase in reported suicides and sexual assaults, McCarthy said.
"There are things that are tearing away the fabric of our institution. The only way that we can think of doing better is just by being better teammates," he said.
McCarthy and Army Chief of Staff Gen. James McConville are trying to set the example by exhibiting the right behaviors that help build a cohesive team. The two often eat lunch or workout together, McCarthy explained.
"Teammates look each other in the face -- teammates invest in each other," McCarthy said. "Some of those simple fundamentals of investing time in each other will help you improve and … understand who you're dealing with, so when [a teammate] has challenges, you are there for them."
STAND-TO! 2019 Army Modernization Strategy
Army News Service
ARNEWS Archive
Soldiers magazine features
January 13, 2020Usery earns AMC 'Top Employee' recognition
January 9, 2020Tobyhanna modernizes Army command centers
January 9, 2020Texas college students explore government job options with equipment testing unit
January 8, 2020Detroit Arsenal employee places in Department of the Army OPSEC Awards
January 7, 2020Single-elimination gaming tourney coming to Long Rec Center Jan. 11
January 7, 2020Army collaborates with FDA on advanced manufacturing, 3D printing
January 6, 2020The power of the purchase
December 23, 2019Crane Army modernizes deficient ammunition for warfighters
December 11, 2019Army modernization delivers capabilities to National Guard
|
cc/2020-05/en_middle_0102.json.gz/line2143
|
__label__wiki
| 0.572989
| 0.572989
|
Fort Wainwright forges a foundation toward solid sustainability
By Allen Shaw, Fort Wainwright Public AffairsApril 26, 2012
1 / 4 Show Caption + Hide Caption – (Photo Credit: U.S. Army) VIEW ORIGINAL
FORT WAINWRIGHT, Alaska -- (April 20, 2012) There is a movement to reduce, reuse and recycle and Bernie Karl, owner of K & K Recycling said, "Fort Wainwright is leading the parade." Karl spoke during the 2nd Annual Earth Day Celebration, April 20 at the Physical Fitness Center on post. "As far as I know, no other Army base comes close," he said.
The Army has a vision leaders call Net Zero. The premise is that the use of resources and production of resources equal each other. The Net Zero approach means reduction, re-purpose, recycling and composting, energy recovery, and disposal. Karl said the Fort Wainwright community should be proud of what is happening and the direction leadership is taking us. "Your recycled cardboard and paper, right now is producing the electricity being used on the installation."
The Installation Management Command has taken notice that Fort Wainwright is moving in the right direction and the Earth Day event was a celebration of partnerships forged to support sustainability.
More than 25 exhibitors filled the Physical Fitness Center with information tables, displays and plastic furniture made from recycled materials. Library Services provided a special story-time as Lt. Col. Robert Ericksen, United States Army Garrison, Fort Wainwright, chief of staff read, "The Three Questions" to an audience of children. They also provided activities that emphasized the need to reduce, reuse and recycle.
"This year's Earth Day Celebration was a huge success," said Andy McDonough, plans specialist, Plans, Analysis and Integration Office and event chairman. More than 200 people attended the event and participated in demonstrations, discussions and give-a-ways. He said, "Fort Wainwright and our partners highlighted what we do every day in support of Earth Day and sustainability."
The finale of the event was the signing of a Sustainability Proclamation by the local community leaders including the, Col. Ronald M. Johnson, Fort Wainwright garrison commander; Lt. Col. David K. Sieve, Eielson Air Force Base, 354th Mission Support Group, deputy commander; Luke Hopkins, Fairbanks North Star Borough mayor; Jerry Cleworth, Fairbanks city mayor and Doug Isaacson, North Pole city mayor.
The signing was followed by a cake cutting ceremony symbolizing a commitment to sustainability with community recycling leaders, partners and community leaders.
"There were many leaves added to our commitment tree which symbolized individual commitments from those who attended the event toward sustainability and Earth Day. It was their way to say "Me and Now" to our theme of "If not you, who and if not now, when," McDonough said.
January 16, 2020'Wolfpack' prepares for DEFENDER mission
January 16, 2020SDDC's Eight Readiness Levers
January 16, 2020Sustaining Aviation | Ensure critical sustainment capabilities are not overlooked
January 16, 2020Mastering Fundamentals: An interview with Gen. Michael Garrett
January 16, 2020Sustaining Fires | 2nd SFAB advisors help ANA improve maintenance program
January 16, 20208th TSC establishes favorable sustainment conditions by setting the theater
January 16, 2020Leadership perspective: People, mission partner synchronization focus of 2020
January 16, 2020Backbone of Deterrence: An Interview with Retired Lt. Gen. Ben Hodges
January 8, 2020Total package sustains foreign partners
December 23, 2019Santa delivers deployed Soldier home
|
cc/2020-05/en_middle_0102.json.gz/line2144
|
__label__cc
| 0.671134
| 0.328866
|
portfolio.
headshots.
weddings.
engagements.
in print.
we move lightly. >
landscapes.
the wilderness project.
the neighborhood.
Prints.
I am a New York transplant by way of Las Vegas, Indiana, and San Francisco. Since moving to New York, my photography has been my way of transcribing the magnitude of the city into smaller nuanced moments focussing on the transcendence and spontaneity of my new surroundings. The Wilderness Project is a further exploration, a psychological and sometimes anthropological study, of those themes translating vulnerability into an animal vocabulary exploring the dense and tangled wilderness of the city and its feral inhabitants. You can find the animals at their internet home here.
My work has been featured as an Editor’s Pick in Musee Magazine, Landlock Photo’s ‘Creatures of Habit’, Wordsmiths and The American Guide, covered on Flavorpill and Examiner, published in The New York Times, TimeOut New York, Brooklyn Magazine, American Theater Magazine, Dramatics Magazine, on the cover of Phil Pickens’ debut album Sweet Tea Circus and his most recent album Cathedrals on the cover of The Hollows’ live album Neverending Show, inside artwork for Bellhouse’s Capsized, exhibited at Other Voices Gallery in Las Vegas, PowerHouse Arena, Salt Space Gallery and Limner Gallery in New York and currently on permanent display at Prime Grill Steakhouse, the Alley, and the Dream Hotel in Manhattan.
Recently I designed the cover of poet Arrieu-King’s full-length, Unlikely Conditions through 1913 Press. This marks the second collaboration with Arrieu-King, having also designed the cover of her full-length manuscript Manifest through Switchback books.
The Examiner: The Wilderness Project Debuts in Las Vegas
Flavorpill: Ghostly photos of wild animals invading urban areas
my personal photo blog: britanniebond.tumblr.com
instagram: @britanniebond | @bbondphoto
for booking information and pricing please contact: bbondphoto@gmail.com
|
cc/2020-05/en_middle_0102.json.gz/line2145
|
__label__wiki
| 0.928928
| 0.928928
|
Media releases archive
BCA Welcomes Red Tape Reform Taskforce
Media Release Business Regulation
The BCA welcomed today’s announcement of a special taskforce to reduce red tape saying it was a first step towards addressing Australia’s regulatory blow-out.
The BCA has consistently highlighted escalating red tape on business as a major brake on future growth and has called for a significant overhaul on the way regulation is made. In its Business Regulation Action Plan released in May, the BCA highlighted that regulation in Australia is growing at 10 per cent per annum – three times as fast as Australia’s rate of economic growth.
BCA Acting Chief Executive Mr Steven Münchenberg said the formation of a high-level taskforce to examine and report on ways to reduce existing legislation and regulation on business and the community by January was both recognition of the problem and a constructive step towards addressing it.
Mr Münchenberg said it was encouraging that the government was now translating its willingness to address this issue into action.
“The taskforce is certainly a step towards stemming the tide of regulation that is threatening to swamp Australia,” Mr Münchenberg said.
“We also need to consider cutting off bad regulation at the source”, he said.
“This will necessitate fixing the systems that currently create regulation; making sure that all new regulation fully takes account of costs to business, avoids overlap and duplication with existing red tape and is subject to regular review.”
The BCA calls on state and territory governments to follow the Commonwealth’s lead and commence similar reviews of their own regulatory processes.
The BCA Business Regulation Action Plan found that regulation is growing at a remarkable rate:
In 2003, the Commonwealth and state parliaments added 33,000 pages of new law to the statute and rule books.
More pages of legislation have passed the Commonwealth Parliament in the 14 years since 1990 than were passed by Parliament in the preceding 90 years (in just 9 years, the current federal government has passed more pages of legislation than were passed between Federation and 1985).
In the four years from 2000 to 2003, the Commonwealth Parliament passed on average 350 pages of new primary legislation each sitting week or nearly 100 pages each sitting day.
|
cc/2020-05/en_middle_0102.json.gz/line2146
|
__label__wiki
| 0.95104
| 0.95104
|
University of Akron presidential finalist Dr. Scott Scarborough says colleges make dreams possible
Carol Biliczky
Scott Scarborough brought his message to the University of Akron on Wednesday � that higher education is a force for social good.
�It changes people�s lives in ways that few things can,� the No. 2 official at the University of Toledo told about 190 UA faculty, staff and students at a presidential forum. Universities make the American dream possible, he said.
Scarborough, 51, is the second of three finalists to come to campus in their quest to replace President Luis Proenza when he steps down in July to return to teaching.
Like UA did with University of Maryland Eastern Shore Provost Ron Nykiel on Monday, Akron put Scarborough through rounds of interviews with faculty, deans and others, as well as the public forum open to the wider campus community.
Steven Weeks, a biology professor who heads the Akron chapter of the American Association of University Professors, led the question-and-answer session with an issue near and dear to the hearts of his colleagues � that Scarborough upped faculty workloads at UT.
Scarborough responded in language that was eerily familiar to the UA audience � that UT was grappling with a budget shortfall and had to �right-size� the university, that it pursued other cost savings before turning to faculty.
The policy � it requires faculty to teach up to 12 credit hours per semester, less for those pursuing research � led to $5 million in cost savings, Scarborough said.
While the workload changes made a sizeable dent in a budget shortfall of more than $30 million, Scarborough said he would approach the process differently if he had to do it again.
He said he would communicate the issues more clearly in the beginning to reduce �people�s worst fears.� The level of anxiety was much lower at the end of the process than it was at the beginning, he said.
Both UA, with about 27,000 students, and UT, with 23,000, are urban, tax-supported universities.
Scarborough also expressed the worry that the federal government may be trying to solve its own financial problems on the backs of universities by developing metrics that would push money to the best performing colleges and universities and squeeze research funds to all.
That may require universities to �shore up� their own funding of research, become more strategic in what kind of research they pursue or form consortiums with other institutions, he said.
Like Nykiel before him, Scarborough said he had experience in all aspects of university administration. He said that any success he has had has been due to building teams composed of people with complementary skills.
His presentation brought compliments from members of the audience.
�I think he is a highly qualified candidate,� said Michelle Ellis, executive director of financial aid. �He�s in tune with what�s going on in federal aid programs.�
A faculty member, who declined to provide his name, said that Scarborough was �exceptional� in his off-the-cuff remarks but less so in his prepared remarks.
�He was very polished,� said Mary Verstraete, an associate professor of biomedical engineering, who questioned Scarborough about Honors Colleges for exceptional students.
�Support the new president, whoever that is,� Scarborough said in his closing remarks. �Be strong where he is weak. I certainly hope to see you all again.�
UA will conclude its open forums at 1:30 p.m. today with UA Executive Vice President Jim Tressel in the Student Union Theatre.
As were the forums for the first two candidates, the forum will be available for viewing at http://www.uakron.edu/bot/visit.dot#t.
As interest is unusually high in the former Ohio State coach�s bid to be president, UA has made arrangements with Cleveland television stations WKYC and WJW to provide pool coverage for today�s event.
Carol Biliczky can be reached at cbiliczky@thebeaconjournal.com or330-996-3729.
Subscriber Digital Services
Akron Beacon Journal ~ 388 S. Main St. Suite 720 Akron, OH 44311 ~ Do Not Sell My Personal Information ~ Cookie Policy ~ Do Not Sell My Personal Information ~ Privacy Policy ~ Terms Of Service ~ Your California Privacy Rights / Privacy Policy
Malcolm Abram
Rick Armon
Michael Beaven
Katie Byard
Kerry Clawson
Bob Dyer
Amanda Garrett
Betty Lin-Fisher
Doug Livingston
Jim Mackinnon
Phil Masturzo
Clint O'Connor
Mark J. Price
Marla Ridenour
Nate Ulrich
Stephanie Warsmith
Craig Webb
Home and Garden Decorator
|
cc/2020-05/en_middle_0102.json.gz/line2147
|
__label__cc
| 0.621967
| 0.378033
|
10 days in Ghana
I’m in Accra, Ghana now, back where this adventure started last week. It’s been wonderful and exciting, exhausting and not a little frightening. Let me provide an example that covers a single twenty-four hour period last week.
We have a “handler” named Asha. She works for Citizens Development Corps, which is based out of Accra, so she’s our only daily contact in Kumasi. Asha’s great: 23, urbane, well-educated, and a serious party girl. (I’ve nicknamed her “Brimful”, a reference she both likes and gets.) We talk music.
Asha has a friend who owns a club in Kumasi. I believe I found that fact out approximately 100 seconds before she had him on the phone and had procured an invitation for me to DJ there. So, last Thursday, not even a week in Ghana, I hauled my laptop over to Time Out for a truly impromptu set. (OK, it wasn’t the least prepared I have ever been, but it was close.)
Apart from having no Nigerian music on hand — whoops — and some uppity patrons miffed that karaoke night was being upstaged by an obruni (Twi: “whitey”), it was pure joy.
I started with standard (even clichéd) Western tunes, quickly sprinted to more contemporary beats, veered over to Adam Beyer and Talvin Singh, did my best not to maul a bunch of Ghanaian High Life music I have, then ended with a long set of trance to placate the Tiësto-craving Lebanese who were crawling all over the plexiglass in front of the booth.
In short it was an amazing high. The club owner woke me up with a phone call at 7 the next morning to ask me if I would do it again. Quite a compliment, despite the hangover from the free (hooch) gin he paid me in.
And now a photo interlude. I just love the gazes of these kids.
Schoolchildren in Bonwire, Ghana
The next day was a bit different. We were criss-crossing Kumasi on our way out of town to visit villages where traditional handicrafts are created. Talking to artisans and observing their trade in action was the first part of our task here (much more on which in a future post). It was thrilling.
As we were heading back into town for lunch our two Ghanaian colleagues in the front seat gasped and slowed the card down. Now, readers who have been to Ghana will know that no Ghanaian motorist ever gasps, blinks, slows down or really even cares. It is a massive deathrace free-for-all on the streets — a fact made laughable by the cheery Christian slogans painted on the back of nearly every car.
But gasp they did. Lying in the median of the street on the left side of our car, right outside my rolled-down window, was the dismembered corpse of a human being. It was a man. At first I thought it was a car crash victim, but as I looked closer I realized that he had been hacked with a long blade. It was perfectly obvious and completely nauseating, reminding me instantly of the way a roadside vendor had opened up a coconut for us the day before. The dead man’s head was flayed open from numerous machete blows.
But there was no blood on the street. This person had been murdered elsewhere, mutilated, and put out on show. A lynching. We pulled away and for several minutes the whole car was silent. I was shaking. Finally we tried to ask our hosts what in the hell we had just seen. They were upset too, though it was hard to tell exactly why.
They explained that crime was on the rise in the Ashanti region and that people were becoming increasingly unhappy with the sentences delivered by the court system. As such, vigilante murders were becoming more and more common as angry mobs sought to punish and deter crime. Obviously our hosts had no idea what crime this guy had committed — if he had done so at all — but that was their answer: vigilantism.
Fair to say that little episode annihilated any high I was riding from DJing the night before. I couldn’t shake the image, wished I hadn’t stared. We did little work the rest of the day that required lots of talking. No one really wanted to interact. That night none of us could sleep.
I suppose there’s an upside to being shaken so deeply. I’m much more sober about Ghana now. It’s still a wonderful and special place, but I think I can evaluate it more objectively now. The senseless horror of that corpse in the street (with children playing around!) pretty firmly knocked off the rose-colored glasses I had on.
In between these two poles of emotion are ten days of fantastic new experiences. I’ve uploaded all the photos to date and as much video as this poor bandwidth can handle. Here’s the full set, updated nearly daily.
Bear with me as I’ve not properly tagged or annotated most images yet (and some of them really require explanation). Also, most photos have no high-res version. Just too bandwidth-scarce over here. Will replace them when I am back home.
Stay tuned for a multi-part series on the visiting the artisan villages and documenting their work. Amazing stuff comin’.
2 Responses to “10 days in Ghana”
grondo says : July 22, 2008 at 4:13 pm
thanks for your note, be safe
Gareth Jones says : July 24, 2008 at 4:52 am
Wow, pretty heavy stuff. It’s interesting to read how you’re getting on over there but I wasn’t quite expecting that. One way of putting the differences between countries in perspective.
|
cc/2020-05/en_middle_0102.json.gz/line2153
|
__label__wiki
| 0.9912
| 0.9912
|
Posh Beckham to show in Singapore
Victoria Beckham will be showcasing her fall/winter 2015 collection at Singapore Fashion Week.
Leslie Kay Lim
Singapore Fashion Week (SFW) has announced more stars in its line-up this year.
British designer Victoria Beckham and Thai-American designer Thakoon Panichgul will showcase their fall/winter 2015 collections, while Hollywood A-lister Cate Blanchett and Hallyu actress Yoon Eun Hye will also grace the event.
The details were unveiled at a press conference yesterday for the event, which runs from May 13 to 17. The two names join American designer Diane von Furstenberg, whose opening show had been announced last month.
Beckham nabbed the Brand of the Year award at the British Fashion Awards and opened her first standalone store in London last year. Her chic and streamlined read-to-wear creations have won over the industry since the brand's beginning in 2008.
Fashion favourite Panichgul, who works under the label Thakoon and has won the Vogue/CFDA Fashion Fund award in 2006, has dressed celebrities including American First Lady Michelle Obama and French actress Marion Cotillard.
Singapore Fashion Week chairman Tjin Lee says that Beckham's inclusion will add to the girl power aspect of the shows, along with von Furstenberg.
"They're very different but have a huge amount of respect for each other," she says of the two designers. "They're equally inspiring women."
Panichgul's South-east Asian roots made him an attractive choice, adds Lee, saying "I love that he's a Thai designer, from our part of the world".
This year's revamped edition of Singapore Fashion Week, which takes the place of Audi Fashion Festival, aims to broaden the consumer-centric scope of the event to include talent and industry development.
It will introduce a new business- focused talent development programme called Fashion Futures.
Three local labels, Ong Shunmugam, Elohim and Dzojchen have been selected as the first batch of emerging designer showcases.
The designers of the brands - Priscilla Shunmugam, Sabrina Goh and Chelsea Scott-Blackhall - will show at Singapore Fashion Week and receive feedback from the headline designers. Their labels will also be stocked at a month-long pop-up at Tangs.
Three buyers, yet to be confirmed, from international, regional and online retailers will be given seed funding of $150,000 to place orders as part of the programme.
The designers willl also be included in a special induction programme by the Council of Fashion Designers of America - of which von Furstenberg is president - to visit New York and get industry exposure there.
While Shunmugam has shown at Audi Fashion Festival before, she says that "one of the biggest challenges of previous instalments was the lack of a trade element".
She welcomes the opportunity to reach out to more buyers. "I think it's on every designer's wishlist to be part of the induction programme. I never thought I'd have the opportunity."
Other local names getting some runway time at Singapore Fashion Week include Exhibit, ALT by Curated Editions, and the debut of Collate The Label, a new line by It girl entrepreneur Velda Tan.
These designers - Yoyo Cao, Angie Lai-Tay and Tan - are also prominent on social media. Singapore Fashion Week's Lee says this was a compelling factor in their inclusion in the line-up.
In addition to the fashion shows, members can buy tickets to hear the headline designers speak at a new Fashion Talk series held alongside Singapore Fashion Week in partnership with Lasalle College of the Arts.
Details of these talks will be released at a later date.
llim@sph.com.sg
This article was first published on Mar 14, 2015.
Get a copy of The Straits Times or go to straitstimes.com for more stories.
|
cc/2020-05/en_middle_0102.json.gz/line2154
|
__label__cc
| 0.718806
| 0.281194
|
Back to Find a health or human service
Find a health or human service
Adverse Medicine Events Line
The Adverse Medicine Events (AME) Line gives people a way to report and discuss unexpected and undesirable side effects (adverse experiences) with medicines. Call the AME Line if you think your medicine is causing a problem and you are worried about using it. The AME Line provides independent, accurate and evidence-based information.
Lodging and discussing adverse side effects of medicine
Evidence-based information on medicines
Available to anyone in Australia
How to access
The National Relay Service (NRS) is available to help callers with a hearing or speech impairment. For:
TTY users, call 133 677, then ask for 1300 134 237
Speak and Listen users, call 1300 555 727 then ask for 1300 134 237
Internet relay users, connect to the National Relay Service then ask for 1300 134 237.
The Translating and Interpreting Service (TIS National) is available (24 hours, 7 days) for callers who speak other languages. Call 131 450.
Monday to Friday, 9 am – 5 pm
The AME Line is a free service.
Calls are charged at the cost of a local call.
Calls from mobile phones may be charged at a higher rate.
Not-for-profit organisation funded by the Commonwealth Government
You can call to discuss any side effects that might be due to your prescription medication, an over-the-counter medication or a complementary therapy.
Call the AME Line as soon as you begin to experience unusual side effects from a medication. Early detection can reduce the impact of side effects.
In an emergency, call triple zero (000).
The AME Line is not for emergencies. If you have concerns about your medicines arising from an overdose or suspected poisoning, call the Poisons Information Centre, 24 hours a day on 13 11 26.
Page last reviewed: 05 Oct 2015
https://www.betterhealth.vic.gov.au:443/health/serviceprofiles/adverse-medicine-events-line-service
|
cc/2020-05/en_middle_0102.json.gz/line2162
|
__label__wiki
| 0.715627
| 0.715627
|
Bijan Mortazavi- “Ye Ghatre Daryaa”
Avang Music Co.
Today we are practically used to hear the musical endeavours of artists like Parviz Rahmanpanah, Farhad Besharati, Mory Khaksar and their classic instruments’ escapades, beyond their traditional settings and in the more modern musical milieus and soundscapes!! But the whole genre, or better said tradition, became relatively accepted and also MAINSTREAM, first around a decade ago!! Taboos were shattered and the whole conception of traditional-instrument-based music was re-considered when a vocalist/violinist and his violin entered the arena!! That artist was Bijan Mortazavi!! …later dubbed to “the fiddler on the lovers’ roof” (derived from the classic “Fiddler on the Roof” motion picture)!!!
Not only was his violin unconventionally WHITE, but it was like if it was alive and had its own will!! The instrument was no longer an extension of the artist, but rather his partner and “side-kick”!! The artist appeared as a “magician”, with whose commands the rare exotic bird in his hand started to fly in colorful circles above the scene, and sing like a nightingale from paradise!! For the first time, the attention and spot-lights were on the instrument, rather than the artist!! The violin became the main attraction!! Deriving from the innovative styles of Sadegh Noojoki and the arrangements of the great YANNI, Bijan came to develop and establish his own TRADEMARK-style and melodic “signature”!! A style so exclusive that it is virtually impossible for others to get inspired by, without imitating!! A style that has obviously inspired younger violinists, such as Shadmehr Aghili!!
After 3 years of silence, Bijan returns as a member of A.I.S.I.A (Association of Iranian Singers in America) and with another partly vocal/partly instrumental album, “Ye Ghatre Daryaa”!! The music of the album is naturally composed by Bijan himself, and co-arranged in one case by Ramin Zamani!! For the lyrics of the vocal-songs, stands no one less than the great Iraj Jannati-Ataie!! “Ye Ghatre Daryaa” is Bijan’s 7th studio-album and his third released on Avang Music Co.
The title-track opens the album, as yet another typical album-opener by Bijan!! If you even own a single Bijan-album in your collection, than you know that the album begins with a GORGEOUS and ENERGETIC up-beat track, with full-scale arrangements!! And “Ye Ghatre Daryaa” is no exception!! The song is simply PERFECT!! I love its powerful choir segment!! …Very energizing!!
“Lavand” is an up-beat South American/Andalusian/Persian retro-POP fare!! Some lovely acoustic guitars and flutes fill in for the absent violin, in this cute little song!! “Lavand” builds further upon Bijan’s tradition of songs with a COQUETRY-theme!! Preceded by other lovely songs like “Eshveh”!!
The third tune is the second track this year with an intro, that reminds of Andy & Kouros’ cover of “Raftam ke Raftam”!! The instrumental “Rangin Kaman” sounds as bright and colorful as it is entitled!! An angelic female choir courts the pirouetting melodies of the violin!! Reminiscent of KITARO’s “Cirque Ingenieux”!!…Very lovely!!
“Setare” is a lovely CONTINENTAL mid-tempo ballad!! It is also a typical Bijan-tune!! The retro-Italian influences are predominant in its arrangements!! I love the surprising and subtle “hand-clapping” that is incorporated in the arrangements!! A perfect example of how beautiful a perfectly operated “transplantation” of a to-the-context completely alien element, should sound like!!
The second instrumental track of the album is an old Kurdish tune with additional compositions by Bijan himself!! The energizing and up-beat “Ronak” reflects pure JOY and HAPPINESS!!! A lovely performance by the Adlib vocalist!!
“Gerye Konam ya Nakonam?” is not only a vocal-track with a RARE question-mark in its title!! But it is also a typical Bijan-ballad!! The mellow BLUES-guitar at the intro reminds immediately of the lovely woks of the great Chris Rea, and Sting’s “Fragile”!! … A perfect song for an UNFORGETTABLE … and saaaaaaaaaaad LAST DANCE!!!
“Sari Galin” is another ethnic tune, revised and remade by Bijan!! It is an old beautiful Armenian-piece, perfect for the strings of the violin!! …Very lovely!!
The album finishes then with a well-mixed little MEDLEY!!
“Ye Ghatre Daryaa” is yet another “typical” MASTERPIECE by this acclaimed master!! I use the term “typical”, because he basically does NOT deliver anything new, …but he still delivers CLASS and refined QUALITY!! And it still sounds FRESH!! Surprisingly as fresh as it sounded 13 years ago!! Bijan Mortazavi has never changed, neither has his music!! But the very fact that there is no other one who can do, what he does so masterfully, leaves him without a credible rival and his music as unique as it’s always been!! That means NO risk for OVER-USE!! Not YET at least!
Another HIT-factor of this album is the highly appreciated employment of Iraj Jannati-Ataie’s gorgeous lyrics!! And I must admit that I find it extra indulging, to hear Iraj’s delicate words, for once in a different musical wardrobe than the usual Ghomayshi/McCrum ensembles!! It should be noted that Bijan’s classic and elegant ensembles truly become them and give them a very pleasant new appearance!! Other than that, I personally miss one thing in this album!! That is the continuation of the DREAM/TRANCE-experiment, that Bijan began 3 years ago with one of the most unusual Bijan-pieces, and my personal favorite, “Nesfe Khaab”!! With the hope that he sometime in the future resumes the unfinished experiment, I lay back and enjoy the magical melodies of “Ye Ghatre Daryaa”!!!
Review by: Pourya E.
Reviews described herein are mere opinions, and must be construed in that manner only! In other words they are not absolute!
|
cc/2020-05/en_middle_0102.json.gz/line2163
|
__label__wiki
| 0.69528
| 0.69528
|
2009bmwz4
Review: 2009 BMW Z4 sDrive30i is an easy lover
2009 BMW Z4 sDrive30i – Click above for high-res image gallery
VIDEO: Best possible way to win a BMW Z4?
2009 BMW Z4 – Click above for high-res image gallery
Chris Shunk
Officially Official: 2009 BMW Z4
Click above for high-res image gallery of the 2010 BMW Z4
Alex Nunez
2010 BMW Z4 moons the camera
We're waiting with bated breath for the December 15 unveiling of the all-new BMW Z4, but as we inch closer to Z-day we're getting a clearer picture of how the redesigned roadster will look. On Wednesday we caught a glimpse of the Z4 that revealed much smoother, very un-Bangle-looking side panels. Above is the newest Z4 teaser, and as you can see, its a booty shot. The first thing we noticed was the bulging rear whe
Rumormill: 2009 BMW Z4 rumored to debut next month, Z2 on the way
One of the vehicles that was teased in the run-up to the LA Auto Show, but never made it to the floor, was the redesigned 2009 BMW Z4. Rumors of the Z4's impending arrival have been circulating for months, and according to a source inside BMW, the automaker might reveal the restyled coupe and convertible next month.
Damon Lavrinc
BMW X1, 7 Series hybrid headed to Paris; Z4 to debut in LA
Inside Line has the skinny on BMW's new product unveils for the upcoming show season. Paris and L.A. are the headliners, with the City of Light chosen as the backdrop for the official public debuts of the all-new 7 series (including an ActiveHybrid variant) and facelifted 3 Series. While those cars will get their fair share of attention, all eyes will likely to be on the concept X1, which will also make its world debut in P
Rendered Speculation: V8-powered BMW Z4 hardtop
AutoExpress' artists worked their magic on the next generation BMW Z4 and even though the exterior is more appealing than its predecessor, what lies beneath the evolved flame-surfacing has us aching to get behind the wheel.
2009 BMW Z4 to be offered with either soft- or hard-top
The BMW Blog, which is fast becoming our main resource for news regarding the propellor brand, is reporting that the 2009 Z4 will be offered both as a soft-top convertible and a hard-top. Much like Mazda offers the MX-5 with a traditional softy and a separate model with a folding hard top, BMW will reportedly do the same for the Z4. In this competitive market for the upper middle class dollar, BMW will be able to satisfy traditionalists and performance purists who like the ease-of-use a
Next generation BMW Z4 to get folding hard top, possibly M3's V8
We're seen the spy shots, so the revelation that BMW's next generation Z4 will be equipped with a folding hard top isn't much of a surprise. The mules undergoing testing show a two-piece metal unit that should be able to fold neatly into the trunk, while not infringing too heavily on luggage space.
First Drive: 2009 BMW Z4
|
cc/2020-05/en_middle_0102.json.gz/line2165
|
__label__wiki
| 0.566291
| 0.566291
|
Flex Time: 2011 Ford Flex Titanium Gains Sporty Apperance
Evan McCauslandwriter
Ford's Flex is already a stylish seven-seat alternative to a traditional minivan, but those seeking a sportier look may be interested in the new 2011 Flex Titanium model, which rolls into showrooms later this summer.
Although it isn't badged as a Sport model, the Flex Titanium incorporates a number of cues previously used on the Fusion Sport and Edge Sport. Both headlamps and tail light lenses are smoked, while the front grille, fog lamp surrounds, and tailgate applique are treated to a black chrome finish. Ford also stripped the blue oval logo from the front grille, opting instead to spell "FLEX" along the leading edge of the hood -- a nod to FoMoCo offerings from the '60s.
Four colors -- including exclusive white platinum and candy red metallic paints -- are available, but each is matched with a black roof finish -- a contrast to the body color or white roofs offered on other Flex models. Unique nickel-finish 20-inch wheels are standard, although polished chrome rims are available for an extra $2300.
Apart from the unique seat trim -- which pairs black leather with cream Alcantara inserts -- the Flex Titanium's interior is virtually identical to the Flex Limited. Navigation is standard, as is a 12-speaker Sony audio system, and Ford's Sync connectivity interface. Second-row bucket seats, a DVD entertainment system, a refrigerated second-row center console, and a three-row moonroof remain optional equipment.
If the Titanium is your cup of tea, expect to shell out an extra $3000 over a comparable Flex Limited. A Flex Titanium with the 3.5-liter V-6 and front-wheel drive stickers for $41,115 ($2495 over a comparable Limited FWD), while all-wheel-drive adds an extra $ to the window sticker. Those who desire some go with the show can opt for the all-wheel-drive Flex Titanium equipped with the 355-horsepower, EcoBoost twin-turbocharged 3.5-liter V-6, which carries a base price of $45,960.
Source: Ford
2011 Ford Flex Titanium
Joe Lorio| Feb 4, 2011
Joe DeMatio| Jan 10, 2011
Ford, Volkswagen Lead Strategic Vision Auto Quality Survey
Jake Holmes| Jul 12, 2011
|
cc/2020-05/en_middle_0102.json.gz/line2167
|
__label__wiki
| 0.641964
| 0.641964
|
Home » News » Car News » Car Sales Report: May 2018
Car Sales Report: May 2018
By autoX Editorial | on June 1, 2018
The months of April and May have seen new launches from almost every car manufacturer. These new products seem to be driving sales despite the increase in fuel costs
The automotive industry has seen a lot of action in the last two months. Apart from the addition of new variants like the AMT version of the Maruti Suzuki Vitara Brezza and the Tata Nexon, there have been a considerable number of new launches too. Honda brought in the new generation Amaze, Toyota finally entered the C-segment sedan space with the Yaris and Ford brought in the new Freestyle. Mahindra didn’t fall behind either and brought in the face-lifted XUV5OO. These new offerings have played their part in pushing sales for the month of May 2018. Let’s take a look at how each of the manufacturers has performed.
May 2018 was a good month for Maruti Suzuki as the company registered an overall growth of 26 percent in comparison with the same month last year. Domestic sales grew by 24.9 percent while exports went up by an impressive 48.1 percent. Driving the growth for Maruti Suzuki were the Celerio, Ignis, Baleno, and DZire. The recently launched Swift hatchback also registered good sales numbers. Earlier in May, Maruti Suzuki brought in the AMT version of the Vitara Brezza. This move is also likely to help the manufacturer improve sales in June.
Maruti Suzuki wasn’t the only manufacturer to bring in an AMT iteration of its compact SUV. Tata also introduced the Nexon AMT – in both, petrol as well as diesel variants. The Sanand-based carmaker claims that the car has received a good response and is witnessing good traction in the market. Aside from the new addition to the product portfolio, the company has had a rather fruitful month. With sales of over 17,489 units, Tata Motors has managed a considerable growth over the 10,855 units in the same month last year. Exports, however, seem to have slowed down marginally. Tata shipped out 3,699 units in May 2018 as opposed to 3,900 units in the corresponding month last year.
With total sales of 13,113 units in the month of May 2018, Toyota has recorded a growth of 20 percent. The company further exported 827 units of the Etios this month, increasing the overall sales to 13,940 units. In the same month last year, domestic sales stood at 10,914 units. Earlier this month, Toyota commenced deliveries of their newly launched Yaris sedan. To meet customer demands, the Japanese carmaker would have dispatched more than 4,000 units of the Yaris to dealerships across the country towards the end of May.
Although they did manage to register a small growth, it hasn’t been a great month for Mahindra. The company managed to sell 20,715 units in May 2018 – up by just 2 percent from last year. There has been a marginal drop in the sales number of utility vehicles – car and vans, however, have shown a considerable improvement.
Ford has successfully managed to sell 9,069 units in the domestic market in the month of May in comparison to 6,742 units in the same month last year. Exports, however, were considerably higher with 17,119 units shipped out in May. The company had exported 16,761 units in May 2017. Apart from the launch of the Freestyle in April, Ford has recently introduced the EcoSport S with the 1.0-litre EcoBoost motor as well as the new 1.5-litre diesel. The EcoSport S has been priced at Rs 11.37 lakh for the petrol and Rs 11.89 lakh for the diesel trim. All prices ex-showroom Delhi.
Tags: Ford Mahindra Tata Toyota Car Sales Report
Toyota teases new Yaris-based compact-SUV
Tata Altroz receives 5-star safety rating from Global NCAP
Bookings open for BS6 Tata Tiago, Tigor and Nexon
Ford Mustang Mach-e: Preview
Tata Motors will unveil four new models at Auto Expo 2020
|
cc/2020-05/en_middle_0102.json.gz/line2168
|
__label__wiki
| 0.898685
| 0.898685
|
Star Wars' John Boyega issues apology over social media abuse comments
Boyega, 27, had told Variety that "for those who are not mentally strong, you are weak to believe in every single thing that you read."
Star Wars actor John Boyega has apologised for "badly-worded" comments he made about abuse on social media.
Fans assumed he was criticising his co-star Kelly Marie Tran, 30, who deleted her Instagram posts after some took a dislike to her Star Wars character.
Now Boyega has tweeted: "In no way was I referring to Kelly when I made my comments, although the interviewer mentioned her given the topic.
Hollywood's biggest British actors and directors - Where are they now?
Game of Thrones season 8 episode 1 watched by staggering 3.4million Sky viewers
"I was really speaking from my own perspective throughout this franchise.
"Sometimes I've felt strong and sometimes I've felt weak. Badly worded though. I apologise."
John Boyega (left), Daisy Ridley (centre) and Mark Hamill (right) attending a Star Wars: The Last Jedi photocall in London on December 13, 2017 (Image: Ian West / PA Wire)
Tran, who played Resistance fighter Rose Tico in 2017 title Star Wars: The Last Jedi, removed her Instagram posts after experiencing months of racist and sexist abuse on social media.
A Vietnamese-American, she was the first woman of colour to play a lead role in the hit series.
Daisy Ridley speaks out over harrowing brush with stalker Star Wars fan
Star Wars: The Rise Of Skywalker final trailer released ahead of December release
In a piece she wrote for the New York Times, entitled I Won't Be Marginalised by Online Bullying, she said: "Their words seemed to confirm what growing up as a woman and a person of colour already taught me - that I belonged in margins and spaces, valid only as a minor character in their lives and storie
|
cc/2020-05/en_middle_0102.json.gz/line2170
|
__label__cc
| 0.593769
| 0.406231
|
Let's set the scene...
Rory and Lorelai are still studying for Rory's upcoming Shakespeare exam. Lorelai begins by asking a question about The Comedy of Errors...
Lorelai: Published?
Rory: 1698
Lorelai: Ooh 1623 - close
Rory: How is 1623 close?
Lorelai: You got the ‘16’ part right.
Rory: I was off by 75 years
Lorelai: Well anything under 100 years is close.
Rory: What kind of rule is that?
Lorelai: I’m running the study session here. Ok. Richard III?
Lorelai: [Makes buzzer sound]
Rory: ’93?
Rory: Ok, that’s getting really annoying nowLorelai: [Makes small buzzer sound]
"Now is the winter of our discontent...". This opening line has become famous in it's own right and references the civil war (between the House of Lancaster and the House of York) that is depicted in Shakespeare's previous play Henry VI. King Richard III continues the epic tale of The War of the Roses, a fight for the throne of England.
The villainous Duke of Gloucester, so full of vile intentions and so desperate for power, stops at nothing to ensure his throne. Shakespeare's King Richard III is unapologetic in his evil tyranny. Familial blood does not guarantee safety from Richard's vengeance, however, he demands loyalty from everyone around him... the height of hypocrisy.
In the end, his hubris and arrogance are destroyed when he is visited by the ghosts of all the people he has slain in his quest for power and glory. And once his arrogance is removed, he is susceptible to the revenge his countrymen unleash on him.
William Shakespeare's "King Richard III" is one of the playwright's classic English historical dramas. It the story of Richard's murderous and deceitful plans to ascend to the thrown. A classic and popular play for performance, "King Richard III" is one of Shakespeare's great historical dramas.
Fun Stuff:
No Sweat Shakespeare
Goodreads: King Richard III by William Shakespeare
Wikipedia: William Shakespeare Wikipedia: King Richard III
Buy here:
Who do I see reading this in the Stars Hollow gazebo?
I believe that Richard would love the history behind the story of the Houses of Lancaster and York. I always see Richard as a history buff... it probably doesn't help that he's CONSTANTLY doing voice-overs for The History Channel. I've heard Edward Herrmann speak more about Hitler than I've used the word "dude". And that's saying a lot... dude.
|
cc/2020-05/en_middle_0102.json.gz/line2172
|
__label__wiki
| 0.54062
| 0.54062
|
School of Communication and International Relations
Degree in Audiovisual Communication Degree in Journalism and Corporate Communication Degree in Advertising, Public Relations and Marketing Degree in Digital Media Degree in International Relations Degree in Global Communication Management Double Degree in Journalism and Corporate Communication and in International Relations (5 years)
Official Masters Doctorates URL Masters Continuing Education courses Summer school
Josep M. Bartomeu, president of FC Barcelona, receives the IPRA Golden World Award 2018
The professional association for public relations executives, the International Public Relations Association (IPRA), has recognized the work of FC Barcelona, as one of the sports entities with the most social impact in the world.
Its president, Mr. Josep M. Bartomeu, received the acknowledgment from Mr. Bart de Vries, president of the association, at a Gala that took place at Hotel Catalonia Barcelona Plaza, organized by the School of Communication and International Relations Blanquerna. During the ceremony, the Public Relations in Sport award was also given to Mr. Jordi Moix, vice president of Espai Barça.
More than 180 people, from 50 different nationalities, and five continents, participated in this event. Since 1990, the IPRA has organized the annual ceremony of these awards to recognize the achievements in public relations around the world in different categories. So far, there have been a total of 80 winners, who are now joined by FC Barcelona.
It should be noted that this award is known as the "Public Relations Oscar".
Blanquerna in a click
About Us Coneix la Facultat
Prospective Students Futurs estudiants
Quality Assurance Garantia de Qualitat
Library Biblioteca
Masters and postgraduate courses Màsters i postgraus
PhD studies Doctorat
Guided tours Visites personalitzades
Living in Barcelona Calendari acadèmic
University Lifestyle Horari
Where we are On som
® 2014 Blanquerna. All rights reserved.
|
cc/2020-05/en_middle_0102.json.gz/line2173
|
__label__wiki
| 0.973755
| 0.973755
|
Imran Ahmad
Markus Jakobsson
Christina Bergeron
Ropes & Gray LLP
Keith Carlson
Cybercrime , Fraud Management & Cybercrime
Noose Tightens Around Dark Overlord Hacking Group
Serbia Makes Arrest; UK Close to Sentencing Another Jeremy Kirk (jeremy_kirk) • May 17, 2018
The noose appears to be tightening around the Dark Overlord, a group of international hackers who have stolen and held for ransom sensitive information from dozens of companies, organizations and U.S. public schools.
See Also: Live Webinar | Empowering Your Human Firewall: The Art and Science of Secure Behavior
At least three people suspected of being linked to the group have been either arrested or charged.
The latest development came on Wednesday. Serbia's Ministry of Internal Affairs says it has arrested a suspected member of the group. The person was identified only by initials, S.S., born in 1980. The operation was executed with U.K. police and the FBI, the ministry says.
Serbia's Special Prosecutor's Office for High-Tech Crime is considering charges of criminal access to a protected computer and extortion, the ministry says.
But the Dark Overlord is still active, with law enforcement giving chase on bare threads of electronic clues. The group remains defiant. Late Wednesday, a Twitter account affiliated with the group tweeted: "Law enforcement has proven to be most incompetent."
Law enforcement has proven to be most incompetent.
— thedarkoverlord (@tdo_hackers) May 17, 2018
On Thursday, ISMG briefly communicated with a person who controls the Twitter account, who wrote: "We're still around."
Nabbed On The Train
The latest arrest in Serbia follows other law enforcement actions that have increased the pressure. But the group has proved elusive to trace due to its use of well-known evasion techniques - encryption and anonymity software.
One of those actions was made public earlier this month. U.K. police announced the arrest of Grant West, 26, who operated out of a caravan in Sheerness, Kent, the Daily Mail reported on May 2.
Grant West. (Source: Metropolitan Police)
U.K. police did not link West to the Dark Overlord. But according to a security industry source who did not want to be identified, it is believed West was affiliated with the group.
West, who admitted to several crimes, is due for sentencing May 25, according to the Metropolitan Police. West was accused of attacking more than 500 companies, including Uber, Sainsbury's, T Mobile and the Finnish Bitcoin Exchange, the Mail reports.
The Mail reports that he admitted to counts relating to conspiracy to defraud, computer hacking, cannabis possession, possession of criminal property and money laundering related to bitcoin.
It is unclear when West was arrested, but video from the Metropolitan Police shows police nabbing him while riding on a train. His girlfriend admitted to unauthorized use of computer material but was released with a two-year community order on May 2, the Mail reports.
Grant West crouches as officers detain him on a train, while his red laptop is seized. (Source: Metropolitan Police)
Police seized from West £500,000 ($678,000) in bitcoin, which is the first time U.K. police had seized virtual currency, the Mail reports. West allegedly possessed personal details for 78 million usernames and passwords and 63,000 credit and debit card details, which were stored on an SD card in the caravan, the publication says.
West is accused of selling stolen on the AlphaBay underground marketplace under the nickname "Courvoisier."
West allegedly stole personal information on the AlphaBay underground market. (Source: Metropolitan Police)
Fringe Member Charged
A fringe member of the Dark Overlord was arrested early last year in the U.K.
Nathan Wyatt, 36, of Wellingborough, England, was sentenced last November to three years in prison. Wyatt pleaded guilty to pleaded guilty to 20 counts of fraud, two counts of blackmail and one count of possession of an identity document with intent to deceive (see Fraudster Tied to 'The Dark Overlord' Jailed for 3 Years).
Nathan Wyatt (Source: Metropolitan Police)
Wyatt was also accused of hacking a British law firm and demanding a ransom of around $12,000 in bitcoins. The ransom demand was signed "The Dark Overlords," according to the Daily Mail.
In an instant messaging chat with ISMG prior to Wyatt's sentencing, a member of the Dark Overlord confirmed the group had some limited contact with him.
"While he had some shrivel of association for a particular operation, his capture meant no loss," the person told ISMG.
Wyatt was suspected but never charged in 2016 over the theft of private photos from the iCloud account of Pippa Middleton, the younger sister of Kate Middleton.
School Attacks
The Dark Overlord's extortion attempts, including the targeting of several U.S. public schools last year, triggered an urgent effort by international law enforcement.
Last September, the group's threats caused the shut down of 30 public and private schools in Montana's Columbia Falls School District for one week, affecting some 15,000 students. The group had obtained information on students from a school network and sent threatening notes to parents over SMS (see Cyber Ransom Group Hits Soft Targets: US Schools).
Later that month, the group sent text messages and emails to parents of students within the Splendora Independent School District in Montgomery County, Texas. A school district spokeswoman described the communications as "violent and graphic."
Around that time, a member of the Dark Overlord sent ISMG brief audio recordings from parents who had called back the number from which they received threatening text messages.
As far as attack methodology, security experts say the group takes advantage of relatively simple security misconfiguration and oversights, which opens an avenue to steal data.
The group then blackmails organizations, sending threatening letters and faux legal agreements, demanding a ransom in bitcoin in return for not releasing the information publicly. Victims have included healthcare organizations, manufacturing and technology companies and law firms.
The effort appears to have been profitable: The Dark Overlord has claimed to collect many ransoms, some of which have been confirmed. Larson Studios, Hollywood post-production studio, paid $50,000 in bitcoin after a season of the series "Orange is the New Black" was stolen from its network in 2016 (see Hollywood Studio Hit By Cyber Extortion Says: 'Don't Trust Hackers').
One ransom letter sent by the Dark Overlord to a company, which was seen by ISMG, contained a copy of Adolf Hitler's signature. Underneath, it read: "thedarkoverlord."
OnDemand Webinar | Ponemon Report: The Cost of Credential Stuffing
Respiratory Services Provider Lincare Settles Breach Case
https://www.bankinfosecurity.com/noose-tightens-around-dark-overlord-hacking-group-a-11014
|
cc/2020-05/en_middle_0102.json.gz/line2178
|
__label__wiki
| 0.505981
| 0.505981
|
Serious Injury & Death Claims
Insurance Claims/ “Bad Faith”
Nursing Home Litigation
STEP ONE: Notification of responsible parties
STEP TWO: Gathering of Evidence
STEP THREE: Establishing guilty parties
STEP FOUR: Figuring out how much a claim is worth
STEP FIVE: Writing the formal demand letter
STEP SIX: Negotiations
STEP SEVEN: Civil Litigation
Law Office of Joseph P. Bartek
Serious Injury/Death Claims
The Truth about Motorcycle Vulnerability
February 10, 2017 By Joseph Bartek
All drivers face vulnerability when they get behind the wheel, but motorcyclists face unique and extreme dangers. Unfortunately, though it is a favorite American pastime, riding motorcycles has also become a death sentence for many riders who become victims of the negligence of other drivers. This is why so many lawyers have become devout advocates to motorcycle riders and their families to pursue compensation after traffic accidents occur.
Motorcycle Safety Statistics
According to the National Highway Traffic Safety Administration (NHTSA), 4,976 people lost their lives in 2015, a figure that rose a full 8.3 percent from its 2014 data. Many more motorcyclists were injured in the same year, totalling 88,000. This means that motorcyclists are about 27 times more likely than passenger car occupants to die in a crash per vehicle mile driven, and five times more likely to sustain an injury.
What Causes Motorcycle Accidents?
Motorcyclists and vehicles must share the road together, but this has proven challenging from the start. In fact, more than half of motorcycle accident deaths occur in crashes that involve motorcycles and other vehicles. The majority of such deaths result from a car striking a motorcycle from the front in a head on collision. Cars making left turns are also major dangers to motorcyclists, because it is all too likely that a car will strike a motorcycle when it is going through an intersection, passing the car, or trying to overtake the car. While these types of accidents are common between multiple cars themselves, motorcycles are smaller and provide much less visibility. Plus, motorcyclists are so exposed on their bikes that they are more vulnerable to serious injury and death.
Seeking Legal Support
While some motorcyclists cause their own accidents by speeding, drinking, and committing other risky behaviors, the many motorcyclists who are victims of negligent vehicle driving can pursue legal recourse with the help of experienced attorneys like the team at the Law Office of Joseph P. Bartek in Bellingham, Washington. A lawyer knows how to prove fault from the other driver and gain compensation for injured motorcyclists or the families of deceased motorcyclists. Compensation can cover everything from medical bills and lost income to mental anguish, pain and suffering, burial expenses, and loss of companionship. It’s critical that motorcyclists seek help from a qualified attorney in order to obtain the full amount of compensation deserved.
Filed Under: Motorcycle Accidents
Serving the State of Washington
Based in Bellingham, Washington, the Law Office of Joseph Bartek serves the surrounding areas of Whatcom and Skagit counties...
A Personal Injury Law Office
The Law Office of Joseph P. Bartek is a Personal Injury firm with experience in Automobile Accident Claims, Serious Injury and Wrongful Death Claims, Insurance Claims, and Product Liability cases.
114 W Magnolia, Suite 434
114 W Magnolia, Suite 434 Bellingham, WA 98225 - Phone (360) 392-3946 - Fax (360) 671-8075
Attorney Advertising. The information on this website is for general information purposes only. Nothing on this site should be taken as legal advice for any individual case or situation. This information is not intended to create, and receipt or viewing does not constitute, an attorney-client relationship.
|
cc/2020-05/en_middle_0102.json.gz/line2181
|
__label__wiki
| 0.529558
| 0.529558
|
BMW of Dallas | Certified Center
6200 Lemmon Ave Directions Dallas, TX 75209
Finance & Leasing
NEW BMW CARS & SAVS FOR SALE IN DALLAS
Looking for a brand new BMW car or SAV in the Dallas-Fort Worth area? You've come to the right BMW dealership. Explore our new BMW cars and SAVs for sale, featuring all of the latest BMW models in a variety of colors and trim levels. We also offer a number of exclusive lease and finance specials to help make new vehicle ownership even easier. Browse our current inventory below, then give us a call at (972) 763-5528 to schedule a test drive!
year=2020&make=BMW&model=M760i&gvBodyStyle=Sedan& 0 auto-new /new-inventory/index.htm
What new BMWs will debut in 2020?
Besides some exciting redesigns for current BMW vehicles, such as the BMW 3 Series and 5 Series, some new models are also debuting in 2020. The 2 Series Gran Coupe is a much-anticipated release, as is the new availability of the extra-roomy X7 SUV.
New BMW models in 2019 include:
SAVs:
Sedans:
Coupes:
BMW Roadside Assistance offers comprehensive travel protection 24 hours a day, 365 days a year at no additional cost (although certain restrictions do apply). Your BMW car, SUV or SAV is covered throughout the United States and Canada, even when someone else is behind the wheel, whether you're traveling to Plano or Poughkeepsie.
Browse New BMW Cars & SAVs For Sale in Dallas, TX
AutoNation BMW of Dallas carries an extensive inventory of brand-new BMW cars, SUVs and SAVs. But if you don't find exactly what you want on our lot, our experienced sales associates can get you the luxury car you want.
You can stop by our showroom in Dallas any time, with no appointment needed. Our sales hours are Monday through Friday, from 8:00 a.m. to 8:30 p.m. and on Saturday from 8:30 a.m. to 6:00 p.m., to accommodate your schedule. We're closed Sundays. Get detailed directions to our showroom.
What are the most popular new BMW features?
For 2020, BMW continues to develop its reputation for innovation and luxury. For example, the 2020 8 Series Convertible features a multilink rear suspension and an electronically adjusted limited-slip rear differential for even greater performance. And the U.S. will finally get to try out the largest BMW SUV, the X7, which is bigger than the X5 and can fit up to seven passengers.
Financing a new BMW
Start by working with our free online financing calculator to get an idea of possible monthly payments, then fill out our easy online financing application. You can also stop by to speak with one of our friendly and highly knowledgeable finance specialists. They're committed to helping put you behind the steering wheel of your dream BMW. Ask about our special offers.
How can I test drive a new BMW?
Browse our current inventory online, then give us a call at (972) 763-5528 to schedule a test drive. It's the best way to get to know our new BMW models and decide which new car is best for you.
Accessories and color may vary. Quoted price subject to change without notice to correct errors or omissions. New vehicle pricing may already include applicable manufacturer incentives which may expire at any time. Manufacturer incentive data and vehicle features is provided by third parties and believed to be accurate as of the time of publication. Please contact the store by email or phone for details and availability of incentives. Sales tax or other taxes, tag, license, title, registration fees, government fees, and $150 dealer documentary fee is not included in quoted price.
|
cc/2020-05/en_middle_0102.json.gz/line2185
|
__label__cc
| 0.575646
| 0.424354
|
Complotten & Legendes
Folklore & Legendes
The Origins of Evil in Hindu Mythology
Auteur: Wendy Doniger O'Flaherty
Auteur: Wendy Doniger O'Flaherty W. D. O'Flaherty
Uitgever: University Of California
Druk: New edition
''While focusing on the central problem of evil, O'Fiaherty illuminates every aspect of Hindu thought.'' --Choice ''This is Dr. O'Flaherty's third book on Indian mythology, and the best yet. The range and number of myths handled is dazzling .... Moreover, her fluent and lucid style make reading a pleasure .... a major contribution to the study of religion in general and Hinduism in particular.''--Times Literary Supplement ''This scholarly work is a welcome and valuable addition to Hindu studies because it corrects the widespread belief that Hindu thought does not recognize the problem of evil. The author shows conclusively that the mythology of tribal societies and the Puranas deal with this question extensively. She traces certain conceptual attitudes towards evil from the Vedic period to the present day.''--Library Journal ''O'Flaherty has accomplished an important double task. She has reoriented our thinking on the Indian experience of evil as it has been given literary expression in the mythological texts of the Sanskrit tradition and to a lesser extent in the Tamil and tribal traditions as well. She has also provided, in this rich and exquisitely crafted book, a new set of vantage points from which to re-read familiar Indian myths and encounter new ones. . . Origins is both a superb piece of scholarship and a lively, witty and engagingly written book.''
--South Asia in Review ''The author performs a brilliant feat in her textually exegetical and hermeneutical handling of the numerous and many-faceted myths. The study is highly pertinent and valuable . . . The authorial translations from the Hindu and Pali texts are refreshing ... and her comments are illuminating. Thus the Hindu view of evil comes out as something not simplistic and arbitrary but as an approach which is careful, complex, and richly eclectic. . . . This is a highly readable volume written with verve, sparkle and occasional light touches of decent humor.''--Asian Student ''For serious students of mythology, theology and Hinduism, this book is must reading.''--Religious Studies Review
Wendy Doniger O'Flaherty W. D. O'Flaherty
W. D. O'Flaherty
NUR code
QRD
Hindoeisme
Verwacht over 6 weken
Wendy Doniger O'Flaherty
Women, Androgynes and Other Mythical Beasts
Dr Hiro G Badlani
Essence of Hinduism
A. L. Basham
The Origins and Development of Classical Hinduism
George M. Williams
Handbook of Hindu Mythology
Surinder Mohan Bhardwaj
Hindu Places of Pilgrimage in India
Dreams, Illusions and Other Realities
A. L. Dallapiccola
David Samnga-Lastri
Heartbeats of Hinduism
|
cc/2020-05/en_middle_0102.json.gz/line2187
|
__label__cc
| 0.731523
| 0.268477
|
Route reviews
Traveling in twos
Travel logistics
Transportation guides
Trekking trails
Start-up journal
Data-driven tips
How to fly more sustainably
Innovation How to fly more sustainably
Before we continue talking about sustainable travel, let’s remind ourselves why we care.
Aviation travel accounts for 2.5% of the global CO2 emissions. This figure is expected to rise to 3.5% by 2030, all driven by the growing demand of air travel.
We previously wrote about the benefits of train or bus travel vs. short-haul flights. However, for some journeys it’s just not realistic to use other forms of transport besides flying. Especially with long distances, you sometimes have to sacrifice too much comfort and time when limiting yourself to land-based transportation.
Take for example the journey from Hanoi to Hoi An, where the overland journey lasts at least 16 hours, while the flight only takes 1.5 hour. When considering these options, you’re basically comparing the following two options:
1. Do I want to spend almost a complete day on a bus and arrive totally exhausted to my destination?
2. Shall I take a flight so I have an extra day to explore the gorgeous old town of Hoi An?
We won’t blame you for choosing the latter….
In this post, we will share several factors to consider when flying is the only reasonable option. And as an extra bonus, we will briefly discuss how you can use offsetting programs to compensate for your carbon dioxide emissions.
Considering the environment when booking a flight
Not all airlines are built the same with some basic knowledge, we can help you to make a better informed decision.
Most airlines have a section on their website that is dedicated to environmental policies, in addition to the news section, which can be a great source of information. Take, for example, the Dutch airline, KLM. In a recent marketing campaign they actually urged people to fly less. No one can deny that they do not care about sustainability!
Before you book your next plane ticket, consider the following checklist:
5 important factors to consider when booking a flight
1. Aircraft maintenance procedures
Using a modern aircraft fleet is probably the most important factor.
Modern planes are equipped with the latest fuel saving technologies and are considered up to 80% more fuel efficient than the earliest commercial jet planes. It’s therefore very important to consider the average age of the fleet of the airline company before you book your flight.
The Airbus A350-900 or Boeing 787-9/8 are, for example, one of the most fuel efficient planes.
Another less obvious area where environmental savings can be made is the cleaning process of aircrafts. As you probably know, planes are huge! This means there is a lot of surface to clean, which require large volumes of water and chemicals. Some aircraft operators have invested in rain-collection methods to enable them to recycle rainwater for cleaning purposes. Others claim to have saved eight million litres of water a year from switching to a semi-dry washing method.
2. Aeroplane capacity
If there are multiple airlines operating flights on the same route, look into which airplanes have the largest passenger capacity.
By taking a flight with more passengers you can reduce your per passenger carbon footprint. And although flying business class can offer a lot more comfort, consider that this also takes up a lot more space and therefore significantly increases your personal carbon emissions.
3. Waste separation and recycling
Some airlines have implemented waste separation and recycling schemes during the flight or once the aircraft has landed.
If cabin crew pass through with a bin liner that is specifically for recyclable waste, set a good example by separating out your personal waste.
Some airlines also introduce policies to reduce the volume of waste produced on each flight. For instance, only providing sugar and milk sachets when passengers ask for them.
You can also help with these efforts to reduce waste by saying no to items you will not use. If you have taken your own bottle of water onboard, say no to cups of water (even though the cabin crew hands them out for free). I’m sure they will be happy to fill up your bottle instead.
4. Plane weight reduction
Reducing the weight of a plane and its fittings decreases the amount of fuel used during a flight.
Some airlines have taken actions such as removing trays from the backs of seats and reducing the weight of trolleys used for catering services. Modifications such as these increase the fuel efficiency of each flight and reduce the carbon footprint.
Reducing the weight of the plane is also something you can directly influence, as baggage constitutes a large percentage of the weight of any flight. You can reduce the weight you are contributing to a flight by thinking carefully about what to pack and leaving unnecessary items at home. Also, consider how pre-ordering meals can help the staff make a better decision about the number of meals to take on board.
5. Environmentally friendly meals
Instead of only pre-ordering a meal, you can go one step further, by considering a meatless option to reduce the environmental impact of your food.
Airlines respond to customer demand. Therefore choosing a vegetarian or vegan meal indicates to their analysts that there is growing demand for these options. Airlines are likely to respond to such trends by investing more money into developing a greater range of meat-free in-flight meal options.
The carbon offsetting debate
Several airlines and third party organisations offer the option to “carbon offset” your flight. In other words, you can compensate the CO2 emissions of your flight by contributing money to a project that improves the air quality.
The idea of carbon offsetting starts with identifying the amount of greenhouse gases produced by each passenger on a flight. With the compensation you will fund an initiative which produces the equivalent amount of green energy or absorbs the equivalent amount of carbon dioxide.
Unfortunately, there is currently not a single agreed method for calculating this amount of carbon dioxide produced per passenger. This means that each carbon-offsetting calculator can show different results. By using a government-backed carbon calculator, you know that this is verified by officials. Equally it may be easier for you to use the carbon-offsetting calculator provided by the airline you fly with. The advantage of using the calculator of an airline, is that this increases the likelihood that factors such as airplane model and flight distance are accurately accounted for.
Another important note is that you cannot pay off the bad effects by donating money to a sustainability project. The air will be polluted by flights, which is irreversible. Even if you contribute to a project to make future energy consumption more sustainable, the harmful effects of flights cannot be turned back.
Critics of the offsetting programs argue that these projects let people think there is no harm in taking a flight as long as they carbon offset their fight. Well, to that we can only say that even if you choose flying somewhere, at least make a good contribution to the environment when participating in these offsetting programs. If you use the check-list mentioned above, no one will be able to argue that you don’t care about the environment when you book your flight.
Green airports
It’s not only the actual flight that contributes to the environmental footprint of flying. The airport you fly out of can also be an important factor to consider.
Cochin Airport Runway ©Prasad Pillai/Flickr
Some airports have taken great steps forward to reduce their environmental impact. For instance, installing solar panels or wind turbines to provide energy to airport operations. As with individual airlines, airport websites will provide you with information about their sustainable initiatives.
Although air travel remains the most polluting form of transport, we must acknowledge that flying cannot always be avoided. By using the checklist outlined in this post, you can limit the harmful effects of your flight. You’re not expected to choose the optimum in every aspect, but at least you can now make better informed decisions when booking your next flight.
Maarten Cox
When not at the beach, you'll likely find Maarten surfing in the ocean. With a special place in his heart for Asia and ongoing work on his blog, GeckoRoutes, Maarten's biggest passion is to explore every corner of the earth while meeting new people, which fuels his adventures.
Want to travel across the land and sea?
Find your Bookaway trip
PrevPreviousExperience Tet in Vietnam: A new year to remember
NextEvery traveler’s dream bus from Hanoi to Sapa: A guest reviewNext
Chandrika Ghosh—
The Philippines’ dying art of Kalinga body tattoos
Piumi Rajapaksha—
Top 5 things to do in Phnom Penh after sunset
Ashley Katzeff—
5 day trips to take from the Amalfi Coast
Celebrating Vietnam’s Independence Day
Planning a day trip from Cebu to Bohol
Koh Chang: An Authentic Island Getaway Experience
support@bookaway.com
Text us at:
Phone/sms: +1 (888) 250-3414
Facebook-f Linkedin-in Instagram Twitter Youtube
© Bookaway 2020
|
cc/2020-05/en_middle_0102.json.gz/line2188
|
__label__cc
| 0.736645
| 0.263355
|
Wife Between Us
Please Sign Up to Read or Download "Wife Between Us" eBooks in PDF, EPUB, Tuebl and Mobi. Start your FREE month now! Click Download or Read Now button to sign up and download/read Wife Between Us books. Fast Download Speed ~100% Satisfaction Guarantee ~Commercial & Ad Free
📒The Wife Between Us ✍ Greer Hendricks
✏Book Title : The Wife Between Us
✏Author : Greer Hendricks
✏Publisher : St. Martin's Press
✏The Wife Between Us Book Summary : The instant New York Times Bestseller (January 2018)! "A fiendishly smart cat-and-mouse thriller" —New York Times Book Review "Buckle up, because you won't be able to put this one down." —Glamour "Jaw dropping. Unforgettable. Shocking." —Publishers Weekly (starred review) "The best domestic suspense novel since Gone Girl." —In Touch Weekly When you read this book, you will make many assumptions. You will assume you are reading about a jealous ex-wife. You will assume she is obsessed with her replacement – a beautiful, younger woman who is about to marry the man they both love. You will assume you know the anatomy of this tangled love triangle. Assume nothing. Twisted and deliciously chilling, Greer Hendricks and Sarah Pekkanen's The Wife Between Us exposes the secret complexities of an enviable marriage - and the dangerous truths we ignore in the name of love. Read between the lies. A 2018 Indie Next Pick | One of Glamour Magazine's Best Books of 2018 | One of Hello Giggles' 19 Books We Can't Wait to Read in 2018 Praise for The Wife Between Us: "Fiendishly clever...in the vein of Gone Girl and The Girl on the Train. This one will keep you guessing." —Anita Shreve, New York Times bestselling author of The Stars are Fire “A clever thriller with masterful twists.” – Karin Slaughter, New York Times bestselling author of The Kept Woman "The Wife Between Us delivers a whip smart, twisty plot in a taut, pacy narrative. It's terrific and troubling. This is one scary love triangle where you won't know who to trust. I loved it." –Gilly Macmillan, New York Times bestselling author of What She Knew "A twisty, mind-bending novel about marriage and betrayal. A gripping plot and fascinating characters; this book will keep you turning the pages and guessing until the very end. A must-read!" –Lauren Weisberger, New York Times bestselling author of The Devil Wears Prada “This amazing story gallops along at breakneck speed, with an ending that smacks you between the eyes and takes your breath away. These authors are destined to become trail blazers in the field of psychological suspense books that explode in your hands!” —Nancy Simpson-Brice, Book Vault “Like a house of mirrors, The Wife Between Us kept me guessing around every corner, delving into the complexities of marriage, friendship, and obsession.” —Javier Ramirez, The Book Table
📒The Wife Between Us The First Four Chapters ✍ Greer Hendricks
✏Book Title : The Wife Between Us The First Four Chapters
✏Pages : 40
✏The Wife Between Us The First Four Chapters Book Summary : “A clever thriller with masterful twists.” – Karin Slaughter, New York Times bestselling author of The Kept Woman "A fiendishly clever romantic thriller in the vein of Gone Girl and The Girl on the Train. This one will keep you guessing." –Anita Shreve, New York Times bestselling author of The Stars are Fire "The Wife Between Us delivers a whip smart, twisty plot in a taut, pacy narrative. It's terrific and troubling. This is one scary love triangle where you won't know who to trust. I loved it." –Gilly Macmillan, New York Times bestselling author of What She Knew "A twisty, mind-bending novel about marriage and betrayal. A gripping plot and fascinating characters; this book will keep you turning the pages and guessing until the very end. A must-read!" –Lauren Weisberger, New York Times bestselling author of The Devil Wears Prada A novel of suspense that explores the complexities of marriage and the dangerous truths we ignore in the name of love. When you read this book, you will make many assumptions. You will assume you are reading about a jealous wife and her obsession with her replacement. You will assume you are reading about a woman about to enter a new marriage with the man she loves. You will assume the first wife was a disaster and that the husband was well rid of her. You will assume you know the motives, the history, the anatomy of the relationships. Assume nothing. Discover the next blockbuster novel of suspense, and get ready for the read of your life.
📒Book Club Set ✍ Greer Hendricks
✏Book Title : BOOK CLUB SET
✏ISBN : LCCN:2017037534
✏BOOK CLUB SET Book Summary : When you read this book, you will make many assumptions. You will assume you are reading about a jealous wife and her obsession with her replacement. You will assume you are reading about a woman about to enter a new marriage with the man she loves. You will assume the first wife was a disaster and that the husband was well rid of her. You will assume you know the motives, the history, the anatomy of the relationships. Assume nothing.
📒Summary Greer Hendricks S The Wife Between Us A Novel ✍
✏Book Title : Summary Greer Hendricks s The Wife Between Us A Novel
✏Author :
✏Release Date :
✏ISBN :
✏Summary Greer Hendricks s The Wife Between Us A Novel Book Summary :
📒Summary Greer Hendricks S The Wife Between Us A Novel Discussion Prompts ✍ Sarah Fields
✏Book Title : Summary Greer Hendricks s the Wife Between Us A Novel Discussion Prompts
✏Author : Sarah Fields
✏Publisher : Blurb
✏Summary Greer Hendricks s the Wife Between Us A Novel Discussion Prompts Book Summary : The Wife Between Us is the new bestselling thriller from authors Greer Hendricks and Sarah Pekkanen. The novel is about a man who has a jealous ex-wife. She is desperate to stop him from remarrying his young and beautiful fiancée. This complicated love triangle is the heart of this novel. Twisted, disturbing and deliciously chilling, Greer Hendricks and Sarah Pekkanen's new novel The Wife Between Us will expose the secret complexities that come with an enviable marriage. These are the dangerous truths that we ignore in the name of love. The Wife Between Us has been named as one of the Best Books of 2018 by Glamour Magazine. It has also been named as one of Hello Giggles' 19 Books We Can't Wait to Read in 2018. In this comprehensive look into The Wife Between Us: A Novel by Greer Hendricks and Sarah Pekkanen, you'll gain insight with this essential resource as a guide to aid your discussions. Be prepared to lead with the following: More than 60 "done-for-you" discussion prompts available Discussion aid which includes a wealth of information and prompts Overall brief plot synopsis and author biography as refreshers Thought-provoking questions made for deeper examinations Creative exercises to foster alternate "if this was you" discussions And more! Please Note: This is a companion guide based on the work The Wife Between Us: A Novel by Greer Hendricks and Sarah Pekkanen not affiliated to the original work or author in any way and does not contain any text of the original work. Please purchase or read the original work first.
📒The Wife Between Us ✍ Shanell Monique
✏Author : Shanell Monique
✏The Wife Between Us Book Summary : Nicole is what can only be described as a bad chic. She has the body, the personality, and the skill to basically have any man she wants. For a few months, however, she has been playing the other woman to Robert. She is there for him more than his own wife, and will do anything to keep him happy. However, soon enough, Nicole will go on a rollercoaster of emotions where she learns that this simply will not be enough. On this ride, she will learn that Robert is not what she thought he was while also learning just how strong his commitment to his wife is. Several explosive scenarios will send separate words colliding into one another, putting everyone involved to the test. No matter what, Nicole is the one who wound up paying the biggest price...
📒Stage Struck Settlers In The Sun Kissed Land ✍ Thomas P. Collins
✏Book Title : Stage struck Settlers in the Sun kissed Land
✏Author : Thomas P. Collins
✏Publisher : Wheatmark, Inc.
✏Stage struck Settlers in the Sun kissed Land Book Summary : The rise of the amateur theatre in nineteenth-century Prescott, the territorial capital of Arizona, is told here in vivid and loving detail, with fifty-two illustrations that include portraits of amateur actors and theatre builders, maps of the town, and photos of the theatres. The talented and dedicated actor-settlers-including Fort Whipple's Fannie Kautz, wife of the Civil War hero General August V. Kautz; and attorney Thomas Fitch, "The Silver Tongued Orator of the Pacific" who founded the Prescott Amateur Dramatic Club-lived lives that were almost as dramatic as the comedies and melodramas that thrilled the local audiences. With a scholar's eye for the relationship between people and events and a dramatist's sense of a good plot, Collins has put together a valuable history of the actors, "opera houses," and the tastes and culture of Arizona's Wild West mining town between 1868 and 1903. Of special value for those interested in territorial history but unfamiliar with the post-Civil War theatrical repertoire are the author's concise but entertaining plot summaries of plays like "Led Astray, Lady Audley's Secret, Damon and Pythias, East Lynne, Richelieu," and the outrageously funny one-act farces in which Fort Whipple's military officers and Prescott's lawyers, businessmen, mining magnates, and their talented wives and daughters took time out from the rigors of frontier life to strut and fret their hour upon the stage.
📒A Charge Intended To Have Been Addressed To The Wife Of A Minister At The Ordination Of Her Husband And The Wife S Advocate A Sermon ✍ William Jay
✏Book Title : A charge intended to have been addressed to the wife of a minister at the ordination of her husband And The wife s advocate a sermon
✏Author : William Jay
✏ISBN : OXFORD:555099880
✏A charge intended to have been addressed to the wife of a minister at the ordination of her husband And The wife s advocate a sermon Book Summary :
📒Broken Images ✍ Sunil Jha
✏Book Title : Broken Images
✏Author : Sunil Jha
✏Publisher : Partridge Publishing
✏Broken Images Book Summary : Abhinav Sharma comes to a big city from a small nondescript town with his newly married wife in search of a living. After initial struggles he achieves a degree of success in the city. Just when he thought that he has achieved a commendable position in society, his world comes crashing down by a quirk of fate. Not only it is his financial standing that crashes but his family too begins to disintegrate. He weathers the crisis with a great deal of effort but in the process something breaks down inside him. He is disillusioned with the city life and with his family too. He wants to return to his roots to find some solace in life but he cant abandon his wife and his son. It is not his love for them but his sense of responsibility that compels him to stay back and set things right for them. He regains his financial position but he cannot redeem his family which falls apart. He unsuccessfully tries to fill the void within himself by going to another woman. After he has settled his wife and his son comfortably in life, he leaves for his native place where he finally settles down and finds some contentment in life in his vocation and in Lutia with whom he forms a symbiotic relationship. This is a story of his karma and its retributive justice.
📒Between Us Only ✍ Majid Said Nasser Al Suleimany
✏Book Title : Between Us Only
✏Author : Majid Said Nasser Al Suleimany
✏Publisher : Trafford Publishing
✏Between Us Only Book Summary : The Sequel - Between Us Only! This is The Sequel - Between Us Only - Book Two - from his First Book of the same name. The book contains series of articles that had appeared during the last three years in his column in The Oman Daily Observer (English Daily). The subjects cover varies from week to week but range from Socio-political, Social, Economic, Family, Educational, Omanisation (Localisation), Training & Development, International arena and scenarios etc. Book Two contains equally interesting subjects and topics. A.02 - About The Book - Psychology of Arab Management Thinking. For a long time now, I have been putting off the idea of writing this book - though it had been on my mind for a long time now. The mere idea of writing this book scared me to bits and pieces - for many valid and pertinent reasons. As Arabs, work is worshipped (Islamic Religion calls on us to respect work like as if it is in praying). We are also brought up to be polite, courteous and decent (at least a majority of us). Abrupt, ugly, rudeness and distort are discouraged. Also it is not easy to say NO - as part of the culture, customs, traditions and heritage. So what went wrong here - especially in Management circles? Why are we behind the rest of the world, despite all our riches and resources? I hope you will enjoy the book. I have tried to be as frank, open, forthright, honest, sincere and genuine as I can - as Readers who know me can give credence and credibility to me and will vouch and authenticate my works. It is a no punch-spared, no barrels held stiff, no frills - play but to be as frank, open and honest as possible - so it can be a learning process for this generation and others to come in the future. I have not spared myself, so there is just for it to be honest, sincere, genuine and hard hitting - sparing no one. Just No One. A.03 - About The Author (Both Books). The Writer, who is a Human Resources Professional and Expert, is also a weekly Column Writer in The Oman Daily Observer Features under 'Between Us Only'. He started writing as a hobby when he was 12 years old, and his first project in writing (My Most Vivid Dream) had won him a National Award. His style of writing is 'with a fresh approach and direct from the heart' and as if speaking to you directly, having known you and using personal experiences and exposures - and examples to illustrate his points, views, and suggestions - characteristics of his writing style. Many of his famous widely acclaimed read articles have been compiled into his first book and cater for different tastes and likes - covering almost everyone - from the Student to the CEO, from the child, teenager to Grand Parents! He is married with three daughters and son (married), daughters first being twins (married with grandchildren).
white space is not your enemy pdf
|
cc/2020-05/en_middle_0102.json.gz/line2190
|
__label__wiki
| 0.521166
| 0.521166
|
Homepage > On Point Blog Tour......by Annabeth Albert
On Point Blog Tour......by Annabeth Albert
Title: ON POINT
Series: Out of Uniform, Book 3, but each book is a stand-alone HEA w/ a new couple in each book
Author: Annabeth Albert
Heat Level: 4 - Lots of Sex
Pairing: Male/Male
Length: 78,000 words
Genre: Romance, contemporary romance, military romance, SEALS
Goodreads - https://www.goodreads.com/book/show/34462101-on-point?from_search=true
Never fall for your best friend…
Pushing thirty, with his reenlistment looming, decorated navy sniper Maddox Horvat is taking a long look at what he really wants in life. And what he wants is Ben Tovey. It isn't smart, falling for his best friend and fellow SEAL, but ten years with Ben has forged a bond so intimate Maddox can't ignore it. He needs Ben by his side forever—heart and soul.
Ben admits he likes what he's seen—his friend's full lower lip and the perfect muscles of his ass have proved distracting more than once. But Ben's still reeling from a relationship gone to hell, and he's not about to screw up his friendship with Maddox, too.
Until their next mission throws Ben and Maddox closer together than ever before, with only each other to depend on.
Now, in the lonely, desperate hours awaiting rescue, the real challenge—confronting themselves, their future and their desires—begins. Man to man, friend to friend, lover to lover.
The rain pelted down as he made his way up the ridge, thick sheets that obscured his vision and made the terrain slippery and treacherous. Overhead, a large black bird with a colorful beak swooped in, almost sending Ben skidding into a ravine.
He whistled low, a deliberate pattern, one of the team’s signals. He repeated the sound as he approached where Maddox was supposed to be. An answering signal came from a dense thicket of green vegetation.
“It’s me. Hold your fire,” Ben called as he slipped into the mass of trees and roots. The plants here were nothing like the ones back home—giant heart-shaped leaves and bright rubbery flowers that almost looked bird- or insect-like. The trees had massive, visible roots covered with moss, and were connected by thick vines that could easily be mistaken for a deadly snake.
Below him, he could see the encampment, SEALs scurrying around. The injured hostage and Issacson, their wounded radio man, were carried out, which had to mean the chopper was close. Time to haul ass. “Maddox?”
“Here.” Maddox slid out of the shadows, rifle at the ready, just as Ben had expected. “Com’s down for you guys too?”
“Yup. Chopper’s coming in. LT sent me to bring you in. No time to waste. Issacson took a bullet, but he’s stable, and one of the hostages is in bad shape. Possible hostiles escaped, but Rogers and company are hunting them down.”
“Got it. Lead the way.” Maddox let Ben take point as they made their way down the ridge. They had to skirt the edge of a steep drop, every muddy step cautious even as they needed to make haste.
Crack.
Whoosh.
Two things happened at the same instant—gunfire broke out above them and a chopper approached, engine noise making it hard to track the source of the shots. But Maddox was already on it, crouching low, rifle ready. Another shot whistled over their heads and Maddox returned fire. They both left the trail and headed into the brush, intent on finding the hostiles.
The chopper circled low, then went back up. Fuck. The chopper was struggling to land in the encampment clearing, which meant the next pass was critical. Still staying low and gun ready, he inched forward. No more gunfire had followed Maddox’s, but that didn’t mean he could let his guard down for a second.
The chopper circled again, but the terrain had shifted and Ben could no longer see the encampment beneath them.
“Fuck.” Maddox never cursed, so Ben whipped his head around just in time to see Maddox slipping off the poor excuse for a trail.
Ben scrambled on his stomach, stretching out an arm, trying to catch Maddox. “Grab on.”
“No. Don’t—” Maddox didn’t get the sentence out before they were both tumbling down the muddy incline, heading straight for the ravine that lay between them and the encampment. Ben tried to slow their descent but his attempt to grab at some vines only resulted in the foliage following them down.
Maddox screamed, a legitimate yell that chilled Ben to his boots because Maddox never lost composure. Ever. Ben had once watched Wizard put sutures in Maddox’s scalp while Maddox hummed, never dropping his tune.
Ben grabbed for him again and— Pop. Ben’s arm pulled at an unnatural angle, caught up in a tree root and not Maddox’s strong grip as he’d intended. He wrenched loose but the damage was already done, and still he slid, mud carrying him faster, rocks and vegetation raining down after them.
“Fuck. Fuck. Fuck.” Ben’s arm and shoulder were on fire and he was still moving, sliding, nothing working—
Boom. The bottom of the ravine arrived without warning, a muddy bog that sucked him down, but it was hardly a soft landing, rocks and plants poking at him. His arm had him cursing, eyes watering. He’d seen Rogers dislocate a shoulder last year in the grinder obstacle course, and at the time he’d rolled his eyes at how Rogers had carried on. He had a sick feeling that he’d done the same or worse to his shoulder, and he got the urge to cry and howl.
“Oh fuck.” His stomach heaved and he barely made it to his side before he threw up from the pain. He turned his head and almost lost his guts again. Maddox lay a few feet from him, leg at an unnatural angle, blood dripping from his head, helmet nowhere to be seen. Not talking or cursing.
Clawing at the rocks with his good arm, Ben pulled himself closer, looking for the telltale rise and fall of Maddox’s chest—and not seeing it.
“You are not fucking with me,” Ben growled. “Mad? Come on, man.”
Still nothing, not even a ghost of movement across Maddox’s pale lips. Terror, nothing Ben had ever known before, froze his veins, made him lightheaded from more than just the fall. He refused, utterly refused to live in a world where Maddox wasn’t okay.
“Maddox. Horvat.” He shook his shoulder, cursing under his breath. No, no, no.
Whoosh. A chopper—the chopper—flew overhead, much too far to spot them down this ravine, and heading away from them.
Sputter. Maddox let out a mighty cough. It might have been the most beautiful sound Ben had ever heard, because it meant Maddox was here, that he was fighting, and Ben started to laugh with relief until Maddox spoke. “Heck. They’re leaving us.”
Carina Press: https://www.carinapress.com/shop/books/9781488022630_on-point.html
Amazon: https://www.amazon.com/dp/B06XFSLK5P
Barnes & Noble: https://www.barnesandnoble.com/w/on-point-annabeth-albert/1125776157?ean=9781335999801
Kobo: https://www.barnesandnoble.com/w/on-point-annabeth-albert/1125776157?ean=9781335999801
iTunes: https://itunes.apple.com/us/book/on-point/id1212403484?mt=11
Annabeth Albert grew up sneaking romance novels under the bed covers. Now, she devours all subgenres of romance out in the open—no flashlights required! When she’s not adding to her keeper shelf, she’s a multi-published Pacific Northwest romance writer.
Emotionally complex, sexy, and funny stories are her favorites both to read and to write. Annabeth loves finding happy endings for a variety of pairings and is a passionate gay rights supporter. In between searching out dark heroes to redeem, she works a rewarding day job and wrangles two children.
Website: https://www.annabethalbert.com/
Facebook: https://www.facebook.com/annabethalbert
Twitter: https://twitter.com/AnnabethAlbert
Goodreads: https://www.goodreads.com/author/show/6477494.Annabeth_Albert
Facebook Group: https://www.facebook.com/groups/annabethsangels/
Newsletter: https://eepurl.com/Nb9yv
https://www.rafflecopter.com/rafl/display/555033ec177/?widget_template=589504cd4f3bedde0b6e64c2
|
cc/2020-05/en_middle_0102.json.gz/line2197
|
__label__wiki
| 0.96468
| 0.96468
|
Bristol Rovers get one over Bristol City by winning closely fought Severn Bridge Cup Final
It's the Gas who claim the honours in South Wales
Bristol Rovers won the Severn Bridge Cup on Friday evening at the Newport Stadium.
Rovers' U16s team beat their counterparts at Bristol City by taking the honours via a penalty shoot-out.
The match was played out on a humid evening in South Wales between the local rivals who had earlier knocked out Welsh sides to battle for the local bragging rights.
And despite City taking an early lead and threatening several times, it was Rovers who were victorious.
Sam Heal equalised from close range in the middle of the second half after both teams had come together in fractious fashion at half-time with a rash of yellow cards issued.
Rovers eventually won the contest on penalties after the game had ended all square.
What could happen today in League One? - champions, play-offs and relegation to be decided
The Bristol Rovers Academy Twitter account explained that Harry Thomas Barker saved the first penalty to see it finish 5-4 to the Gas.
Plenty of endeavour was shown from both sides but it's the Pirates who took this one after the Robins won in the Central League Cup at the Woodspring Stadium back in November.
|
cc/2020-05/en_middle_0102.json.gz/line2206
|
__label__cc
| 0.719002
| 0.280998
|
Subscribe For Free Unsubscribe Contact Us Search
About BTNews | Archive | Comment | Soapbox | On Tour | Motoring Index | Cruising | AND FINALLY..
CWT "Business Travel Journalist of the Year" BTJAS 2018 - The awards for outstanding events and business travel journalism
Tweets by BTNewsupdate
YOUR WORDS
Readers are invited to add their comments to any story. Click on the article to see and add.
BTN DISTRIBUTION
BTN also goes out by email every Sunday night at midnight (UK time). To view this edition click here.
The Business Travel News
Edgware HA8 4QF
info@btnews.co.uk
© 2019 Business Travel News Ltd.
Article from BTNews 8 APRIL 2013
Bill Clinton at WTTC
Tomorrow (8 April) sees the start of World Travel & Tourism Council’s Global Summit in Abu Dhabi. Keynote speaker will be former US President Bill Clinton.
With the theme “Tourism for Tomorrow” balancing what it calls – people, planet and profits – it will consider the consumption of resources and possible impacts on society and the wider world. World-renowned environmental speakers will address more than 800 senior private and public executives from the travel and tourism industry.
David Scowsill, President and CEO of WTTC, states: “There are many great examples of companies developing initiatives to respond to sustainability issues.
However, there is still a lot of work to be done. Economic crises and global uncertainty are creating pressures to focus on short-term concerns at the cost of a long-term approach to company success.
The industry needs to raise the bar on the issue and set a clear path. Industry activities need to be centred on the four key principles of accountability, leadership, innovation, and collaboration. Our discussions at the Global Summit will help to bring the industry together to speak with one voice and recognise a common outlook. Through collaboration, the industry can amplify its individual efforts by taking advantage of shared knowledge and industry efficiency”. www.wttc.org
Index/Home page
OUR READERS' FINEST WORDS (All times and dates are GMT)
All comments are filtered to exclude any excesses but the Editor does not have to agree with what is being said. 100 words maximum
No one has commented yet, why don't you start the ball rolling?
Company (Not obligatory)
Country/City
- You must be a registered subscriber using the email address entered to submit a comment, or you will be sent a confirmation email before your comment will appear.
- Your comment will be checked before appearing, which may take several working hours.
|
cc/2020-05/en_middle_0102.json.gz/line2213
|
__label__wiki
| 0.57033
| 0.57033
|
Classes, Desert Artists, Events, Galleries, Museum Exhibits, News
Desertscapes, Armentrout-Welch Collection, Swinnerton and more
by Ann Japenga July 22, 2010 • 0 Comments
March and April 2012 are packed with desert art events crowned by Desertscapes, the third annual Valleywide celebration of desert art. Participants include the City of Palm Desert, the Walter N. Marks Center for the Arts at College of the Desert, the Coachella Valley Watercolor Society, the Desert Art Center, the Palm Springs Art Museum, California Desert Art and others.
Scroll to the end for more non-Desertscapes March and April events. For additional Desertcapes scheduling: http://desertscapes.net/
Desertscapes events:
Opens April 2nd-28th, April 14th reception and Appraisal Day: the Historical Society of Palm Desert presents an exhibit of Jimmy Swinnerton and other early desert painters. Art appraisers Kevin and Diane Stewart generously donated a collection of Swinnerton memorabilia, including his trademark pipes. Meet the Stewarts and local artists who represent the future of desert painting. As an added bonus, the Stewarts will informally appraise your art treasures for $10 an item. (One item free for historical society members). Please call ahead for reservations.
Free, Mondays, Wednesdays, Fridays and Saturdays 10 a.m. to 3 p.m., Reception and appraisal day on April 14 from 12 – 3 p.m., Historical Society of Palm Desert, 72-861 El Paseo, www.hspd.org or 760-346-6588
April 28th. The Artist as Collector: A Tour of the California Desert Art Collection of Lou Armentrout and Mick Welch
Free, 1-3 p.m 760-992-7491. 2996 E. Alta Loma, Palm Springs. (Between Farrell and El Cielo.)
The collectors will share their comprehensive collection of California desert art, along with Lou Armentrout’s original paintings. Artists represented include Jimmy Swinnerton, Sam Hyde Harris, F. Grayson Sayre, Carl Eytel, Gordon Coutts, Jean Mannheim and many others. Watch California Desert Art for an article on the collection.
April 28th The Mojave Desert Land Trust sponsors a paint-out on an environmentally important parcel: The Joshua Tree Wildlife Linkage. Participants include Morongo basin artists, members of the newly-formed desert chapter of the California Art Club and the Coachella Valley Watercolor Society.
The paint out will be followed by an auction of the artists’ work at Joshua Tree Art Gallery.
Free, 9 a.m. through noon. Artist’s Auction at Joshua Tree Art Gallery, 5 pm–7:30. www.mojavedesertlandtrust.org or www.joshuatreeartgallery.com, 760-366-5440.
March 11-17 The Borrego Springs Plein Air Art Invitational, featuring the work of 15 invited artists. This year’s juror is Eric Merrell, a stylish desert painter known for his views of the Salton Sea and Joshua Tree. Eric teaches a painting class March 9-11 For information see www.EricMerrell.com. Reception March 17, from 5-8pm. www.Borregoartinstitute.org
Cholla Gardens in Pinto Basin, by Sue Walters
March 18th Desert artist Sue Walters and glass and bronze sculptor Patrick Blythe (teacher of a class on Art and Spirituality for Osher Institute) along with contemporary impressionist Hergis show work in the Courtyard and Gardens at the Bromley Building , 73-833 El Paseo, 12 to 5 pm. For information: (760) 834-8429.
San Diego and Arizona Eastern Railroad, Goat Canyon Trestle, by Richard Steinheimer.
March 21st A rare opportunity to see the work of world famous railroad photographer and desert rat Richard Steinheimer, at the San Diego Model Railroad Museum. Steinheimer passed away last May; his wife Shirley Burman (also a railroad photographer and historian) curated this exhibit and will attend the opening on March 23rd, from 6-9:30 pm. Steinheimer had an emotional connection to railroads and the desert that was unsurpassed. The exhibit features Steinheimer’s photos of the doomed and defunct San Diego and Arizona Eastern Railroad. Info: http://www.sdmrm.org/
March 24th. Glenda Nordmeyer paints desert rocks and washes with authority, having roamed the land for 40 years. See her work along with that of watercolor landscape artist Michael Atkinson at Adagio Galleries on El Paseo in Palm Desert. http://www.adagiogalleries.com/home
For more on Glenda Nordmeyer, see: http://www.californiadesertart.com/?p=913 Ongoing through May 28. If you find yourself in Flagstaff before Memorial Day, be sure to catch the Shadows on the Mesa exhibit at the Museum of Northern Arizona. Curator Gary Fillmore is well-versed in Coachella Valley art, having written books on Marjorie Reed and Jimmy Swinnerton. Many of the featured artists in this exhibit—Carl Oscar Borg, Maynard Dixon, James Swinnerton, Gunnar Widforss and others—also painted in the Coachella Valley. Gary Fillmore’s accompanying book is a tribute to the artists who visited the Wetherill trading post in Kayenta, Arizona.
http://www.musnaz.org/exhibits/shadows/index.shtml
http://www.bluecoyotegallery.com/TheArtistsofKayenta.htm
Ongoing through May 6th: Edgar Payne: The Scenic Journey at the Crocker Museum. Travelers to Sacramento will want to stop in on this exhibit honoring a well known painter of deserts, Edgar Payne. Payne traveled around in a 1917 Model T Ford, capturing all the California Classic scenes—coastline, Sierras, desert. “He sought vitality, bigness, nobility and grandeur,” says curator Scott Shields. A new book accompanies the show, along with a new documentary about Payne debuting May 3rd. http://www.crockerartmuseum.org/
Edgar Payne, Desert Horseman
Ongoing through the spring. The Desert Institute (the educational arm of the Joshua Tree National Park Association) does its part to nurture new desert artists with its line-up of arts courses. Take advantage of the roomy open-air classroom and check out upcoming classes in watercolor, oil painting night-sky photography, macro (small scale) photography and more. Pick up a Diane Best (one of the finest desert painters working today) T-shirt when you register for a class.
http://desertinstitute.homestead.com/
Diane Best designed T-shirt
Tags: Borrego Art Institute desertscapes Eric Merrell Gary Fillmore Historical Society of Palm Desert Richard Steinheimer
← Terry Masters Reception February 11th
New Gallery for Borrego Springs, Paul Grimm for Sale →
|
cc/2020-05/en_middle_0102.json.gz/line2215
|
__label__wiki
| 0.780227
| 0.780227
|
AMV BBDO and Adam & Eve/DDB in battle of the Christmas ads in Film Lions
by Simon Gwynn June 23, 2016
John Lewis: 'Man on the Moon' by Adam & Eve/DDB
Abbott Mead Vickers BBDO and Adam & Eve/DDB lead the pack for UK agencies in the Film Lions, with their respective Christmas ads for Sainsbury's and John Lewis among the nominations.
"Mog’s Christmas calamity" and "Man on the moon" will be up against entries including Leo Burnett Madrid’s weepy ad for Spain’s Christmas Lottery, which yesterday bagged the joint Grand Prix in the Cyber Lions category.
The two agencies make up the majority of the UK’s 31 nominations – the second most after the US, with 104 – with AMV BBDO getting a total of 12 and Adam & Eve getting six.
AMV BBDO’s tally of 12 is the joint most of any agency, along with Wieden & Kennedy Portland, and also includes six nominations for its work on Currys PC World, three for Guinness, and one each for the Department of Transport and Bodyform.
Adam & Eve is also nominated for John Lewis Insurance, Mulberry, Harvey Nichols, and twice for H&M.
There are also two nominations for Rattling Stick and one apiece for Bartle Bogle Hegarty, Grey London, Iris Worldwide, Leo Burnett London, Lucky Generals, Mcgarrybowen, MullenLowe Group, Ogilvy & Mather London, OgilvyOne London, Outsider and The Union.
Among US agencies, W&K is followed by BBDO New York, with 10, The Martin Agency (Richmond) on eight, and Droga5 (New York) on six.
Retail brands Clothing stores High Street Supermarkets Cannes
Creativity in a Straitjacket
UK takes 23 shortlists in Entertainment Lions
Bowie's dark music video for 'Blackstar' shortlisted for Cannes Music Lion
Google wins Innovation Lion at Cannes for AlphaGo
Cannes Diary: Nils Leonard goes topless with Iggy Pop
|
cc/2020-05/en_middle_0102.json.gz/line2216
|
__label__wiki
| 0.669524
| 0.669524
|
Forever 21 Enters the North Eastern Retail Market on a Chic Note
PTI Last Updated: June 24, 2019 | 14:03 IST
(Eds: Disclaimer: The following press release comes to you under an arrangement with NewsVoir. PTI takes no editorial responsibility for the same.) Guwahati’s style quotient just got 21 notches higher Guwahati, Assam, India (NewsVoir) Forever 21, India’s most loved, international fast fashion brand from Los Angeles,California, part of the Aditya Birla Fashion and Retail Ltd. celebrates the launch of their first ever store in Guwahati on GS road on June 23rd 2019. With the new 11000+ sq. ft. store, you can always count on Forever 21 for a hassle free shopping experience with apparel, footwear and accessories all under one roof, reflecting the latest trends right from runways to the store. With North Eastern states being one among the trendsetters, customers can now explore a plethora of summer trends at the new Forever 21 store. Up your game with this season’s call-outs encompassing Geometric prints, logo tees etc. to suit your mood, apparel in garden floral prints, crochet knits and many more. The store also comes equipped with a plethora of styles from the Men’s collection. Explore your love for laid- back, experimental fashion with trend-setting styles such as dark floral t-shirts, distressed denim jackets, minimalistic printed shirts and much more. Speaking on the launch, Mr. Rahul Jhamb, Head, Business Forever 21, India said, “We are delighted to have launched our flagship Forever 21 store in Guwahati. We know the kind of ardent trendsetters who hail from northeastern states and their love for Forever 21 brand is simply admirable. We are all excited to bring the latest runway and catwalk trends, straight from Los Angeles, to the fashion and trend loving Gen Z millennial, at the hallmark ‘sweet-prices’ of Forever 21. We hope to keep up with the trend setting, uber chic Northeast customer’s requirements.” What’s more, the brand is all set to treat its fans with a bonanza of exciting offers you simply cannot afford to miss! Try your luck from the 24th – 29th of June on Forever 21’s exclusive wheel of fortune. Shop or Rs. 1499 and above and get a chance to spin the wheel. Mark your calendars for 30 June and watch out for the Golden Hanger Hunt. Spot the Golden Hanger at the store and get free shopping worth Rs. 5000. About Forever 21 Forever 21 is a California-based fast fashion brand that entered the Indian market in 2010 and has considerably grown since then. With stores in major cities in the country, it has built a strong market for itself and has already become a brand of choice for many fashion conscious women. In July 2016, Aditya Birla Fashion and Retail Limited acquired the exclusive online and offline rights to Forever 21’s India network. The partnership between Forever 21 and ABFRL marks a milestone in the creation of the largest integrated branded fashion player in India, with a strong foothold in the women’s wear segment, given the growing popularity of fast fashion and the young demographics of the country. Forever 21 in India offers clothes and accessories for Men, Women and Girls. With growing demand for its trendy street wear and subtle contemporary pieces, the brand launched its exclusive website (www.Forever21.in) for the Indian market in June 2014, and now reaches out to its customers in over 300 towns and cities of the country. About Aditya Birla Fashion & Retail Ltd. Aditya Birla Fashion and Retail Ltd. (ABFRL) was formed after the consolidation of the branded apparel businesses of Aditya Birla Group comprising Aditya Birla Nuvo Ltd’s (ABNL) Madura Fashion division and ABNL’s subsidiaries Pantaloons Fashion & retail limited (PFRL) and Madura Garments Lifestyle Retail Company Limited (MGLRCL) in May 2015. Post the consolidation, PFRL was remained as Aditya Fashion and Retail Ltd. ABFRL is India’s no. 1 Fashion Lifestyle entity. It hosts India’s largest fashion network with over 11,000 points of sale, which include, close to 2,500 exclusive ABFRL brand outlets. Image 1: Launch of Guwahati Store on GS road Image 2: Guwahati Store on GS road PWR PWR
Modi, Xi, Putin to discuss US' protectionist trade policies on G20 sidelines: China
Policeman commits suicide in Jammu
Luxury car sales in 2019 witness steepest fall in more than a decade
Reliance Industries shares gain 2% in intraday trade; here's why
JNU protests LIVE updates: Section 144 at Mandi House; heavy police deployment outside varsity
Sensex rises over 600 points, Nifty scales 12,200: Ten things to know about the rally
Lunar Eclipse 2020: Date, timing in India, where to watch Chandra Grahan tomorrow
Realme 5i to launch in India today: Here's how to watch livestream; check out price, features
Twitter plans to limit replies in effort to combat online abuse
|
cc/2020-05/en_middle_0102.json.gz/line2220
|
__label__wiki
| 0.969209
| 0.969209
|
J.Crew Says The Golden Days Are Back, But Customers Aren't Buying It
"We design clothes to last a decade, not a season," the retailer says. Shoppers still aren't convinced.
By Sapna Maheshwari
Sapna Maheshwari BuzzFeed News Reporter
Posted on May 25, 2016, at 5:21 p.m. ET
jcrew.com / Via hello.jcrew.com
J.Crew has spent the better part of a year telling customers that the old J.Crew is back. But it hasn't paid off just yet.
The J.Crew brand's sales fell for a sixth straight quarter, declining 6% to $481 million in the three months ended April 30, it said today. Sales at Madewell, which accounts for less than one-fifth of the company's annual sales, rose 17% to $73 million. Overall, company sales fell 3%.
J.Crew's finance chief said on a conference call that the decline was driven by a "challenging traffic environment." CEO Mickey Drexler and executive creative director Jenna Lyons didn't speak on the call.
J.Crew has been highlighting the merchandise it's best known for.
BuzzFeed News / Via J.Crew
While it's been a rough start to the year for most clothing companies, J.Crew is fighting more than that. Customers have complained in the past year-and-a-half that the brand has drifted too far from its roots, criticizing its steep prices — especially on fashion-forward styles that don't fly in typical office jobs — inconsistent fits and quality.
In response, the retailer said in August that it was refocusing on its "heritage" merchandise, and has since launched a #JCrewAlways campaign to highlight its classics. It has included "What We Do" sections in its monthly catalogs focused on items like chinos and ballet flats.
In March, its catalog opened to a page outlining the J.Crew belief system, with lines like "we design clothes to last a decade, not a season" and "we consider leopard a neutral and think polka dots go best with more polka dots."
buzzfeed news / Via jcrew
It has also brought back former models and highlighted key items like blazers on a section of its website called "The Always List."
Drexler, the CEO, sent an email to customers last month describing a recent morning that started with Springsteen tunes at the gym and led to J.Crew's SoHo store, where he says a woman walked up to him and said, "My J.Crew is back." He urged customers to check out its stores and website and email him with any thoughts on what the brand could do better.
John Jannuzzi @johnjannuzzi
01:05 PM - 23 Apr 2016
J.Crew's annual sales fell to $2.5 billion last year from $2.6 billion the the year before. While the company's Madewell unit has been thriving, it accounted for only 12% of the retailer's most recent annual revenue.
The company has been investing in more of its new J.Crew Mercantile stores, which are a way to sell J.Crew Factory’s cheaper, made-for-outlet goods in traditional malls and shopping centers. It said in March that it plans to end this year with 40 such locations. J.Crew's outlet goods are also sold online.
At the end of April, J.Crew had 287 full-price stores, 164 outlet locations and 106 Madewell stores.
jcrew / Via jcrew.com
Sapna Maheshwari is a business reporter for BuzzFeed News and is based in New York. Maheshwari reports on retail and e-commerce.
Contact Sapna Maheshwari at sapna.maheshwari@buzzfeed.com.
|
cc/2020-05/en_middle_0102.json.gz/line2221
|
__label__wiki
| 0.559168
| 0.559168
|
Portal Documentos
Trabajo Precario
Trabajos en la Industria Forestal
Empresas multinacionales
Certificación Forestal
Campañas Deportivas
Derechos de Trabajadores Migrantes
Temas especiales
Sectores en acción
Madera y silvicultura
Convenciones y estudios
Sector de la Construcción
Industrias Aliadas
Estudios & Publicaciones
Trabajadores migrantes
Convenciones y guias
Conoce tus derechos
Infórmese!
¡Actúe Ahora!
Africa & Oriente Medio
Regiones en Movimiento
Congress - Seguimiento
Miembros electos
Fótos & Videos
Estatutos & Informe de Actividades & Informe del congreso
Fotos de la galería
Internacional de trabajadores
de la construción y la madera
Mensaje del secretario general
Política de la ICM
BWI calls for a social approach to forestry certification at the PEFC General Assembly
On Thursday forest certification organisations from all over the world came together in Geneva for the General Assembly of the PEFC (Programme for the Endorsement of Forest Certification).
The rapid global deforestation is a major contributor to greenhouse gas emissions that cause global warming. The unsustainable practices also threatens forestry workers, indigenous populations and other forest dependent communities.
"What are you willing to do to fight for not only sustainable forests but for sustainable development?" said Ambet Yuson, General Secretary of the BWI when speaking for the Assembly. He emphasized that the PEFC needs to put larger focus on the rights and working conditions of the 15 million workers worldwide who depend on the forest for their survival.
Rightly managed, forestry production can help curb global while at the same time creating more sustainable and decent jobs for workers. The BWI recognise that programs such as PEFC and FSC has a key role to play both to make forestry companies take responsibility.
"Poverty and inequality stand first in line as prime drivers of deforestation and forest degradation. This is true in rural areas of OECD countries as it is in the poorest high forest cover countries in the world. The actions and consequences of how forest dependent populations and forests suffer may differ but the drivers are universal. Your next round of standards must recognize this and put in place frameworks to help change this," said Ambet Yuson.
The Programme for the Endorsement of Forest Certification (PEFC) is an international, non-profit, non-governmental organization which promotes sustainable forest management through independent third party certification. The BWI has been a partner of the PEFC since the organization was first founded in 1999.
"We are ready to expand our partnership if you are, the choice is yours," he concluded.
Albert YusonGeneral Secretary
Mensaje de fin de año del Secretario General de la ICM 18/12/17 15:38
Discurso del secretario general de la ICM en la CIT - 9 junio 2017 13/06/17 09:43
BWI Statement of support for the GFBTU Bahrain 12/06/17 09:10
Solidaridad del secretario general de la ICM al congreso FILCA-CISL, Italia 6-8 junio 2017 08/06/17 15:06
South Korea: BWI urges new President to protect human rights 07/06/17 14:39
Asia-Pacific: BWI-AP joins 94 other civil society groups saying NO to investors suing states in RCEP 07/06/17 13:51
Suiza: Ginebra se opone al dumping salarial 07/06/17 10:19
Mensaje de solidaridad del primer de mayo : Amandla! ¡Poder al pueblo! 30/04/17 00:57
Día Internacional de los Bosques: ¡No olvidemos el papel de los trabajadores forestales! 20/04/17 13:14
Seasons greetings 05/01/17 12:21
Ataque en Cairo 05/01/17 11:38
South Korean Police Ransack Trade Union Office 19/07/16 12:43
BWI condemns the killing of Cambodian political analyst Kem Ley 19/07/16 12:37
The BWI Condemns Five-year prison sentence of KCTU President, Han Sang Gyun 11/07/16 11:47
Lithuania: BWI shows solidarity with the Anti-New-Labour-Code Protesters in Vilnius 30/06/16 10:55
BWI Solidarity Statement with the victims of Turkey terror attacks 30/06/16 10:50
Historic founding of new union federation in Spain 31/05/16 07:06
Ambet Yuson inaugurated the Africa and Middle East Regional Office in Johannesburg 31/05/16 06:51
11 workers killed in Rio Olympics projects – BWI calls for independent investigation 16/05/16 09:20
FIFA is finally taking the first step 25/04/16 13:08
Bring back the kidnapped cement workers! – The BWI condemns the brutal mass abduction in Syria 21/04/16 13:22
Big fire at the construction of Qatar’s largest mall 06/04/16 12:21
Strike on the 2018 World Cup Stadium in Nizhniy Novgorod 06/04/16 11:39
UN expert concerned over threats to democracy in South Korea 06/04/16 09:50
BWI Statement for International Day of Forests 05/04/16 15:27
Climate change can't be stopped without social justice 05/04/16 11:08
BWI condemns terror attacks Belgium, Iraq, Ivory Coast and Pakistan 05/04/16 08:51
BWI demands for immediate investigation on death of Filipino construction worker in Qatar 05/04/16 08:48
Workers face dangerous working conditions and unpaid wages before the 2018 Pyeongchang Winter Olympics 05/04/16 08:47
Worker Killed in Metro Project in Qatar 05/04/16 08:45
BWI Statement of Support for Lula da Silva 05/04/16 08:44
On International Women’s Day: End violence against all women, regardless of migration status 05/04/16 08:43
International Women’s Day 2016 - Value Women’s Work! 05/04/16 08:41
IWMD: “Strong laws. Strong enforcement. Strong unions.” 05/04/16 08:37
BWI at South Korean mass mobilisation against labour reform 05/04/16 08:21
BWI Supports the General Strike in Morocco 05/04/16 08:20
This Friday FIFA’s Choice is Simple: Human Lives Matter! 05/04/16 08:14
The BWI strongly condemns the attack on Amran Cement Factory in Yemen 05/04/16 08:11
BWI in solidarity with Fiji after cyclone 05/04/16 08:09
Solidarity with unions and activists opposing the TPPA signing 05/04/16 08:04
Bro Mohd Khalid bin Atan: Celebrating his lifelong contribution to the trade union movement 05/04/16 08:02
Obituary: Mohd Khalid bin Atan 05/04/16 07:47
“We are not affraid” – The BWI condemns recent series of terror attacks 05/04/16 07:45
Philippine Labour Leader Democrito “Kito’ Mendoza Passes Away at 92 05/04/16 07:43
BWI Mourns the Death of William Van der Straeten from EFBWW 05/04/16 07:39
Solidarity with imprisoned construction workers in South Korea 05/04/16 07:36
BWI calls for a social approach to forestry certification at the PEFC General Assembly 04/04/16 13:24
PrioridadesSindicatoJobsDerechosSPECIAL ISSUESSectores en acciónBUILDING CONSTRUCTIONBUILDING MATERIALSwood and forestryALLIED INDUSTRIES
Regions in movementActúe ahoraCampaignsCampaignsMigrant WorkersSportsSoLidarityMultinationals
Get InformedNoticiasEvents
|
cc/2020-05/en_middle_0102.json.gz/line2222
|
__label__wiki
| 0.707567
| 0.707567
|
Home / Car News / Nissan Leaf Accenta+ introduced in UK
Nissan Leaf Accenta+ introduced in UK
One of the most popular eco-friendly vehicles in the UK, the current Nissan Leaf receives a new trim level, meant to enhance its appeal to local customers.
The new Acenta+ sits between the Acenta and range-topping Tekna model and will be on sale from July 1st. The new Acenta+ is equipped with a 6.6 kW on-board charger as standard, along with a Mode-3 32 amp (EVSE) cable.
Previously available only as an option, the 6.6 kW charger allows owners to perform a 0-100% charge in just four hours. The look is enhanced with the help of new 17-inch Autech wheels, finished with distinctive blue accents on the offset spokes.
Despite the Acenta+’s additional equipment count, buyers can have it for £29,740, which is £1,150 more than the standard Acenta. With the Government’s Plug-in Car Grant applied, the price falls to £24,740.
Commenting on the addition of the new Acenta+ to the UK LEAF range, James Wright, Managing Director, Nissan Motor Great Britain said: “We’re delighted to add a new member to the LEAF family in the UK. More than 9,500 LEAFs have already been sold here and Nissan is the undisputed leader in the EV market.”
PREVIOUS 02 Jul 2015
Honda Civic Type R rolls of the line at Swindon plant
NEXT 02 Jul 2015
Audi Q7 first tuning programme
|
cc/2020-05/en_middle_0102.json.gz/line2224
|
__label__wiki
| 0.617037
| 0.617037
|
AwardsShorts
Watch At Least Half Of The 2019 Shortlisted Oscar Shorts For Free
By Amid Amidi | 12/17/2019 11:44 pm | Be the First to Comment!
The Academy of Motion Picture Arts & Sciences has announced the 10-film shortlist of animated shorts that will advance in the voting process for the 92nd Academy Awards, and at least half of those films are currently available to view for free online.
The 10 shorts were selected from a record 92 submissions in the category.
A caveat: the availability of these shorts is subject to change at any moment. If you want to make sure you see all of these shorts, watch them promptly — and definitely before Monday, January 13, 2020, when the Oscar nominations are announced and the field is whittled down to just five films. Scroll down to watch the five currently available shorts, in alphabetical order.
And to the other five filmmakers who haven’t yet made their films available: WHAT ARE YOU WAITING FOR?
Hair Love — Matthew A. Cherry, Everett Downing Jr., Bruce W. Smith (U.S.)
Hors Piste — Léo Brunel, Loris Cavalier, Camille Jalabert, Oscar Malet (France)
Kitbull — Rosana Sullivan (U.S.)
Sister — Siqi Song (U.S./China)
Uncle Thomas: Accounting for The Days — Regina Pessoa (Portugal/Canada/France)
Read More: Academy Awards Bruce Smith Camille Jalabert Everett Downing Leo Brunel Loris Cavalier Matthew Cherry Oscar Malet Oscars Regina Pessoa Rosana Sullivan Siqi Song
Location: Canada China France Portugal
|
cc/2020-05/en_middle_0102.json.gz/line2225
|
__label__cc
| 0.638052
| 0.361948
|
Home » Exclusives » Toyota won’t launch Lexus in India!
Toyota won’t launch Lexus in India!
By CarToq Editor - January 4, 2013
Toyota had earlier announced that they would launch their Lexus brand in India in 2013. However the arrival of Lexus in India has been indefinitely postponed due to several issues.
In 2011, Toyota had declared that Lexus would be brought to India around 2013 but due to economic uncertainties the launch has been pushed. It is not clear when Toyota will bring Lexus to India and even the arrival of the Infiniti brand of cars has been put on hold. We had earlier reported that Lexus would come to India, you can read more about Lexus cars here: Toyota considering bringing Lexus to India
He Lexus brand of cars were initially meant to come to India via the CBU (completely built units) route but the high import taxes have made this unviable. The taxes were last bumped up in 2012 and the depreciation of the India Rupee caused by the economic slowdown has further hampered Toyota’s plans. This along with other factors means that bring Lexus to India would not have been profitable for Toyota.
Many had been waiting for Lexus to come to India but now it seems that the wait is going to be much longer. This is however a wise move on Toyota’s part has luxury car sales have not been very rewarding for current market players either. Even popular and much coveted brands like BMW and Mercedes Benz haven’t had the best sales figures over the last year.
The only practical way of bringing Lexus to India in the present scenario would have been localization. Sadly, it seems that Toyota has no plans for local production as of now as it would require a huge investment and the returns do not seem very lucrative as of now. Other car manufacturers too may take cue from Toyota and postpone their entry into the India market.
[Source: Motorbeam.com]
« Shocking: Maruti prices Ritz Automatic Rs.41,000 higher than Honda Brio Automatic
Maruti Suzuki Sx4 face lift to be launched soon! »
|
cc/2020-05/en_middle_0102.json.gz/line2226
|
__label__wiki
| 0.882681
| 0.882681
|
SS-Major Horst Kopkow
From the Gestapo to British Intelligence
Stephen Tyas
The story of Gestapo officer Horst Kopkow, who was responsible for coordinating the tracking down of all British and Soviet parachute agents in Europe. He was directly implicated in the concentration camp murders of several hundred agents. Despite this, Kopkow was a consultant with Britain's Secret Intelligence Service for 20 years after the war.
Dimensions : 9.25 X 6.15 inches
On 27 May 1942, SS General Reinhard Heydrich was assassinated by British-trained Czech agents who had parachuted into Czechoslovakia. He died of his wounds on 4 June 1942. Two days later, Gestapo Captain Horst Kopkow’s department at Reich National Security HQ was given fresh directions. From 6 June 1942 until the end of the war, Kopkow was responsible for coordinating the fight against Soviet and British parachute agents dropped anywhere in Germany or German-occupied territories. This new direction for Kopkow made his name. Within months the “Rote Kapelle” Soviet espionage ring was uncovered in Belgium, who could be traced directly to Berlin and Paris. A new counterespionage fight had begun, and any agents caught would pay with their lives. In France and Holland the Gestapo caught many Special Operations Executive agents trained in Britain. By spring 1944 almost 150 British agents had been caught and deported to German concentration camps, and almost all had been murdered without trial by the December. Kopkow was directly involved in these murders. Arrested by British forces after the war, Kopkow was extensively interrogated due to his counterespionage experience. For the next 20 years, Kopkow was a consultant for Britain’s Secret Intelligence Service.
Stephen Tyas is a former businessman now freelance researcher and historian. He has written numerous articles about Nazi security service operations in Eastern Europe and the Holocaust. He regularly participates in workshops and symposiums to discuss his research. His first book, ‘Himmler’s Diary 1945’, written jointly with the German historian Peter Witte, was extensively researched over 6 years.
SS-Major Horst Kopkow Reviews
Digging for Hitler
David Barrowclough
Bomber Squadron
Martyn Ford-Jones
Napoleon & Betsy
Lucia Elizabeth Abell
A History of RAF Drem at War
Malcolm Fife
Voices from Britain
Henning Krabbe
History of the de Havilland Vampire
David Watkins
Graham Williams
Everyday Life of a Soldier on Hadrian's Wall
Paul Elliott
|
cc/2020-05/en_middle_0102.json.gz/line2227
|
__label__wiki
| 0.831469
| 0.831469
|
Critical Condition Investigation
Castlegar Rebels
Castlegar Vacation Guide 2017
Route 3 Summer
Kootenay-Columbia candidate talks up NDP federal election platform
Wayne Stetski outlines election ‘commitments’ to Canadian voters for upcoming fall campaign
Trevor Crawley
Jul. 16, 2019 10:50 a.m.
While the writ has yet to drop for the fall federal election, the NDP has begun it’s campaign in earnest, by releasing their election platform that focuses on commitments to voters titled a ‘New Deal for People’.
NDP candidate Wayne Stetski, the Kootenay-Columbia incumbent parliamentarian, lauded the plan, which addresses issues such as affordability, climate action, the economy, reconciliation, and strengthening communities.
“Basically, our focus is on a new deal for people,” said Stetski. “…when you look at Canada as a whole, we live in one of the nicest, greatest countries in the world, I truly believe that. For me, when I look at what Canada can be, and what we should strive for, I get really excited about the kind of country that we could be.”
Stetski singled out issues such as affordable housing, affordable daycare, universal health care and affordable post-secondary education options, and climate change noting that all are common themes from voters around the riding.
Affordable daycare is one particular issue that has been raised by families and business owners, he said.
“There was an issue in Cranbrook recently where another daycare closed because they couldn’t find qualified people to work at the wages that generally people working in daycare get paid,” Stetski said. “So it’s a two-edged sword; we need affordable daycare but we also need to make sure that people who are providing the service are appropriately compensated.”
He noted that he toured the riding three years ago for a series of workshops with local businesses to hear their feedback on issues, expecting to hear concerns over taxes and red tape.
“What I heard instead was the lack of affordable housing and the lack of affordable daycare were the top two concerns for small businesses in the Kootenays and that was consistent throughout Kootenay-Columbia,” Stetski said.
The platform pledges $1 billion investment for childcare by 2020 and growing it alongside provinces and territories. For affordable housing solutions, the platform pitches a commitment to add 500,000 units over 10 years, waiving the federal portion of GST/HST on construction of new affordable units and reintroducing 30-year CMHC-insured mortgages.
Stetski singled out universal healthcare and noted the platform calls for expanding health care coverage to include eyes and ears.
A key aspect of the platform outlines an annual $10 billion investment for a prescription drug coverage plan.
“Staying healthy should involve using your health care card, not your credit card,” Stetski said.
For higher education, Stetski said an immediate goal is to eliminate interest on student loans, but adds that a longer term vision is to treat post-secondary as an extension of the public education system.
“Eventually, we would like to see college and university become part of the overall education system, the same way that our kids all get to go to preschool through Grade 12,” Stetski said. “Unfortunately, it’s not at no cost, but relatively small costs; there often are extra fees these days associated with materials for the classrooms, but we’d eventually like to see colleges and universities included in that public education.”
Calling climate change “the most serious environment issue of our time,” Stetski said there needs to broad approach that includes reducing greenhouse gas emissions and a transition to a green energy economy.
“You cannot decide that tomorrow, you turn off oil and gas in Canada — that is, from my perspective, unrealistic and not the way to go,” Stetski said. “But we do need to transition to a green energy economy and we have to put the steps in place to both deal with greenhouse gas emissions and transition workers into the new economy and to do that, you need to have a plan and a strategic approach to get there.
Stetski adds that the NDP is having the parliamentary budget officer review elements of the platform and look at the costing of the proposals. The NDP plan also calls for a one per cent wealth tax on Canadians with a net worth over $20 million as well as strengthening enforcement around tax evasion.
Another key election promise is electoral reform and a move from First Past the Post to a mixed member proportional representation system, says Stetski. The plan calls for the establishment of an independent citizen’s assembly to come up with options to implement the new electoral system, with a referendum to follow once voters have the chance to test and compare it to First Past the Post.
Stetski will be running against Rob Morrison (Conservative Party of Canada), Rick Stewart (People’s Party of Canada) and Abra Brynne (Green Party of Canada). A Liberal Party of Canada candidate for the riding has yet to be delcared.
trevor.crawley@cranbrooktownsman.com
IIO recommends charges after B.C. man dies following arrest involving pepper spray
RCMP investigating alleged ‘sexual misconduct’ by cyclist on BCIT campus
Open house on gypsy moth aerial spray program in Castlegar
Come have your say about the proposed spray program
Castlegar poppy campaign tops $16,000
Money will support local Air Cadets
Explore Castlegar News
Castlegar Weather
Castlegar Classifieds
© 2020, Castlegar News and Black Press Group Ltd.
|
cc/2020-05/en_middle_0102.json.gz/line2228
|
__label__wiki
| 0.865196
| 0.865196
|
A year later, cloud remains over Development and Peace funding
The status of Development and Peace as a Catholic charity in good standing hangs in limbo with no end in sight to a year-old review of some of the agency’s partnership agreements.
Published in Canada
Canadian aid gives new life to villagers hit by typhoon in the Philippines
Six years after the devastation of Typhoon Haiyan (Yolanda), the people of Tacloban, Philippines, are starting a new life thanks to Development and Peace - Caritas Canada.
Published in International
Catholic Women's League puts D&P funding on hold
While strongly endorsing the mission and work of Development and Peace, the Catholic Women’s League is asking its parish councils to hold off on sending funds to the organization as Canada’s bishops continue to investigate D&P’s project partners.
ShareLife campaign hits record to support more than 40 agencies in need
For the first time in ShareLife’s history, Catholic parishioners have crossed the $13-million threshold when it comes to helping those most in need.
Kavanaugh shares how Catholic Charities influenced his life
WASHINGTON – During the second day of his Supreme Court confirmation hearing before the Senate Judiciary Committee Sept. 5, U.S. Appeals Court Judge Brett Kavanaugh said his experience serving the homeless with Catholic Charities and tutoring at Washington Jesuit Academy has influenced him as a judge because of the importance of "standing in the shoes of others."
Federal government makes ambitious plans for poverty reduction
Over the next 12 years the federal government promises to raise 2.1 million Canadians out of poverty and take Canada’s poverty rate from one in every eight Canadians to one in every 17 Canadians by 2030.
Catholics distribute aid for victims of deadly Indonesian earthquake
JAKARTA, Indonesia – Catholic groups have collected and are distributing aid for thousands of people affected by a deadly earthquake that struck Lombok, Indonesia's popular tourist island.
ShareLife adds some sunshine to summer
Amos Lee couldn’t get enough of summer camp.
ShareLife parish campaign brings out the best in students
About 20 students at St. Elizabeth Catholic High School stayed after school every day last week — and it had nothing to do with being punished.
Give back Summer Jobs funding, bishops urge after dozens of Catholic groups applied
OTTAWA – Despite stern opposition from Canada’s bishops to the revised Canada Summer Jobs program, dozens of Catholic organizations — including parishes, schools, religious orders and charities — apparently applied anyway and are now in line to receive grants.
Halton school board suspends 'Sanctity of life' fundraising policy
HAMILTON – A Catholic school board in Ontario has suspended a policy prohibiting students from raising money for groups that support activities contrary to Catholic doctrine.
Ontario cities target payday loan shops
The sin of usury has come to the attention of city planning committees across Ontario as they begin to craft zoning laws to control the spread of payday loan stores.
Editorial: A blast from the past
Here we go again. Development and Peace, an organization created by Canada’s bishops, is back on the hot seat over allegations it failed to properly screen some overseas partners. At least 11 dioceses have withheld funds from the organization after suggestions that several of its partner agencies are offside on issues that include abortion, contraception and gender theory.
Published in Editorial
Twelve Canadian bishops withholding funds to Development and Peace
Twelve Canadian bishops, including Cardinal Thomas Collins of Toronto, are withholding contributions to the Canadian Catholic Organization for Development and Peace following preliminary research that indicates some of the Catholic agency’s partners may be connected to abortion or artificial contraception.
Halton Catholic School Board to support only Catholic charities
A new mandate from trustees of the Halton Catholic District School Board to allow its schools to give donations only to a specific list of charities that uphold Catholic values sets it apart from other nearby Catholic school boards.
|
cc/2020-05/en_middle_0102.json.gz/line2231
|
__label__wiki
| 0.784906
| 0.784906
|
Chicago Personal Injury Attorney
(844) 515-2223 En Español
Mass Transit Liability
Defective Railroad Signals
Asbestos / Mesothelioma
Timothy Cavanagh
Stacey Cavanagh
Patrick Richel
Sean P. Kelly
Illinois Super Lawyers Recognizes Cavanagh Law Group Attorneys
Cavanagh Law Group
Firm News /
Cavanagh Law Group is proud to announce that Tim Cavanagh has been named an Illinois Super Lawyer for 2010. Mr. Cavanagh has been recognized as a Super Lawyer every year since its inception in 2005. Matt Rundio, a partner at Cavanagh Law Group, was recognized as a “Rising Star” for the third consecutive year. Jeff Escher, an associate, was named a “Rising Star” for the first time.
Attorneys who were recognized on the Super Lawyers List were nominated by their peers. The Illinois Super Lawyers List was sponsored by Law & Politics, a legal trade journal. Lawyers in Illinois were sent ballots and asked to vote for the best lawyers they had personally observed in action. Each lawyer was given a score based on the number and types of votes received.
Automobile Cases
DUI Cases
Railroad Liability
When Winning Is the Only Option, Contact CLG
To speak to a professional and find out if you have grounds to file an injury lawsuit, call our firm at (844) 515-2223 or fill out the form below.
161 North Clark Street, Suite 2070
|
cc/2020-05/en_middle_0102.json.gz/line2232
|
__label__cc
| 0.602704
| 0.397296
|
CBE Home News Centre Remembrance Day Assembly at Battalion Park School
News Centre Remembrance Day Assembly at Battalion Park School
Remembrance Day Assembly at Battalion Park School
CALGARY — Remembrance Day is a time to recognize the sacrifices made by Canadians in armed conflicts. On Friday, Nov. 9, CBE schools will hold Remembrance Day events in their buildings to commemorate and honour our many military men and women. Media are invited to Battalion Park School for their school assembly.
This year’s school assembly will be led by Grade 6 students focusing on World War I. The event will include poetry and slide shows written by the students, songs and a choral speech of In Flanders Fields. It will include a look back over time and forward towards the future.
Date: Friday, Nov. 9, 2018
Time: 10:30 a.m.
Place: Battalion Park School, 369 Sienna Park Dr. S.W.
Contact: Jeff Campbell, Principal, 403-777-7187
Last modified: 11/8/2018 8:54 AM
|
cc/2020-05/en_middle_0102.json.gz/line2233
|
__label__cc
| 0.569889
| 0.430111
|
My CBI chevron_right
Treasury Select Committee publishes business rates report
CBI recommendations and analysis adopted by the Treasury Select Committee in its business rates report.
The new Treasury Select Committee (TSC) Chair, Mel Stride MP, was quick off the mark and used his first few weeks as Chair to publish the long overdue report from the inquiry into the impact of business rates. And the impact of CBI submission can be found throughout the report. Amongst the recommendations we made earlier this year, the Committee adopted the following:
The Ministry of Housing and Local Government (MHCLG) should work with all billing authorities to provide clarity on discretionary reliefs
The government needs to ensure business rates align with its aim to boost productivity and do not undermine its intentions to encourage businesses to invest in energy efficient technology and better data connectivity
The government should look at where case law currently stands on what assets are included in rateable values to ensure that businesses invest in green assets such as solar panels or energy efficiency machinery
The Valuation Office Agency (VOA) should increase transparency on the data that is used for revaluations.
Next to the recommendations, there was also a welcomed acknowledgment of the burden the current regime poses for businesses of all sectors and sizes and that it is no longer fit for purpose. It also adopted the argument the CBI has been making for the past few years, that in its current form it disincentivises investment. Another key strand of the CBI submission was the international comparison of the tax and in particular that the regime means the UK has one of the highest levels of property taxes in the OECD. Finally, the Committee acknowledged that, having not been reviewed since 1993, the scope of plant and machinery is outdated.
Some good news then, and while the General Election means we have to wait a little longer for a budget to see some significant change to the tax, the report adds to the growing evidence base arguing that the business rates regime in its current state is unsustainable. It also means the Treasury Select Committee is now on the long list of stakeholders and businesses calling for urgent reform.
Read the CBI Autumn Budget, which put forward a comprehensive package of reform the business rates system, here.
If you would like to join our Business Rates working group or would like any further information, please contact Megan Bulford.
More from the CBI
Find out why we're optimistic about the future partnership between business and government
In the latest episode of Behind the scenes with Josh Hardie, the CBI Deputy Director-General brings you his perspective on a new government that is ‘hungry’ and wants to move fast.
16 Jan 2020, 1 min read
India update: December 2019
India’s GDP sees the lowest growth in more than six years, while Finance Minister Nirmala Sitharaman announced that the ongoing unrest will not derail the government's economic agenda.
19 Dec 2019, 4 min read
Find out our perspective on the election result and what it might mean going forward
In the latest episode of Behind the scenes with Josh Hardie, the CBI Deputy Director-General brings you his reflections on 2019, and why we should be optimistic going into 2020.
December data sees employment return to record high and pay growth stable
Understand the key findings from the latest ONS labour market overview, covering employment-related statistics such as employment, unemployment and economic inactivity for the UK.
|
cc/2020-05/en_middle_0102.json.gz/line2234
|
__label__cc
| 0.640826
| 0.359174
|
Senate Budget Plan Threatens Health Programs
Home / RESEARCH / Federal Budget / Senate Budget Plan...
Congressional Republicans remain committed to repealing the Affordable Care Act (ACA) and overhauling and cutting Medicaid. Their 2018 budget resolution reflects those objectives, calling for about $1.3 trillion in cuts to ACA subsidies and Medicaid and for “repealing or replacing the [ACA].”
A budget resolution is a plan, not a law, so its most immediate consequence is its “reconciliation instructions.” These instructions establish a fast-track process allowing the Senate to pass subsequent legislation with just 50 votes.
Congressional Republican leaders have said that they plan to use their 2018 budget reconciliation instructions to enact tax cuts. Nonetheless, their budget poses two major threats to health programs.
First, the reconciliation instructions could be used to cut ACA coverage programs and Medicaid in the same bill that cuts taxes. While this does not seem to be Republican leadership’s current plan, nothing in the budget would prevent them from coupling health care cuts with tax cuts if they conclude that such a package could attract 50 votes, and President Trump, as well as some House and Senate Republicans, has urged them to do so.
Second, congressional Republicans will likely use the higher deficits that result from their tax plan as another justification for repealing the ACA and cutting Medicaid. Republicans have already argued that health care cuts are needed to address projected deficits, and their budget resolution would allow tax legislation to increase deficits by $1.5 trillion over the coming decade. They will likely not hesitate to argue that the higher deficits resulting from their own tax bill make cuts to Medicaid and other coverage programs even more necessary.
Budget Resolution Leaves the Door Open to Health Care Cuts in Tax Bill
For now, congressional leadership seems to be planning to use the 2018 budget reconciliation instructions only for tax cuts. But if they change their minds, the budget’s reconciliation instructions would allow the Senate to take up provisions that would repeal much of the ACA or cut Medicaid and pass them with just 50 votes.
That’s because the resolution instructs the Senate Finance Committee to make changes to deficits, not revenues. That means the Senate could use the fast-track reconciliation process for a bill that cuts any program in the Finance Committee’s jurisdiction, including the ACA’s Medicaid expansion, the rest of Medicaid, ACA subsidies that help moderate-income families pay for coverage, and the ACA individual and employer mandates.
What’s more, adding health care cuts to a tax bill would let congressional Republicans increase the size of their tax cuts. For every dollar a reconciliation bill cuts from coverage programs, it could cut taxes by an additional dollar — on top of the $1.5 trillion in unpaid-for tax cuts the budget resolution allows.
Already, President Trump and some congressional Republicans have urged Republican leaders to add to their tax bill a provision repealing the ACA’s individual mandate, the requirement that most people either purchase health insurance coverage or pay a penalty. Repealing the individual mandate would raise individual market premiums by 10 percent and would increase the number of uninsured Americans by 13 million, according to Congressional Budget Office (CBO) estimates. But the coverage losses would yield several hundred billion dollars in savings, allowing Republicans to add hundreds of billions more tax cuts to their bill.
Republican Tax Plan Will Create Pressure for Future Cuts
Even if Republicans limit their 2018 reconciliation bill to tax cuts, it will increase the pressure for health care cuts in the future. That’s because the budget allows the tax plan to increase deficits by $1.5 trillion over ten years, and Republicans may be able to increase that amount further through budget gimmicks. If their tax cuts pass, these deficits will materialize over time: claims that the tax cuts will pay for themselves fly in the face of decades of experience and credible, mainstream economic research. Moreover, the official CBO budget forecasts will reflect these deficits as soon as a tax bill is passed.
Congressional Republicans have already pointed to deficit projections as a key reason for cutting health care programs. During the most recent debate over the Cassidy-Graham ACA repeal bill, for example, Sen. Lindsey Graham defended its Medicaid cuts by arguing that without such cuts, “we’re going to leave a country that’s completely and utterly bankrupt.” He and others will likely point to the higher deficits resulting from the Republican tax plan to argue that cutting Medicaid and other coverage programs is even more urgent.
And with congressional Republicans already saying that they plan to return to their effort to repeal the ACA and overhaul and cut Medicaid as soon as they enact their tax plan, it’s clear what those cuts might look like. All of the ACA repeal-and-replace bills Congress has considered to date have shared the following features:
They would ultimately cause 20 million or more people to lose health insurance coverage.
They would effectively eliminate the ACA’s Medicaid expansion that has extended coverage to 11 million low-income adults.
They would overhaul and cut federal Medicaid funding for seniors, people with disabilities, and families with children.
They would increase premiums and cost sharing for people who buy coverage in the ACA marketplaces, especially for lower-income people, older people, and/or people in high-cost states.
They would weaken or eliminate important consumer protections, including protections for people with pre-existing health conditions.
Cutting Coverage to Pay for Tax Cuts Might Be Accomplished in Two Steps
&nbs;&nbs;
The House-passed ACA repeal bill, and the version of ACA repeal first introduced in the Senate, used these coverage cuts mostly to pay for hundreds of billions of dollars in high-income and corporate tax cuts. But some Republican senators objected to that approach, with Sen. Bob Corker arguing, “It’s not an acceptable proposition to have a bill that increases the burden on lower-income citizens and lessens the burden on wealthy citizens.” Subsequent versions of the Senate repeal-and-replace bill, and the Cassidy-Graham legislation, dropped some or most of the tax cuts.
If Congress passes the Republican tax plan and then takes up large cuts to coverage, it wouldn’t be making these changes in the same bill, but the net result would be exactly the same. The House tax bill would ultimately give almost half its net benefits to the top 1 percent of households, according to Tax Policy Center estimates. These households’ tax cuts would average over $50,000 by 2027.
As the figure shows, the $1.5 trillion in unpaid-for tax cuts in the Senate Republican budget plan is about the same as the budget’s $1.3 trillion in ACA and Medicaid cuts. These cuts in turn are about the same size as the cuts to coverage programs proposed in the House-passed ACA repeal-and-replace bill and the repeal-and-replace bill the Senate rejected in July.
Congressional Republicans already tried the approach of writing a single bill with both tax cuts and health care cuts. That approach was overwhelmingly rejected by the American public, and even by some of their own members. But while the two-step approach they’re now contemplating makes the tradeoff less clear, it doesn’t make it any less stark. The wealthy would receive large tax cuts, while millions or tens of millions of people who rely on the ACA Medicaid expansion, the underlying Medicaid program, or the ACA marketplaces for coverage would become uninsured or end up with worse or less affordable coverage.
Federal Budget, Budget Plans, Federal Tax, Tax Reform, Health, Medicaid and CHIP
PDF of this budget brief (2 pp.)
Budget Briefs: The Republican Two-Step Fiscal Agenda
Republican Plans to Cut Taxes Now, Cut Programs Later Would Leave Most Elderly People Worse Off
Republican Plans to Cut Taxes Now, Cut Programs Later Would Hurt People with Disabilities
Republican Plans to Cut Taxes Now, Cut Programs Later Would Harm Students and Schools
Republican Plans to Cut Taxes Now, Cut Programs Later Would Threaten Food Assistance Through SNAP
Republican Plans to Cut Taxes Now, Cut Programs Later Would Leave Most Children Worse Off
|
cc/2020-05/en_middle_0102.json.gz/line2236
|
__label__wiki
| 0.773933
| 0.773933
|
Call us now: 02 8203 1928 or 0414 873 296 > E-Mail: enquiries@cedge.com.au > Office Hours: 9:30am-5:30pm Mon-Fri. AEST > Online: 24/7
AIO.
Bag.
RAM.
Desktop.
Mice.
Laptop.
Ink/Toner.
|A-Z|
Auto & Marine Devices & Accessories.
Auto & Marine Accessories....
Auto & Marine Amps & Crossovers & Equalizers....
Auto & Marine Receivers....
Auto & Marine Speakers & Subwoofers....
Vehicle Monitors....
Vehicle Protecion & Convenience Devices....
AV & Music Accessories.
Attachable Display Speakers....
Audio Cassette Copiers....
AV Adapters....
AV Care & Cleaning Supplies....
AV Remote Controls....
Digital AV Device Accessories....
Home Stereo & Theater Accessories....
Home Theater Furniture....
iPod & MP3 Player Docks....
PC Headset & Microphone Combo....
PC Headsets & Headphones....
PC Microphones....
Speakers & Subwoofers & Accessories....
Camera Accessories.
Camera Accessory Kits....
Camera Cables....
Camera Cases....
Camera Docks & Cradles....
Camera Flash & Lights....
Camera Lens & Adapters & Filters & Hoods....
Camera Power Options....
Camera Remote Controls....
Camera Tripods & Monopods....
Desk Accessories.
Back & Foot Rests....
Calculators....
Copy Holders....
CPU Stands & Enclosures....
Desk Organizers....
Dust Covers....
Keyboard Accessories....
Mouse & Keyboard Pads & Rests....
Travel Lights & Fans....
Home Automation.
Home Automation Accessories....
Home Automation Modules....
Home Automation Sensors....
Home Automation System Controllers....
Light Swithes....
Mobility Accessories.
GPS Accessories.....
PDA Accessory Kits....
PDA Carrying Cases....
PDA Expansion Cards....
PDA Power Options....
PDA Screen Protectors....
PDA Stylus....
PDA Sync Devices & Cables....
Monitor & TV Accessories.
Converter Boxes....
Display Accessories....
LCD Display Carrying Cases....
Monitor & Lifts & Arms & Stands & Mounts & Bezels....
Monitor Anti-Glare Filters....
Monitor Overlays....
Remote Controls....
TV Accessories....
Notebook & Tablet Accessories.
Notebook Accessory Kits....
Notebook Carrying Cases & Carts....
Notebook Docking Options & Stands....
Notebook Expansion Bays & Options....
Notebook Power Options....
Tablet PC Accessories....
Phone Accessories.
Headset Accessories & Cables....
Other Phone Accessories & Cables....
Phone Amplifiers & Antennas....
Phone Cases....
Phone Connection Kits....
Phone Faceplates....
Phone Hands Free Sets....
Phone Handsets....
Phone Headsets....
Phone Noise Suppressors....
Phone Power Accessories....
Phone Reference Materials....
Phone Stands & Mounting....
Printer & Plotter Accessories.
Plotter Spindles & Roll Feeders....
Print Servers & Interface Cards....
Printer & Plotter Emulation & Font Upgr....
Printer & Plotter Furniture....
Printer & Plotter Output Options....
Printer Carrying Cases & Covers....
Printer Duplex Units....
Printer Hard Drives....
Printer Management Software....
Printer Memory....
Printer Multifunction & Fax Options....
Printer Power Options....
Printer Sharing & Extender Devices....
Printer Trays & Drawers & Env Feeders....
Printer Upgrades....
Printer User Manuals....
Push & Pull Tractors....
Projector Accessories.
Document Cameras....
Projector Cables....
Projector Cases & Carts....
Projector Lens....
Projector Mounting....
Projector Network Adapters & Software....
Projector Screen Accessories....
Remote Controls & Pointers....
Replacement Lamps & Filters....
Scanner Accessories.
Document & Network Scan Servers....
Scanner ADF Auto Document Feeders....
Scanner Carrying Cases....
Scanner Consumables & AC Adapters & Kits....
Scanner Film Holders & Feeders....
Scanner Imprinters & Endorsers....
Scanner Interface Cards....
Scanner Slide Adapters....
Storage Accessories & Components.
Data Transfer Kits....
Drive Controller Components....
Drive Enclosure Components....
Drive Interface Converters....
Drive Mounting Hardware....
Jewel Cases & Labeling & Inserts....
Media Storage Products....
Optical Device Components....
Portable Drive Carrying Cases....
Space Management Organizers....
Storage Power Options....
Tape Array Components....
Tape Library Components....
Transit Shipping Cases....
VHF Radios & Communications Accessories.
VHF Radios & Communications Accessories....
Video Gaming Accessories.
Game Console Accessories....
Game Organizers & Cases....
Other Video Game Accessories....
Video Game Cables & Adapters....
Video Game Controllers....
Video Game Expansion Products....
Video Game Memory Cards & Units....
Video Game Surge Protectors....
Auto & Marine Devices & Accessories..
Auto & Marine Accessories.....
Auto & Marine Amps & Crossovers & Equalizers.....
Auto & Marine Receivers.....
Auto & Marine Speakers & Subwoofers.....
Vehicle Monitors.....
Vehicle Protection & Convenience Devices....
AV & Music Accessories..
Attachable Display Speakers.....
AV Adapters.....
AV Care & Cleaning Supplies.....
AV Remote Controls.....
Digital AV Device Accessories.....
eBook Reader Accessories....
Home Stereo & Theater Accessories.....
Home Theater Furniture.....
iPod & MP3 Player Docks.....
PC Headset & Microphone Combo.....
PC Headsets & Headphones.....
PC Microphones.....
Speakers & Subwoofers & Accessories.....
Digital Audio & Visual Devices.
Digital Video Players & Recorders....
Digtial Photo Frames....
eBook Readers....
MP3 Players....
Portable DVD Players....
Portable Multimedia Players....
Radios & CD Players....
Voice Recorders....
Home Theater.
Audio Mixers....
AV Amps & Modulators & Filters & Splitter....
AV Distribution & Switching....
AV Equalizers & Mixers....
AV Home Theater Distribution & Switchin....
AV Receivers & Amplifiers....
Blu-ray & DVD Players....
CD Players & Turntables & Cassette Players....
Digital Media Players....
Home Theater Systems....
Radios & CD Players......
Music Devices.
Digital & Acoustic Drums....
Electric & Bass & Acoustic Guitars....
Karaoke Devices....
Music Keyboards....
Pro Sound & Entertainment.
DJ Equipment.....
PA & Portable Sound Systems....
Pro & Entertainment Amps & Mixers & Equalizers....
Pro & Entertainment CD & Cassette Players....
Pro & Entertainment Microphones....
Pro & Entertainment Speakers & Subwoofers....
Professional & Entertainment Accessories....
Projection Screens.
Motorized Projection Screens....
Portable Projection Screens....
Pull Down Projection Screens....
Projector Accessories..
Document Cameras......
Projector Cables.....
Projector Cases & Carts.....
Projector Lens.....
Projector Mounting.....
Projector Network Adapters & Software.....
Projector Screen Accessories.....
Remote Controls & Pointers.....
Replacement Lamps & Filters.....
Projectors.
DLP Projectors....
LCD Projectors....
LCoS Projectors....
LED Projectors....
Overhead Projectors....
Whiteboards & Presentation Devices.
Document Cameras.....
Interactive Presentation Devices....
Whiteboards....
AV Cables & Adapters.
Audio & Video Cables & Adapters....
Audio Cables & Adapters....
Monitor Cables & Adapters....
Speaker Wire....
Video Cables & Adapters....
Cabling Components & Tools.
Cable Management....
Jacks & Outlets & Faceplates....
Patch Panels & Mounting....
Structured Wiring & Components....
Tools & Toolkits....
Computer Cables & Adapters.
File Transfer Cables....
Firewire Cables & Adapters....
Serial Cables & Adapters....
Telephony Cables & Adapters....
USB Cables & Adapters....
I.O. Device Cables.
Joystick Cables & Adapters....
Keyboard & Mouse Cables & Adapters....
KVM Switch Cables & Adapters....
Modem Cables & Adapters....
Printer Cables & Adapters....
Network Cables.
Ethernet Coax Cables & Adapters....
Fibre Optic Cables & Adapters....
Modular Connectors....
Proprietary Network Device Cables....
Token Ring Cables....
Twisted Pair Cables & Adapters....
Power Cables.
Extension Cords....
Power Cables....
Storage Cables.
Drive Power Cables....
External Storage Cables & Adapters....
Internal Storage Cables & Adapters....
Binoculars & Monoculars.
General Use Binoculars....
General Use Monoculars....
Night Vision Binoculars....
Night Vision Monoculars....
Camera Accessories..
Camera Accessory Kits.....
Camera Cables.....
Camera Cases.....
Camera Docks & Cradles.....
Camera Flash & Lights.....
Camera Lens & Adapters & Filters & Hoods.....
Camera Power Options.....
Camera Remote Controls.....
Camera Tripods & Monopods.....
Cameras.
Analog 8mm & Hi8 Camcorders....
Camera & Printer Bundles....
Digital camcorders....
Digital Cameras....
Film Cameras....
Underwater Cameras....
Webcams....
Scanner Accessories..
Document & Network Scan Servers.....
Scanner ADF Auto Document Feeders.....
Scanner Carrying Cases.....
Scanner Consumables & AC Adapters & Kits.....
Scanner Film Holders & Feeders.....
Scanner Imprinters & Endorsers.....
Scanner Interface Cards.....
Scanner Slide Adapters.....
Scanners.
3D Scanners....
Business & ID Card Scanners....
Handheld Scanners....
Home & Office Scanners....
Photo Scanners....
Production & Enterprise Scanners....
Slide & Film & Transparency Scanners....
Carrier Transport Equipment.
Broadband Loop Carriers....
DSL Access Multiplexor....
Multiplexor Components....
Multiplexors....
Optical Transport....
Consumer Telephony Devices.
Caller ID....
Cordless Phones & Components....
Other Devices & Systems....
CSU & DSUs.
CSU & DSU & SDU Components....
CSU & DSU & SDU Devices....
Mobility Accessories..
Accessory Kits....
Airtime Tariffs & Plans....
App-enabled Accessories....
Bluetooth Accessories....
Bluetooth Headsets....
Car & Handsfree Kits & Speakerphones....
Carrying Cases....
Dummies....
Fitness....
GPS Accessories....
Housings & Covers....
In-Car Chargers....
Mobile Cables & Adapters not power....
Mobile Headset Accessories....
Mobility Keyboards....
Mounting Kits....
Mounts & Stands....
PDA Expansion Cards.....
Power Options....
Screen Protectors....
SIM Cards....
Smart Watch and Watch Phone Accessories....
Smart Watches....
Smartphone Camera Lenses....
Speakers & Speaker Docks....
Styli....
Sync Devices & Cables....
Wired Headsets....
Mobility Devices.
3G & 4G Routers....
Data Cards....
GPS & Navigation Devices....
Mobile Phones....
Pagers....
PDA....
Smart Phones....
Watch Phones....
Wearables....
WWAN AP & Gateways & Cellular Modems....
Modems & Connectivity Adapters.
Broadband Cable & DSL Modems....
Combo Modem & NIC....
Dial-Up Modems....
Host Connectivity....
ISDN & Sync Adapters....
Leased Line Modems....
Line Sharing Devices....
Multi-Modem Devices....
Rackmount Modems & Components....
Remote Access Modems....
Phone Accessories..
Headset Accessories & Cables.....
Other Phone Accessories & Cables.....
Phone Amplifiers & Antennas.....
Phone Cases.....
Phone Connection Kits.....
Phone Faceplates.....
Phone Hands Free Sets.....
Phone Handsets.....
Phone Headsets.....
Phone Noise Suppressors.....
Phone Power Accessories.....
Phone Reference Materials.....
Phone Stands & Mounting.....
Phone Systems & Phones & Components.
IP Phones & Software & Components....
PBX & IP-PBX Systems....
Phone System Cards & Components....
Phone System Software....
TDM Phone Station Sets & Components....
VHF Radios & Communications Accessories..
VHF Radios & Communications Accessories.....
VHF Radios & Communications.
2-Way Radios....
Scanners....
VHF Radios....
Video & Audio Conferencing Equipment.
Audio Conferencing Components....
Audio Conferencing Units....
MultiPoint Video Conference Systems & Ga....
Video Conference System Components....
Video Conference Systems....
Video Conferencing Cameras....
Video Conferencing Carts....
Video Conferencing Software....
Web Conferencing Equipment....
Voice & Fax Equipment.
Fax Boards....
Fax Servers....
Voice Boards....
Voice Mail System Components....
Voice Mail System Software....
Voice Mail Systems....
Voice Over IP VOIP.
Conference IP Phones....
Consumer IP Phones....
Desktop IP Phones....
IP Phones....
Software-based IP Phones....
Video Gateways....
Voice Gateways....
VOIP Components....
VOIP Routers only for routers that do V....
VOIP Wired Headsets....
VOIP Wireless Headsets....
BTO Options.
BTO Options for Notebooks....
BTO Options for PCs....
BTO Options for Servers....
BTO Options for Services....
BTO Options for Software....
BTO Options for Workstations....
Computer Cases & Accessories.
Computer Case Accessories....
PC Cases....
Server Cases....
Graphics Cards.
AMD Graphics Cards....
nVidia Graphics Cards....
Generic Memory....
Proprietary Memory....
Motherboards.
AMD Mobile Processor Motherboards....
AMD Motherboards....
AMD Multi Processor Motherboards....
AMD Single Processor Motherboards....
AMD Socket AM2 Motherboards....
AMD Socket AM2+ Motherboards....
AMD Socket AM3 Mthrbrds....
AMD Socket BGA413 MB + CPU....
AMD Socket LGA1944 & G34 MB....
AMD Socket PGA939 Mthrbrds....
AMDScktFDualMltiProcsrMthrbrds....
Intel Mobile Processor Motherboards....
Intel Motherboards....
Intel Multi Processor Motherboards....
Intel Single Processor Motherboards....
Intel Socket LGA1155 Motherboard....
Intel Socket LGA1366 DualMulti-Proc MB....
Intel Socket LGA1567 Motherboards....
Intel Socket LGA771 Motherboards....
Intel Socket LGA775 Mthrbrds....
Intel Socket PGA478 Mthrbrds....
IntelScktBGA437MthrbrdswPrcsr....
IntelScktBGA479wProcsr....
Motherboard Components....
UltraSparc Motherboards....
Optical Drives.
Blu-Ray Drives & Burners....
CD & DVD Duplicators....
CD Drives & Burners....
DVD Drives & Burners....
Power Supplies.
Case Specific Power Supplies....
Generic Power Supplies....
System Specific Power Supplies....
AMD Mobile Processors....
AMD Multi Processors....
AMD Processors....
AMD Single Processors....
Intel Mobile Processors....
Intel Multi Processors....
Intel Processors....
Intel Single Processors....
Processor Accelerators....
UltraSparc Processors....
Sound Cards.
External Sound Devices....
Internal Sound Cards....
TV Tuners & Video Editing.
Scan Converters....
TV & Audio Tuners....
Video Capture Cards....
Video Cards....
Video Combo Cards & Devices....
Barebones Computers.
Barebones Notebooks....
Barebones PC....
Barebones Servers....
Desktops.
All-in-One PCs....
Barebones PC.....
Desktop PCs....
Small Form Factor & Ultra Slim PCs....
Tower PCs....
Workstations....
Notebook & Tablet Accessories..
Notebook Accessory Kits.....
Notebook Cases....
Notebook Docks & Stands....
Notebook Expansion Bays & Options.....
Notebook Power Options.....
Tablet PC Accessories.....
Notebooks & Tablets.
Barebones Notebooks.....
Netbooks....
Notebooks....
Tablets Slate style....
Tablets....
Ultraportable Notebooks....
Barebones Server....
Blade Server Components....
Blade Servers....
Rackmount Servers....
Tower Servers....
Thin Clients.
All in One Thin Clients....
General Purpose Terminals....
Terminal Components....
Thin Client Terminals....
Zero Clients....
Workstations.
Intel Core Based Workstations....
Itanium-Based Workstation....
Opteron-Based Workstation....
P4-Based Workstation....
RISC-Based Workstation....
XEON-Based Workstation....
Connectivity Devices
Keyboards & Keypads.
Keyboard & Mouse Combos....
Keyboards....
Keypads....
PC Game Controllers.
Gamepads.....
Joysticks & Flightsticks....
Wheels & Pedals....
Pointing Devices & Whiteboards.
Graphics Tablets & Stylus.....
Interactive Presentation Devices.....
Mice....
Touchpads....
Trackballs....
Whiteboards.....
Serial & Parallel & I.O. Cards.
I.O. Combo Cards....
Multiport Serial Devices & Cables....
Parallel Cards....
Serial Cards....
Switching Devices.
AV & AudioExtDevices....
KVM Switches & Components....
Serial & Par Switchboxes & Extenders....
USB Device Switchboxes....
Video Switchboxes & Splitters for Compu....
USB & Firewire Connectivity.
Firewire Connectivity Devices....
USB & Firewire Connectivity Devices....
USB Connectivity Devices....
Wireless Connectivity Devices.
Bluetooth Connectivity Devices....
Infrared Connectivity Devices....
Commercial & Signage Displays.
LCD & LED Displays....
LCD & LED Touch Screen Displays....
Plasma Displays....
Computer Displays.
LCD & LED Monitors.....
LCD & LED Touch Screen Monitors....
Medical Display Solutions.
Diagnostic Imaging Displays....
Mobile Point of Care Displays & Systems....
Patient Monitoring & Charting Displays....
Monitor & TV Accessories..
Converter Boxes.....
Display Accessories.....
LCD Display Carrying Cases.....
Monitor & Lifts & Arms & Stands & Mounts & Bezels.....
Monitor Anti-Glare Filters.....
Monitor Overlays.....
Remote Controls.....
TV Accessories.....
Monitors.
CRT Monitors....
LCD & LED Monitors....
Plasma Monitors....
LCD & LED TVs....
Plasma TVs....
Projection TV....
Televisions....
Touch Screen Displays.
CRT Touch Screen Displays....
DLP Rear Projection Touch Screen Display....
LCD Touch Screen Displays....
Plasma Touch Screen Displays....
DIY-Do It youself
Game Controllers.
Gamepads....
Joysticks....
Steering Wheels....
1st Person Shooter Games....
Action & Adventure Games....
Compilation Games....
Family & Childrens Games....
Fighting Games....
Music Games....
Puzzle Games....
Racing Games....
Role Playing Games....
Simulation Games....
Sports Games....
Strategy Games....
Gaming Accessories.
Console Accessories....
Game Cases....
Gaming Subscriptions & Membership Cards....
Other Gaming Accessories....
Video Game Cables & Adapters.....
Gaming Consoles.
Microsoft Game Systems....
Nintendo Game Systems....
Sony Game Systems....
Binoculars & Monoculars..
General Use Binoculars.....
General Use Monoculars.....
Night Vision Binoculars.....
Night Vision Monoculars.....
Home Automation..
Home Automation Accessories.....
Home Automation Modules.....
Home Automation Sensors.....
Home Automation System Controllers.....
Light Switches....
Large Appliances.
Air Conditioners....
Air Filtration Systems & Accs.....
Central Vacuum Systems & Accs.....
Freezers....
Refrigerators....
Washers & Dryers....
Luggage & Bags.
Briefcases....
Carry-On Luggage....
Luggage Sets....
Planners & Padfolios....
Rolling Luggage....
Personal Care Products.
Dietary Supplements....
Personal Care Devices....
Small Appliances.
Clocks....
Cookers & Steamers....
Microwave & Toaster Ovens....
Microwave Ovens....
Other Electronics....
Radios & CD Players.....
Vacuum Cleaners....
Home Garden & Travel
Outdoor Shoe Cover.
Dark-brown colour size 28x11cm
White colour size 23x11cm
Keyboards & Keypads..
Keyboard & Mouse Combos.....
Keyboards......
Keypads.....
Mice & Pointers & Graphic Tables.
Graphics Tablets & Stylus....
Mice.....
Touchpads.....
Trackballs.....
Bracelets....
Earrings....
Necklaces....
Rings....
Watches.
Childrens Watches....
Ladies Watches....
Mens Watches....
Specialty Watches....
Straps & Accessories....
Unisex Watches....
LED Accessories.
LED Control Panels....
LED Heat Sinks & Thermal Management....
LED Power Supplies....
LED Transformers & Drivers....
LED Fixtures.
LED Indoor Lighting....
LED Outdoor Lighting....
LED Replacement Lamps.
LED Light Bulbs....
LED Tubes....
LED Strips & Bars & Modules.
LED Bars....
LED Modules....
LED Strips....
Network Security.
Anti-Virus & Anti-SPAM Device....
Authentication Devices & Components....
Content Management Devices & Cpnts....
Firewall Devices....
IDS & IDP Devices & Components....
Network Security Accs & Components....
Security Appliances....
VPN Devices....
Physical Security.
Anti-Theft Devices & Software....
Biometric Security Devices & Components....
Environmental Monitors & Components....
Network & Security Cameras & Components....
Network Video Components....
Observation & Security Bundles....
Physical Security Options & Accs.....
Security Digital Video Recorders & Compon....
Video Servers & Components....
Content Networking.
Content Delivery Equipment....
Content Delivery Software & Component....
Content Switching & Load Balancers....
Media Streaming Devices & Components....
Device & Terminal & RAS Servers.
Device Servers & Components....
Remote Access RAS Servers....
Terminal & Console Servers & Cpnts....
Network Interface Cards.
ATM Network Cards....
Boot ROMs & Brackets....
Ethernet NICs....
Fast Ethernet NICs....
FDDI Cards....
Gigabit Ethernet NICs....
Phone & Power Line NICS....
Token Ring NICs....
Routers & Components.
Configurable Interface Routers....
Fixed Interface Routers....
Router Components....
Switches & Hubs.
Chassis-Based Switches....
Repeaters....
Stackable Hubs....
Stackable Switches....
Standalone Hubs....
Standalone Switches....
Switch & Hub Components....
Test Equipment.
Cable Testers....
Network Analysis Devices....
Test Equipment Components....
Transceivers & Converters.
Media Converters & Components....
Transceivers....
Wireless Networking.
Antennas & Amplifiers....
Wireless Access Points AP....
Wireless Bridges....
Wireless Cabling & Components....
Wireless NICs....
Wireless Routers & Gateways....
Wireless Starter Kits....
Wireless Switches....
Network Equipment....
Desk Accessories..
Back & Foot Rests.....
Calculators.....
Copy Holders.....
CPU Stands & Enclosures.....
Desk Organizers.....
Dust Covers.....
Keyboard Accessories.....
Mouse & Keyboard Pads & Rests.....
Travel Lights & Fans.....
Office Electronics & Furniture.
Copiers....
Electronic Dictionaries....
Faxes....
Laminators....
Office Furniture....
Paper & CD & DVD Shredders....
Typewriters....
Detection & Fire & Alarm Systems.
Anti-Theft Devices....
Emergency Alerting Systems....
Environmental Monitors & Components.....
Fire & Intrusion Alarm Systems....
Metal Detectors....
Physical Access Control.
Biometric Security Devices & Components.....
Observation & Security Bundles.....
Physical Access Control Mgmnt....
Physical Security Options & Accs......
Proximity Devices....
Video Surveillance.
Analog Video Surveillance Cameras....
Hybrid Video Recorders....
Network Video Recorders....
Network Video Surveillance Cameras....
Security Digital Video Recorders....
Video Encoders & Components....
Video Surveillance Components....
Video Surveillance Enclosures....
POS & AIDC & Barcode Products
AIDC & POS Software.
AIDC & POS Application Development Softwar....
AIDC & POS Barcode Label Software....
AIDC & POS Data Capture Application Softwa....
AIDC & POS Device Management Software....
AIDC & POS Miscellaneous Software....
AIDC & POS Terminal Emulation Software....
AIDC & POS WRLS Network Management Tools....
Hospitality Software....
Retail Software....
AIDC Mobile Terminals.
Keyboard Based Terminals....
Pen Based Terminals....
Portable Data Terminals....
Specialty Terminals....
Vehicle Mount Terminals....
AIDC Wireless Infrastructure.
AIDC Access Points....
AIDC Antennas & Access Ports....
AIDC Wireless Adapters....
AIDC Wireless Switches....
Auto ID & Retail POS Supplies.
ID Printer Supplies....
POS Printer Supplies....
Auto ID Accessories.
Barcode Scanner Accessories....
ID Printer Accessories....
Auto ID Barcode Scanners.
Barcode Slot Reader....
Barcode Verifiers....
Fixed Mount Scanners....
Handheld Scanners.....
In-Counter Scanners....
Presentation Scanners....
Scanner Cables....
Specialty Scanners....
Wand Barcode Readers....
Auto ID Printers.
Auto ID Printer Service Parts....
Barcode Label Printers....
ID Card Printers....
Mobile Label Printers....
RFID Printers....
POS Peripherals.
Authorization Terminals....
Cash Drawers & Trays....
Check Readers....
Debit & Credit Card Authorization Terminal....
Magnetic Stripe Readers....
Pin Pad Terminals....
Pole Displays & Specialty Displays....
POS Keyboards....
POS Scales....
POS Touchscreens....
Signature Capture Terminals....
Smartcard Readers....
POS Printers.
Hybrid Printers....
Impact Receipt Printers....
Inkjet Receipt Printers....
Mobile POS Printers....
POS Printer Service Parts....
Thermal Receipt Printers....
POS Terminals.
Cash Registers.....
Kiosk POS Terminals....
POS Ordering Systems....
Standalone POS Computer Terminals....
Touch Screen POS Terminals....
Retail POS Accessories.
Barcode Printer Accessories....
Barcode Printer Supplies....
Kiosk Accessories....
POS Peripheral Accessories....
POS Printer Accessories....
POS Terminal Accessories....
RFID Reader & Encoder.
Fixed Mount RFID Reader & Encoder....
Handheld RFID Reading Terminals....
Portable & Handheld RFID Readers....
RFID Antennas....
Solution Bundles.
Asset Tracking Solutions....
Healthcare Bundles....
Inventory Control Solutions....
Labeling Solutions....
Photo ID Bundles....
POS Solutions....
Time & Attendance Solutions....
Wireless Infrastructure Bundles....
Universal Accessories.
Common POS & AIDC Accessories....
Warranties & Service Fees & Contracts.
Epson....
Handheld Products....
Hewlett Packard....
Miscellaneous Service Fees....
Oneil....
Pioneer....
PSC....
Symbol....
Ultimate....
Unitech....
Zebra....
Wireless AIDC Accessories.
AIDC Mobile Terminal Accessories....
AIDC Wireless Infrastructure Accessories....
RFID Accessories....
Power & Rack Equipment
Power Equipment.
Generators....
Line Conditioners....
Power Distribution Units PDUs & Compon....
Power Inverters....
Power Strips....
Surge Protectors....
UPS Batteries....
UPS Cables....
UPS Components....
UPS Management....
UPS Uninterruptible Power Supplies....
Voltage Regulators....
Racks & Enclosures.
Open Frame Racks....
Rack Enclosure Components....
Rack Enclosures....
Wall Mount Racks & Enclosures....
Projector Screens.
Portable Projection Screens.....
Pull Down Projection Screens.....
Projectors..
DLP Projectors.....
LCD Projectors.....
LCoS Projectors.....
Overhead Projectors.....
Mailers.
Nimax....
Postcards....
Standard.....
Other Printed Media.
Binder....
CD Book....
Dimensionals....
Signage....
Brochures....
Catalogues....
Guides....
Newsletters....
Auto ID Printers..
Barcode Label Printers.....
ID Card Printers.....
Mobile Label Printers.....
RFID Printers.....
Dot Matrix & Line Printers.
Dot Matrix Printers.....
Line Printers....
Inkjet.
Inkjet Printers.....
Inkjet-Baseds MFPs....
Solid Ink Printers....
Large Format.
Color Large Format Printers & Plotters....
Laser.
Business & ID Card Printers.....
CD & DVD Printers....
Color Laser Based MFPs....
Color Laser Printers....
Color Laser Printers.....
Dot Matrix Printers....
Inkjet Printers....
Label Printers- Home & Office....
Line Printers.....
Mono Laser & LED Printers....
Mono Laser-Based MFPs....
Photo Printers- Standalone....
Solid Ink Printers.....
Multifunction Peripherals MFP.
Color Laser-Based MFPs....
Inkjet-Based Multifunction Printer....
Laser-Based Multifunction Printer....
Office Electronics and Furniture.
Cash Registers....
Copy Machines....
Fax Machines....
Laminators.....
Office Electronics....
Office Furniture.....
Paper & CD & DVD Shredders.....
Typewriters.....
POS Printers..
Hybrid Printers.....
Impact Receipt Printers.....
Inkjet Receipt Printers.....
Mobile POS Printers.....
Thermal Receipt Printers.....
Printer & Plotter Accessories..
Plotter Spindles & Roll Feeders.....
Print Servers & Interface Cards.....
Printer & Plotter Emulation & Font Upgr.....
Printer & Plotter Furniture.....
Printer & Plotter Output Options.....
Printer Carrying Cases & Covers.....
Printer Duplex Units.....
Printer Hard Drives.....
Printer Management Software.....
Printer Memory.....
Printer Multifunction & Fax Options.....
Printer Power Options.....
Printer Sharing & Extender Devices.....
Printer Trays & Drawers & Env Feeders.....
Printer Upgrades.....
Printer User Manuals.....
Push & Pull Tractors.....
Specialty Printers.
3D Printers....
Business & ID Card Printers....
CD & DVD Printers.....
Label Printers - Home & Office....
Photo Printers - Standalone....
Professional Sound & Entertainment
Pro Sound & Entertainment Devices & Accs.
DJ Equipment....
PA & Portable Sound Systems.....
Professional & Ent. Amps & Mixers & Equalize....
Professional & Entertainment Accessories & ....
Professional & Entertainment CD & Cassette P....
Professional & Entertainment Microphones....
Professional & Entertainment Speakers & Su....
Services & Warranties
Carrier Services.
ASP Services....
Broadband Services....
ISP Services....
Wireless Communications Services....
Help Desk Services.
Internet Support....
Phone Support....
Ingram Micro Services.
Installation Services.
Managed Services.
Data Center Virtualization....
Enterprise Communications....
Hardware As A Service....
Hosted Email & Messaging....
Labor & Network Operations Management....
Print Monitoring & Management....
Remote Monitoring & Management....
Security & Email & Web Defense....
Software As A Service....
Storage & Online Backup & Restore....
Vendor Professional Services.
Custom Consulting Services....
Deployment Services....
Hardware Configuration Services....
Integration BTO & CTO Services....
Inventory Services....
Mobile Wireless Config Services....
Project Management Services....
Recovery Services....
Remote Monitoring Services....
Site Survey Services....
Software Configuration Services....
Support Services....
Wireless Networking Services....
Warranties.
Extended Warranties....
Upgrade Warranties....
Warranty Renewals....
Business Solution Software.
Application Server Software....
Business Solution ESD SW with Download P....
Business Solution ESD SW without Downloa....
Business Solution Suite Software....
CRM Software....
Ecommerce Software....
Human Resources Software....
Learning Management Software....
Middleware Software....
Portal Software....
Process Management Software....
Project Management Software....
Server Suite Software....
Communications Software.
Communication ESD SW with Download Prote....
Communication ESD SW without Download Pr....
Communication Software Suites....
E-Mail Software....
Faxing Software....
Messaging & Collab Server Software....
Mobile & Synchronization Software....
Data Management Software.
Data Management ESD SW with Download Pro....
Data Management ESD SW without Download....
Database Plug-ins & Development Tools....
Database Software....
Document & Info Management Software....
Forms Design Software....
PDF Creation & Management Software....
Report Creation Software....
Developer Software.
Application Development....
Developer ESD SW with Download Protectio....
Developer ESD SW without Download Protec....
Developer Suites....
Flow-charting & Diagramming Software....
Internet & Web Development....
Object Libraries....
Programming Languages & Compilers....
Version Management Software....
Digital Imaging & Signage Software.
Animation Software....
CAD & CAM Software....
Clip Art Software....
Color Matching Software....
Creative Printing Software....
Digital Imaging & Signage ESD SW with Do....
Digital Imaging & Signage ESD SW without....
Digital Signage Software....
Draw & Paint Software....
Font Software....
Imaging Suite Software....
Multimedia Player Software....
OCR & Scanning Software....
Photo Editing & Album Software....
Video & Audio Editing Software....
Education Software.
Art & Music Learning Software....
Bundled Education Software....
Computer Science Software....
Creativity Software....
Critical Thinking Software....
Education ESD Software with Download Pro....
Education ESD Software without Download....
Electronic Book Software....
Foreign Language Software....
Geography Software....
History & News Software....
Language Arts Software....
Literature Software....
Math Software....
Multi-subject Software....
Reading Software....
Science Software....
Spelling Software....
Study Skills Software....
Teacher Resource Software....
Typing Software....
Writing Software....
Finance Software.
Accounting & Billing Software....
ERP Software....
Finance ESD SW with Download Protection....
Finance ESD SW without Download Protecti....
Financial Suite Software....
Payroll Software....
Personal Finance Software....
Tax Software....
Game Software.
Action & Adventure Game Software....
Arcade Games....
Card & Casino Game Software....
Family & Childrens Game Software....
Fighting Game Software....
First Person Shooter Game Software....
Game ESD Software with Download Protecti....
Game ESD Software without Download Prote....
Other Game Software....
Role Playing Game Software....
Simulation Game Software....
Sports Game Software....
Strategy Game Software....
Host Access Software.
Host Access ESD SW with Download Protect....
Host Access ESD SW without Download Prot....
Remote Access Software....
Terminal & Host Emulation Software....
Thin Client Software....
IT Management Software.
Application Management & Monitoring Softwa....
Clustering Software....
Help Desk Software....
IT Asset Management Software....
IT Management ESD SW with Download Prote....
IT Management ESD SW without Download Pr....
Network Analysis Software....
Network Management & Monitoring Software....
UPS Management Software....
Office Productivity Software.
Calendar & Contact Management....
Desktop Publishing Software....
Integrated Office Suites....
Labeling Software....
Office Productivity ESD SW with Download....
Office Productivity ESD SW without Downl....
Presentation Software....
Spreadsheet Software....
Voice Dictation & Recognition Softw....
Wordprocessor Software & Add-ons....
Operating System Software.
DOS Operating System Software....
IBM Operating System Software....
Linux Operating System Software....
Mac Operating System Software....
Netware Operating System....
Operating System ESD SW with Download Pr....
Operating System ESD SW without Download....
Unix Operating System Software....
Windows Operating System Software....
Personal Interest Software.
Astrology Software....
Auto & Transportation Software....
Bible & Religion Software....
Bundled Personal Interest Software....
Buying & Selling Software....
Cooking Software....
Cultural Software....
Gardening Software....
Genealogy Software....
General Interest Software....
Greeting Card Software....
Health & Nutrition Software....
Home Design & Repair Software....
Lottery Software....
Movies....
Music & Sound Software....
Parenting Software....
Personal Improvement Software....
Personal Interest ESD SW with Download P....
Personal Interest ESD SW without Downloa....
Personal Organizer Software....
Pet Knowledge Software....
Sport Knowledge Software....
Travel Software....
Wedding Software....
Reference & Education Software.
Almanac Software....
Bundles & Reference Suites....
Business & Career & Resume Development Softw....
College Handbook Software....
Dictionary Software....
Education Software....
Encyclopedia Software....
Internet Reference Software....
Language Translation Software....
Legal Software....
Map & Atlas Software....
Medical Software....
Phone Directory Software....
Reference ESD SW with Download Protectio....
Reference ESD SW without Download Protec....
Reference Software....
Statistics Software....
Technical Reference Software....
Test Preparation Software....
Security Software.
Access Control Software....
Anti-Spam Software....
Anti-Theft Software....
Authentication Software....
Bandwidth Management Software....
Content Filtering & Management Softw....
Encryption Software....
Firewall & VPN Software....
Intrusion Detection IDS Software....
Physical Access Control Mgr Sw....
Regulation Compliance Software....
Security ESD Software with Download Prot....
Security ESD Software without Download P....
Security Management Software....
Security Suite Software....
Surveillance Software....
Virus Protection Software....
Vulnerability Assessment Software....
Storage Software.
Back-up Software....
Data Recording & Copying & Migration Softw....
Disaster & File Recovery Software....
Storage ESD SW with Download Protection....
Storage ESD SW without Download Protecti....
Storage Management Software....
Virtual Drive Software....
Utility Software.
File & Internet Sharing Software....
File Conversion Software....
OS Management & Partitioning Softw....
Screen Saver Software....
System Optimization Software....
Utility ESD SW with Download Protection....
Utility ESD SW without Download Protecti....
Utility Suites....
Virtualization Software.
Hypervisor Mgmt SW DT Virtualization....
Hypervisor Mgmt SW Srvr Virtualization....
Hypervisor SW DT Virtualization....
Hypervisor SW Srvr Virtualization....
Utility SW DT Virtualization....
Utility SW Srvr Virtualization....
Backup Devices.
Backup Accelerators....
Libraries....
Tape Drives & Arrays....
CD & DVD Drives.
Blu-Ray Drives....
CD & CD-R & CD-RW Drives....
CD & DVD Changers....
CD & DVD Duplicators.....
CD & DVD Jukeboxes & Towers....
DVD & CD-RW Combo Drives....
DVD & DVD-R & DVD-RW Drives....
NAS CD & DVD Devices....
Drive Controllers.
EIDE Drive Controllers....
EIDE RAID Drive Controllers....
Multi-Interface Drive Controllers....
Multi-Interface RAID Drive Ctlrs....
SAS Serial Attached SCSI Drive Control....
SAS Serial Attached SCSI RAID Drive Co....
SATA Drive Controllers....
SCSI Drive Controllers....
SCSI RAID Drive Controllers....
Serial ATA RAID Drive Controllers....
Drive Enclosures.
Drive Enclosures....
RAID Enclosures....
Removable Frame & Carriers....
Flash Memory Devices.
Flash Adapters....
Flash Card Cases....
Flash Memory Cards....
Flash Reader & Card Bundles....
Flash Reader & Writers....
Portable Flash Drives....
Floppy & Removable Media Drives.
Floppy & Removable Media Drives....
Magneto Optical Devices....
Removable Media Drives....
Hard Drives.
EIDE Hard Drives....
Fibre Channel Hard Drives....
Firewire Hard Drives....
Multi-Interface Hard Drives....
PCMCIA Hard Drives....
SAS Serial Attached SCSI Hard Drives....
SATA Hard Drives....
SCSI Hard Drives....
Thunderbolt Hard Drives....
USB Hard Drives....
Network Attached Storage NAS.
NAS Components....
NAS Disk Systems....
NAS Hard Drives....
SAN Systems & Infrastructure.
FC & Iscsi Disk Sys....
Fibre Channel SAN Disk Sys....
Fibre Host Bus Adapters HBAs....
iSCSI Adapters....
iSCSI SAN Disk Sys....
SAN Components....
SAN Disk Systems....
SAN GBIC & SFP....
SAN Hard Drives....
SAN Hubs....
SAN Routers....
SAN Switches....
Solid State Drives.
Expresscard Solid State Drives SSD....
Fiber Solid State Drives SSD....
IDE Solid State Drives SSD....
Multi-Interface Solid State Drives SSD....
PCI-Express Solid State Drives SSD....
SAS Solid State Drives SSD....
SATA Solid State Drives SSD....
Thunderbolt Solid State Drives SSD....
USB Solid State Drives SSD....
Storage Accessories & Components..
Data Transfer Kits.....
Drive Controller Components.....
Drive Enclosure Components.....
Drive Interface Converters.....
Drive Mounting Hardware.....
Jewel Cases & Labeling & Inserts.....
Media Storage Products.....
Optical Device Components.....
Portable Drive Carrying Cases.....
Space Management Organizers.....
Storage Power Options.....
Tape Array Components.....
Tape Library Components.....
Transit Shipping Cases.....
Unified Network Storage.
EthernetFibre Channel Disk Sys....
EthernetUnifiedStorage DiskSys....
Unified Storage Components....
Supplies & Media
Media & Cleaning Cartridges.
Audio & Visual Tapes....
Barcode Labels for Tape Cartridges....
Cleaning Cartridges....
Floppy Diskettes....
Optical CD & DVD & Magneto Media....
Removable Cartridge Media....
Tape Media....
Office Supplies.
Calculator & Typewriters Supplies....
CD Sleeves....
Decals & Stickers....
Display Fixtures....
Filing Products....
General Cleaning Supplies....
General Purpose Batteries....
ID Cards & Holders & Labels....
Labels & Applicators....
Laminating Supplies....
Packaging Materials....
Paper & Envelopes....
Scanner Supplies....
Transparencies & Films....
Vendor Documentation....
Writing Supplies....
Printer & Plotter Supplies.
3D Printer Supplies....
Dot Matrix Supplies....
Fax & Copier Supplies....
Inkjet Printer Supplies....
Laser Printer Supplies....
Multifunction Printer Supplies....
Plotter Supplies & Media....
Solid Ink Printer Supplies....
Thermal Printer Supplies....
Telephone Media
Fax & SMS.
Fax....
SMS....
On Hold & Phone Messages.
On hold message....
Phone message....
Telemarketing.
End user telemarketing....
Reseller telemarketing....
Arts & Crafts.
Crayon & Pencil....
Paints....
Pen & Marker....
Stationary....
Musical Instruments.
Horns....
Keyboards.....
Percussion....
String....
Action Figures....
Building Toys....
Educational Toys....
Electronic Toys....
Demo Products.
Other....
> Computers>Workstations.>RISC-Based Workstation....
NEW 7ZC32PA-OJ6956 HP 400 G5 DM I3-9100T 4GB PLUS BONUS HP OFFICEJET 6956 AIO PRINTER (P4C82A).h.
Product Summary» Stock Location:...
$765.00 -41.99% $1,318.73
RISC-Based Workstation.... There are no products in this category.
Computer Monitors Sydney | Cheap Computer Monitors Sydney
© 1998-2019 Copyright CompuEdge Pty Ltd (ABN 69 082 289 665). All rights reserved. Privacy Policy
CEDGE COMPUTERS
OPEN: 9:30am-5:30pm Mon-Fri AEST > Online Trading: 24/7
Call us now: 02 8203 1928 or 0414 873 296
Email: enquiries@cedge.com.au
|
cc/2020-05/en_middle_0102.json.gz/line2241
|
__label__wiki
| 0.575529
| 0.575529
|
Addleshaw Goddard LLP - True Picture
Brexit schmexit: this impressive national firm is making its first steps in Europe.
Europe’s The One That I Want
Addleshaw Goddard’s national footprint is solid as a rock: if Manchester and Leeds weren’t northerly enough, the firm’s 2017 merger with HBJ Gateley added Scotland to the mix, bringing offices in Edinburgh, Glasgow and Aberdeen. AG now has a total of six UK offices, and overseas the firm does well in the Middle East and East Asia thanks to outposts in Doha, Dubai, Muscat, Hong Kong, Singapore and Tokyo. But there was still something missing… Cue 2019: the firm filled its Europe-shaped hole by setting up shop in Hamburg courtesy of a ten-lawyer acquisition from BCLP. "Like all large commercial law firms our focus is on identifying new growth opportunities which are aligned to our clients' requirements," training partner Garry Elliott tells us. So is Hamburg a harbinger of further international growth? Elliott believes: “The opportunity to open an office in Germany is the right first step for us regarding our plans for continental Europe and may involve other European jurisdictions given the strong preference by many businesses for a fully integrated service."
“We'll potentially look to continue expansion.”
When we interviewed trainees, there were 34 in London, 26 in Manchester, 24 in Leeds and 15 in Scotland. Despite the distance between AG’s UK bases, trainees reckoned there was “no divide” between the North and the South. “The deal I just completed involved people spread across every office, including people up in Scotland,” one source said. “We don’t want to become a London-centric firm where the regional offices don’t feel part of things.” The firm wins dozens of Chambers UK rankings in Yorkshire, the North West, Scotland, London and UK-wide – go to chambers.com for the full list.
At the time of our research, AG was testing something new for its seat allocation, relying on an algorithm. This computer wizardry took into account trainee preferences, previous rotations and what stage you’re at in the training contract. From there it “worked out the fairest scenario for trainees across the board.” Interviewees announced some "trepidation" about entrusting their fate to this techy flourish, but reckoned “the system will work best once everyone has been using the algorithm for all four seats, so it has all the information it needs.” Others added that with this system, trainees “get the results much faster compared to before.” Whether the firm sticks with this 21st century solution remains to be seen.
Seat options: litigation; finance and projects; real estate; corporate and commercial
Leeds Lightning
Real estate is one of the firm’s largest teams. In London it has some notable high-profile clients: recent matters include advising the Chinese government on the relocation of its embassy in London, advising British Land on the sale of five Debenhams stores for £110 million, and advising WeWork on all UK real estate matters. Outside the capital, clients are just as likely to ring a bell: Leeds lawyers advise Travelodge on all kinds of acquisitions, developments and management issues, and advised Siemens on the acquisition of a £200 million train factory in Goole, in Yorkshire. Manchester lawyers acted for Hermes Investment Management on its role as landlord for Amazon's second UK HQ in Manchester, and advised Manchester Metropolitan University on the creation of a new health science campus in Crewe. For trainees, the work in this seat largely involves “a lot of drafting: leases, certificates of title and reports on title.” One reported having “one or two smaller matters to look at on my own.” For example, an interviewee recalled working on a “wayleave agreement to do with network and internet cabling.” Sources also reported that “as you grow more confident you’re encouraged to run with stuff on your own – which can be terrifying!”
“A lot of drafting: leases, certificates of title, reports on title.”
A real estate finance seat involves “primarily acting for large lenders taking security over commercial properties.” The team mostly represents lenders such as banks as opposed to borrowers, with “the exception of the firm’s emphasis on attracting incoming investment clients from Asia, which tends to be on the borrower side.” For instance, AG lawyers in London, Manchester, Leeds and Scotland recently acted for OakNorth Bank on its loan of £33 million to Mabec Property to finance the development of two student flats in Sheffield and Nottingham. Sources found there was “a lot of project management for trainees,” including running conditions precedent checklists, post-completion and due diligence. Others reported drafting opinion letters and “some of the smaller security documents.” Some trainees also dabbled in social housing finance – a strong area for the firm – which involves “advising lenders or security agents who were taking security over or allocated security over social housing portfolios.”
If lending and borrowing is your thing, you'll be pleased to hear AG's main banking team covers asset finance, leveraged finance, corporate banking and project finance. Clients include the Yorkshire Building Society, US bank Wells Fargo and Aer Lingus (in London); Santander, JD Sports and HSBC (in Manchester); and RBS, Lloyds and Aviva Investors (in Leeds). Manchester lawyers recently advised Allied London on the financing of the redevelopment of Manchester’s Grade II-listed London Road Fire Station, and acted for JD Sports on the refinancing of a £500 million revolving credit facility with four banks. One source recalled “acting for asset finance companies on hiring out or leasing equipment – that equipment can range from beer kegs to aircraft.” (British Airways, Iberia, United Airlines and Flybe are all clients.) Trainees reported the seat is “quite structured – you start with ancillary documents and board minutes, then as you get more confident you’re asked to draft security documents and legal opinions.”
Trainees in corporate had “literally covered the entire market: buyer and seller-side work, as well as private equity and trade buyer work.” London lawyers recently advised GVC Holdings on its takeover of Ladbrokes Coral for £3.9 billion, and advised BP on its acquisition of a $200 million minority stake in solar developer Lightsource Renewable Energy. Trainees are often tasked with “a leading role in the due diligence exercise and compiling the due diligence report” as well as drafting other ancillary documents. Some even had the chance to “have a bash at the first draft of a share purchase agreement,” followed by supervisors “sitting down with you and giving you constructive feedback on what they’d do differently and why.” Interviewees also emphasised having “a lot of client contact and drafting any forms of communication.”
Look At Me, I'm Lead Trainee
The infrastructure, projects and energy seat covers corporate work specific to these industries. “A lot of it tends to be healthcare-related and public sector work,” a trainee in the North told us. “For example, we are on several NHS panels, so we’re involved in anything to do with NHS hospitals.” Lawyers in London and Manchester recently advised on financing, design and construction for the £335 million redevelopment of the Royal University Hospital in Liverpool. Sources also encountered “a lot of long-term matters like large-scale energy projects and railway franchising.” A Leeds-led team recently advised Hitachi on its £500 million bid to provide new trains for the Tyne and Wear Metro, while a Manchester-headed group advised the West Midlands Combined Authority on the planned 11-kilometre extension of the Midland Metro tram. Trainees reported doing “a lot of research, contributing to advice notes, contributing to drafts of contracts, and attending meetings with clients or counsel.” The work is sometimes international in nature too: for instance, the firm recently advised the Danish government on the €8 billion Fehmarn Belt Tunnel between Germany and Denmark.
“It was a very stressful week.”
Commercial litigation is another pretty big team and covers a broad range of commercial disputes. Trainees usually get stuck into the type of work their supervisor specialises in, though “you can voice preferences for certain work to partners.” Alongside general commercial work, multiple interviewees had dabbled in IP and IT disputes, which involved “copyright and trade mark infringement, design rights and disputes arising out of IT software contracts.” Litigators in London and Manchester recently defended Primark against allegations of trade mark infringement over the ‘P.S. Love Your Hair’ tagline used for hair products. Other areas of work include finance litigation, health and safety litigation, competition and data protection. Research crops up a lot in litigation, as well as bundling, attending conferences and going to court. One source was even able to “negotiate a settlement for a low-value case – obviously under supervision! It was a very stressful week, but I felt I was being pushed in my abilities.”
AG offers regular overseas seats in Hong Kong, Dubai and Oman. Those who had been abroad noted that “the offices are smaller and the teams are much leaner, so you’re often working with just a senior associate or a partner on a deal.”Client secondments are also available, though Northern trainees admitted “a lot of them are based down in London, so it’s a bit hard because it might mean moving.”
Sources were somewhat surprised to find that “AG is just full of interesting but normal people who are also very good at what they do and professional when they need to be.” Interviewees emphasised that “the firm’s very inclusive and you’re encouraged to be yourself.” One source added: “That makes this a really nice place to be, especially when the hours get a bit rough – it takes the edge off a bit.” Indeed, hours can get pretty rough in seats like banking and corporate, with some reporting occasional 2am finishes. That said, sources found “you’re not bored! It’s all systems go, and the time goes fast.” Many also noted that “when it's quiet you are encouraged to go home, usually between 6 and 7pm.” Especially on Fridays, sources noticed “the office is pretty dead by 6pm unless something needs finishing.”
“...really well connected and integrated.”
Socially things “vary from team to team – some are more social than others.” For instance, the banking team in London will “go out for a drink two or three times a week,” while smaller teams may prefer to get their work done and go home. Many people “have external commitments and people are respectful of that.” Each team also holds an awayday, and “litigation is known to throw one of the best in the firm.” These occur across offices, and as such trainees felt the firm to be “really well connected and integrated.” AG holds firm-wide Christmas and summer parties, as well as drinks every quarter.
As mentioned, our interviewees didn’t see any divide between the firm’s offices. The only differences are the physical spaces themselves: both Manchester and Leeds moved into new buildings relatively recently which are open-plan, which means “you’re more inclined to get up and talk to someone and walk around the office.” Londoners on the other hand felt their office to be “a little tired now – it’s probably time for it to be refurbished.” However, Manchester, Leeds and London did have one thing in common: an “award-winning canteen – it’s not too expensive, and the catering staff are all really nice.”
Interviewees were also impressed with the firm’s “strong emphasis on pro bono.” Many had participated in legal advice clinics while Manchester sources in particular highlighted “working with the University of Manchester supervising students advising local business people at clinics.” Other pro bono matters come up on an ad hoc basis – “they can be anything from property matters to general commercial advice.”
At the time of our research, second-years were part-way through the qualification process: an NQ jobs list is published, then trainees must “submit a pack which includes your CV and all of your performance reviews,” as well as an application form listing your qualification preferences. Usually interviews are only held if there is more than one applicant for a job or if you haven’t done a seat in that department. Retention is usually around the market average of 80%, and in 2019 36 of 45 qualifiers were retained.
Addleshaw Goddard recruits English law trainees in London, Leeds and Manchester and Scots law ones in Edinburgh and Glasgow.
These national firms:
• DLA Piper
• DWF
• Eversheds Sutherland
• Pinsent Masons
• Squire Patton Boggs
These firms with a strong presence in the North West:
• Brabners
• Gateley
• Hill Dickinson
How to get an Addleshaw Goddard training contract
Vacation scheme deadline (2020): 5 January 2020
Training contract deadline (2022): 31 July 2020
Each year the firm receives around 2,000 vacation scheme and direct training contract applications combined. At the initial application stage, an HR source tells us, the firm looks primarily at “academics and the passion to pursue law as a career.” The firm chooses vac schemers directly from their application forms. Meanwhile, following a preliminary video interview, around 70 of those applying directly for training contracts are invited to one of several assessment centres.
The assessment centres include a partner interview, a group exercise, a technical assessment and a proof reading exercise. A current trainee had this to say of the day: “I hadn’t been in an office environment before, but I didn’t feel any undue pressure. Everyone was pretty relaxed and approachable throughout.” From here, training contract offers are made for applicants via this route.
The vac scheme
The firm runs summer vacation schemes in each of its UK offices (Edinburgh, Glasgow, Leeds, London and Manchester). The Glasgow, Edinburgh and London office also offer an Easter scheme. The Easter scheme lasts for one week and each of the summer schemes lasts two weeks. There are around 80 places available in total. Students are allocated to a different department for each week and usually asked for preferences beforehand.
Former attendees praised the vac scheme as “an excellent opportunity to experience real, unsanitised work,” with one even telling us their experience was “pretty much representative of the kind of work I do now as a trainee. For example, I got to take a crack at the first draft of a witness statement, alongside bits and bobs of admin.” Our sources' advice for impressing? “Relax a bit, show your personality, and don't be afraid to go speak to as many people as possible, at all levels.” Social activities include dinners as well as outings like pizza-making classes or crazy golf.
Attending a vac scheme automatically includes an application for the training contract. The firm makes its offers directly off the back of a candidate's performance on the vac scheme.
Trainee profile
Sources agreed that being “personable, approachable and sociable” are crucial qualities for prospective trainees. Our HR source emphasises that “candidates need to link their passion for law with why they want to work at this firm over others,” adding that “those who are unprepared certainly don't impress.” Indeed, as one solicitor involved in recruitment remarked: “It's weird when people haven't really researched the firm. They sometimes don't know that we have multiple offices or the kind of matters we work on. The difference is evident between those who have done masses of applications and those who've really concentrated on a few.”
In addition to its law fair visits at Oxbridge and Russell Group universities, AG holds several open days to meet and greet potential applicants.
Milton Gate,
60 Chiswell Street,
EC1Y 4AG
Website www.aglaw.com
3 Sovereign Square ,
Sovereign Street,
LS1 4ER
One St Peter's Square,
Partners 248
Associates 855
UK offices Aberdeen, Edinburgh, Glasgow, Leeds, London, Manchester
Overseas offices 6
Graduate recruiter: Erena Pillitteri [email protected]
Applications pa: 2,000+
Minimum required degree grade: 2:1 or equivalent
Minimum UCAS points or A levels: ABB or equivalent
Training contract applications open: 1st October 2019
Training contract deadline, 2022 start: 31st July 2020
Vacation scheme applications open: 1st October 2019
First-year salary: £40,000 (London); £27,500 (Leeds and Manchester); £23,500 Scotland
Second-year salary: £43,000 (London); £29,500 (Leeds and Manchester); £26,000 Scotland
Post qualification salary: £75,000 (London); £45,000 (Leeds and Manchester); £42,000 Scotland
Maintenance grant pa: £7,000 (London), £4,500 (other UK locations)
Offices with training contracts: Edinburgh, Glasgow, Leeds, London, Manchester
Overseas seats: International secondments in Dubai, Hong Kong and Oman
Client secondments: Yes
We are a premium international law firm with an exceptional breadth of services. Our reputation for outstanding quality is built upon long-term relationship investment and a deep understanding of client markets. This, together with our high-calibre expertise, straight-talking advice and collaborative team culture, means we are here for our clients, whenever and however they need us; from everyday queries to high-value strategic advice, we are proud of the consistently excellent, relevant and focussed service our people provide.
We have a broad client portfolio, which is testament to the strength and expertise of our people. It includes financial institutions, public sector bodies, successful businesses and private individuals. We are a leading advisor to FTSE 100 companies and a market leader across: corporate, commercial, finance and project, real estate and litigation business divisions; specialist fields such as private capital; energy, financial services, health and life sciences, real estate, retail and consumer, and transport sectors.
We require ABB at A level and a 2.1 honours degree (or equivalent). But what will really open doors to an outstanding career here is the real you. At Addleshaw Goddard, we’re looking for original minds and collaborative spirits alongside motivation, drive and commercial awareness. We’re constantly delighted by the diverse backgrounds of our best lawyers, and we’re open to law and non-law graduates alike, as well as those looking to change career.
We are more than just exceptional lawyers here. We attract sparkling people from all backgrounds, who bring their own unique qualities, along with a collaborative approach, professional drive and a commitment to every client’s success. This is just one of the reasons we’re sure you will enjoy working with us. As a trainee, important cases will come your way from the get-go. You will work on everything from multi-million-pound deals to high-profile fraud cases, employment disputes to complex technology contracts. Our success is intrinsically linked to yours, so we’ll always have your back and help you realise your potential.
Training contracts are four seats long, with opportunities to spend time in another of our offices as well as on secondment with clients. During each six-month seat, you will have regular two-way performance reviews with your supervising partner or solicitor. He or she will help you develop the skills you need to deal with the demanding work you will come across every day. As well as learning on the job, you will also have access to high-quality in-house and external training, a buddy scheme in your first seat, and a mentor throughout your training contract and beyond.
We offer week-long Easter work placements in Edinburgh and London, and two-week summer work placements in Edinburgh, Glasgow, Leeds, London and Manchester. And because everyone is an individual, we make sure each placement is a valuable experience for each individual student.
While you are here, you will get to know the everyday life of an Addleshaw Goddard trainee. You will be allocated a department to sit in and, if you are part of the summer scheme, will swap into a new department in your second week. You will be supervised by an experienced solicitor, who will welcome you to the department and allocate work. A trainee buddy will be on hand to help throughout your placement.
This is a scheme as unique as you are. As well as informative sessions, group exercises, assessed work and plenty of time at your desk, you will attend social events with a range of people across the office. It’s a real chance to get to know our people and our culture. We offer training contracts to successful placement scheme students, so we’d encourage you to apply.
Twitter@AGgrads
Banking & Finance: Lenders: Mid-Market (Band 2)
Banking Litigation (Band 3)
Commercial and Corporate Litigation (Band 4)
Construction: Purchaser (Band 3)
Corporate/M&A: Mid-Market (Band 2)
Employment: Employer (Band 3)
Information Technology (Band 4)
Litigation (Band 3)
Planning (Band 4)
Real Estate Finance (Band 3)
Real Estate Litigation (Band 5)
Real Estate: Big-Ticket (Band 3)
National Leaders (outside London)
Banking & Finance (Band 1)
Construction (Band 2)
Corporate/M&A (Band 1)
Employment (Band 1)
Intellectual Property (Band 1)
Pensions (Band 2)
Real Estate (Band 2)
Professional Negligence: Mainly Claimant (Band 1)
Corporate/M&A: Mid-Market and Private Equity (Band 1)
Energy & Natural Resources: Renewables & Alternative Energy (Band 3)
Shipping (Band 2)
Social Housing (Band 2)
Sport (Band 3)
Environment (Band 2)
Asset Finance: Rail Finance (Band 3)
Capital Markets: AIM (Band 2)
Commercial Contracts (Band 3)
Consumer Finance (Band 1)
Defamation/Reputation Management (Band 4)
Employee Share Schemes & Incentives Recognised Practitioner
Financial Services: Non-contentious Regulatory Recognised Practitioner
Financial Services: Payments Law (Band 1)
Fraud: Civil (Band 4)
Health & Safety (Band 3)
Healthcare (Band 3)
Hotels & Leisure (Band 3)
Insurance: Mainly Policyholders (Band 3)
Local Government (Band 3)
Outsourcing (Band 3)
Partnership (Band 1)
Partnership: Large International Structures (Band 1)
Private Equity: Buyouts: Mid-Market (Band 2)
Product Liability: Mainly Defendant (Band 3)
Projects: PFI/PPP (Band 3)
Public Procurement (Band 1)
Retail (Band 1)
Retail: Corporate & Competition (Band 2)
Social Housing: Finance (Band 1)
Transport: Rail: Franchising (Band 2)
Transport: Rail: Projects & Infrastructure (Band 2)
Transport: Rail: Rolling Stock (Band 2)
Locations: London, Manchester, Leeds, Scotland
Overseas offices: 6
UK partners/solicitors/trainees: 236/611/110
Seats: 4x6 months; overseas seats; client secondments
First-year salary: £40,000 (London); £27,500 (Leeds and Manchester)
Qualification salary: £75,000 (London); £45,000 (Leeds and Manchester)
Milton Gate
60 Chiswell Street
Website: www.aglaw.com
|
cc/2020-05/en_middle_0102.json.gz/line2244
|
__label__wiki
| 0.943239
| 0.943239
|
‘Iron Man’: Why Robert Downey, Jr. Almost Wasn’t Tony Stark
Melissa Mitas
With all eyes on Avengers: Endgame, some may not remember that it was Iron Man that first kicked off the blockbuster Marvel movie franchise in 2008, according to the Motion Picture Association of America.
Much of the film’s success can be attributed to the casting of Robert Downey, Jr. in the title role, so it may seem hard to fathom that Downey was almost passed over to play Tony Stark. Why was he a tough sell, and how did he finally get the part?
Robert Downey Jr. | JNS/Imazins
A director’s intuition
It’s almost unthinkable to hear that Marvel “actively rooted against casting” Downey, according to Mental Floss. His highly-publicized substance abuse issues and several arrests made him a high risk for the studio, where they rejected him multiple times.
But director Jon Favreau knew RDJ was the perfect Tony Stark. “It was my job as a director to show that it was the best choice creatively… and now the Marvel Universe is the biggest franchise in film history,” Favreau said as reported by Cinema Blend. “Everybody knew he was talented. Certainly by studying the Iron Man role and developing that script I realized that the character seemed to line up with Robert in all the good and bad ways. And the story of Iron Man was really the story of Robert’s career.”
Favreau also said his own “really special ability” to see talent in other people motivated him to fight for RDJ, coupled with the glaring similarities in the character and the actor, as noted by Cinema Blend.
Who else was in the running?
According to Vulture, there were several possibilities on who could play the role, most notably megastar Tom Cruise. But Cruise saw it differently, as Screenrant reported, saying that RDJ was the only one who could play Tony Stark. “Not close. Not close and I love Robert Downey Jr. I can’t imagine anyone else in that role and I think it’s perfect for him,” Cruise said.
Thank you, Paris! What an amazing time at the World Premiere of #MissionImpossible Fallout.
A post shared by Tom Cruise (@tomcruise) on Jul 15, 2018 at 6:34am PDT
Other potential candidates? Nicholas Cage was another contender, along with Sam Rockwell. Favreau kept Rockwell on his short list in case Downey didn’t work out, as Vulture reported, and went on to cast Rockwell in Iron Man 2 as one of Stark’s adversaries.
Downey as Stark, or Downey is Stark?
Downey has truly adopted the character as his own. He even admitted to having a hard time separating himself from Tony Stark, telling a fan during a Reddit AMA: “The first Iron Man was essentially wrapping the character around a cooler version of ‘me.’ As we’ve gone along, I’m starting to wonder who’s playing who, and I’m glad there are so many talented new people in the Marvel lineup. Ultimately, I’m real, and he’s not. It’s kind of important for me to remember that.”
#flashbackfriday already ?!?!? @avengers #press #tour #2019 #TeamStark #hair @davynewkirk #style @jeanneyangstyle ( @jimmy_rich ) #thankyou (Does the #suit make the man or #viceversa ? ) #fbf
A post shared by Robert Downey Jr. (@robertdowneyjr) on Apr 26, 2019 at 9:03pm PDT
Excluding The Avengers, the Iron Man franchise has raked in billions at the global box office, so it looks like Favreau’s risk on Downey paid off in spades. “That was a big gamble on whether or not he was really serious about it,” Favreau said of Downey, as noted by Cinema blend, “and now history has definitely proven that he was dead serious about it and now he is the biggest star in the world.”
|
cc/2020-05/en_middle_0102.json.gz/line2247
|
__label__wiki
| 0.854945
| 0.854945
|
New Trier's 80th-minute strike stuns York
Weaver goal rallies Trevians to 3-2 road win
By Dave Owen
ELMHURST – The season is only two matches old, and New Trier likely already has its Goal of the Year-winner come postseason banquet time.
Logan Weaver’s high-speed sprint up the middle and drive inside the left corner of the net with just 32 seconds left broke a 2-2 tie Thursday at York, earning the Trevians (2-0-0) a 3-2 win over the Dukes.
The stunning strike punctuated a wild final 12 minutes of play. York took a 2-1 lead with 11:14 left, but the Trevians, ranked no. 12 in the Chicagoland Soccer preseason poll, drew even just 96 seconds later and produced final-minute magic that began with Ben Axelrod’s win of a long York punt.
“It all started with our left center back Ben Axelrod,” Weaver said. “He won the ball in the middle and started the play, and I just saw the gap and shot it.”
Weaver’s speed did much of the work to create the chance. He sped past two York defenders up the middle while controlling his dribble, sidestepped York goalkeeper Sam Kritikos and angled the winning goal into the lower far corner of the net.
“What Logan has is an ability to accelerate with the ball that’s pretty special,” New Trier coach Matt Ravenscraft said.
“Our center back Ben Axelrod headed it, and then Logan took it up. And he keeps the ball pretty tight. He was able to get around the keeper, and once he did that you knew it was going in.”
The goal capped a one-minute sequence in which New Trier created two attacks deep into the York zone, and the Dukes had one of their own (initiated on an interception and long send by Jack Musial).
“I think it (Weaver’s rush) caught York off guard,” Ravenscraft said. “Their shape was pretty flat and high, and it’s early in the season so teams are getting fitness. It could have been that or just a mental breakdown, and the back and forth (end to end play) led to some of that.”
Weaver’s strike put an understandably painful final twist to an excellent peformance by the Dukes.
“Lots of positives, but that doesn’t make it sting any less,” York coach Lukas Majewski said. “When you have a team like that on the ropes (up 2-1 late), you have to put it away. I hope we learn from it as a team.
“I think we have a great group of kids. And if we can figure out how to mesh them together, if we get all those guys on the same page, I think we can be dangerous.”
Ryan Krueger had scored New Trier’s tying goal with 9:38 left and was a close-up witness to Weaver’s fantastic finish.
“It was surreal,” Krueger said. “I was actually turned around and all I saw was the ball drop to Logan Weaver’s feet, and he’s darting towards the goal.
“I ran with him and just shut up because I have a knack for calling for the ball. I shut up and let him do his thing. He slotted it home, and we celebrated. It was awesome.”
Also starring for New Trier all night was senior forward Will Felitto. Strong on throw-ins throughout the match, Felitto made an early impact with a back post header goal off a Weaver corner kick in the 13th minute to put the Trevians ahead 1-0.
“Will Felitto – I can’t speak enough about his ability to be a target (at 6-foot-2). Especially early when things weren’t going our way and we started slow,” Ravenscraft said.
“And then late I thought our center backs Riles Walsh and Ben Axelrod along with JoJo Farina sat in and dealt with their two center forwards and their wingers and just absorbed a lot. That was really impressive. Good senior leader performances from those three.”
Strong play was needed to battle past a York team that had the game’s best early chance and had victory in its grasp until late.
The Dukes nearly struck with 34:30 left in the first half, when Nathan Brown’s nice send sprung Parker Gawne for a 1-on-1 attack that ended with a 6-yard flick of a bouncing ball that went just wide of the open left post.
Then after New Trier went up 1-0, a Gawne-to-Joe Meade-to Jakub Knurek passing connection in the 16th minute led to Knurek’s 15-yard left side drive that was denied on a nice save by New Trier goalkeeper Sam Warden.
“We know we have talent on this team, guys who can handle the ball and dribble it and pass,” York captain Joe Reinhofer said. “And guys who can step up to the moment – that’s something we didn’t have before.”
After the York defense withstood dangerous shots inside 15 yards just wide of the net by Krueger (24th minute) and Weaver (32nd minute), the Dukes surged into the halftime break.
Off a Musial steal, Reinhofer’s low 12-yard drive was denied on a nice save by Warden 4:10 before halftime. Edwardo Del Carmen followed 50 seconds later with a 6-yard shot that was blocked near the goal line.
Then off a high send from the right sideline by Musial with 1:30 left in the half, Del Carmen’s deflection eluded the New Trier defense to Ethan Oder at the left post. His putaway tied the game 1-1 at halftime and punctuated a strong run of play for the Dukes.
“York is a great team,” Ravenscraft said. “I think they’re going to cause a lot of problems in the West Suburban and throughout their schedule.
“They showed that they have a grittiness and a couple of speedy guys, and they caused us some issues – especially in the first half.
“We had to change some things at halftime to make sure we were better equipped to deal with what they were throwing forward. It was very direct, and quick, and it put us on our back foot.”
The teams traded quality chances in the first 15 minutes of the half – a Felitto 8-yard header just wide of the net off an Alex Boudos cross with 30:50 left for New Trier, then a strong Gawne attack setting up a Joe Meade one-timer just over the net with 25:10 to go.
Then the two goalkeepers kept the 1-1 tie with matching brilliance.
York’s Kritikos made a great foot-first sliding block to deny an excellent Felitto shot with 19:20 to play. Kritikos followed with another diving stop five minutes later to thwart a Weaver 10-yard straight-on drive off a strong Felitto throw-in. The keeper then dove to deflect a 22-yard Krueger free kick just wide with 13:50 left.
New Trier goalkeeper Warden’s biggest save came with 11:46 left, after an improbable York counterattack. John Gratzianna’s strong clear of a corner kick by the Trevians’ Weaver sprung Reinhofer on a 1-v.-1 attack that ended with him being tripped in the box for a penalty kick.
What followed was a tribute to Warden, then York’s perseverance.
Warden made the initial diving save on R.J. Meade’s PK with 11:46 left, then endured Oder’s rebound shot that hit the crossbar.
Shaking off those two near misses, York fought on and finished the possession in style. Josh Borzello’s low cross from the end line right of the goal squirted across the crease to Reinhofer, whose putaway inside the left post made it 2-1 York in the 69th minute.
“I have to give all the credit to Josh Borzello,” Reinhofer said. “There was a play in the corner, some nice small-sided play, and he managed to make a guy dive in and slotted it beautifully across.
“I recognized the goalie wasn’t going to get down in time, so it was just a matter of right place and knowing who your teammate is and what he likes to do with the ball.”
Suddenly down 2-1 on the road, New Trier found its footing.
“We just kind of regrouped at the top of the box (after the York goal) and said ‘Hey, calm down. This is our game; we’re better than these guys technically,’” Krueger said.
“The only thing lacking we felt in the second half was the heart, then we got one quick goal, and then it was just do what we do in practice with quick turnarounds and making sure we get our chances and the build-up of play is how we need to play.
“We felt they were controlling most of the game and forcing how we didn’t want to play,” Krueger added. “So we calmed down, played the way we’re supposed to play and the rest of the game went our way after that.”
After Weaver’s well-contested header went just wide with 10:05 left, the Trevians won the ensuing battle for the punt near midfield and countered. Felitto’s pass sprung Krueger up the right side, and he angled a 15-yarder inside the left post to tie the game 2-2 with 9:38 to go.
“I consider that my pocket space right there, right side top of the box,” Krueger said. “I’ve practiced it so many times. Just cut in, find the right side of the goalkeeper and put it away.”
Weaver would be the hero in the final minute, but recognized what set up his big moment.
“Thank God my teammates had my back the whole game,” he said. “We worked hard, we stayed in the game, our keeper made a great save on the penalty. That’s what we try to do, just make it to the end and get in a position to win the game.
“I was so proud of all our players. We played for each other, we’re brothers – I love these guys.”
York’s development into a cohesive team is also showing progress.
“It’s hard in the beginning of the season – we’re still trying to find out what team we are,” Reinhofer said. “When you have individuals who are all putting in that work on a team, I think that’s kind of an individual thing that becomes collective. And once you see one guy busting his behind, you can rally behind that. It’s a domino effect from there.”
The hearts of York players and fans fell like dominos after Weaver’s goal. But Reinhofer kept the heartbreak in perspective.
“Could be tired legs or the defense still getting used to each other,” he said. “But it’s also a game (early in the season) where we’re still establishing communication and things like that.”
Said Majewski: “This was a nice test at the beginning of the season to see where we are and how far we have to go. Obviously we’re heading in the right direction, but we’re not there.”
The talents of Reinhofer and a deep roster bode well for the Dukes’ 2017 hopes.
“Joe Reinhofer’s obviously our go-to guy on top,” Majewski said. “He’s going to see double and triple coverage at times, but we have other kids that can play off him.
“We have soccer players that can read the game. It’s a work in progress, but we’ll get there. And hopefully we’re dangerous sooner than later, so we can climb up the ratings for sectionals.”
York showed its potential to be dangerous Thursday, even if late events turned against them.
“Obviously New Trier’s a great team, on par or better than some of the top teams in our conference,” Majewski said. “You have a team on the ropes and in a matter of five minutes the whole game is upside down. I’m still kind of in disbelief, and most of the boys are in disbelief that happened.
“And give us five more minutes and I have no doubt we would have pressed and looked for opportunities and it could have gone the other way.”
Instead, the Trevians have a dramatic win and strong second half finish to build on.
“We talked (at the half) about our team shape, and that we had to dig a little deeper,” Ravenscraft said. “Half of it was tactics, half of it was heart.
“And I think they showed a lot of heart and poise. This is a team with a lot of varsity experience, and I think we showed that tonight, that grittiness and ability to dig deep when things aren’t going your way.”
Said Weaver: “It’s huge for confidence. Of course we don’t want to get too high or too low. We know how we can play and how good we can be, and right now we’re just trying to improve every day.”
And as for his last-second dash and finish?
“That might be no. 1 in terms of goals I’ve ever scored,” Weaver said. “That one will stay in my memory forever.”
GK Sam Warden
D Daniel Gunther
D Alex Boudos
D Ben Axelrod
D Riles Walsh
M Mateo Blair
M JoJo Farina
M Logan Weaver
M Will Felitto
F Alex Donnelly-Maine
F Ryan Krueger
G Sam Kritikos
D R.J. Meade
D Josh Borzello
D John Milani
D Nathan Brown
M Jakub Knurek
M Joe Meade
M Paolo Favuzzi
M Michael Achepohl
F Joe Reinhofer
F Parker Gawne
Chicagoland Soccer Man of the Match: Logan Weaver, jr. MF, New Trier
|
cc/2020-05/en_middle_0102.json.gz/line2251
|
__label__wiki
| 0.942279
| 0.942279
|
will.i.am Home
Pop Stars' Real Names: 53 Music Icons' REAL Identities Revealed
Tulisa Contostavlos Wins Legal Battle Against Britney Spears And Will.i.am
Ages ago
WATCH: will.i.am Spits Mad Bars In His HUGE Freestyle Rap
Will.i.am Accidentally Pressed His Button For An Act On 'The Voice' & It Got Hella Awkward
“It Could Be A Beer Belly!” Will.i.am Talks About Cheryl’s Pregnancy & “Bad Relationships”
Will.i.am Mashed Up ALL His Biggest Hits… & Some Legendary Tracks For His #CapitalSTB Set!
Boys & Girls Get Ready – Will.i.am's Coming To Tear Up The #CapitalSTB Stage At Wembley!
WATCH: Will.i.am Just Freestyled To Drake's New Song 'One Dance' And Completely #OWNED It!
WATCH: Will.i.am Confirms Black Eyed Peas Reunion… & Thinks They Should Never Have Split
Exclusive: Will.i.am Lets Us In On Some Secrets About Fergie’s New Album!
Watch Will.i.am Dress Up As A Teenage Girl On Jimmy Fallon – HILARIOUS!
Bring It On Rita! The 'R.I.P.' Star Is In The Studio... With Will.i.am!
Will.i.am Unsure Of Black Eyed Peas Future: "We're Doing Some Configuration"
Will.i.am Explains The Off-Side Rule In Football In This HILARIOUS Video
Will.i.am Talks New Album: "16 Songs? I'd Rather Do 45 Vines!"
Cheryl Cole Reveals Why Will.i.am Isn't On New Song 'Crazy Stupid Love'
Will.i.am Announces New Song 'Birthday' Featuring Cody Wise
Will.i.am Wants Anne Hathaway Collaboration: "It Would Be Freaking Dope"
Will.i.am Promises To Stop By Capital "Soon" With New Music - Listen
BRIT Awards 2014 Tinie Tempah And John Newman Talk Nominations Excitement - Audio
Will.i.am Applauds Miley Cyrus For Image Change: "She's Amazing" - Audio
Cheryl Cole Duets With Will.i.am On His '#willpower' Tour In London - Video
Will.i.am Duets With The Voice Act Leah McFall On Launch Night Of His UK Tour
Will.i.am, Miley Cyrus And Pitbull's New Songs Join Capital FM Playlist
Conor Maynard Announced As Special Guest For Will.i.am's December UK Arena Tour
Britney Spears On Working With Will.i.am: "He's Like A Kid Or A Little Genius!"
Will.i.am Wants To Join Britney Spears On Stage For Her Las Vegas Residency
Will.i.am Says Britney Spears' Single 'Work Bitch' Doesn't Reflect Her New Album
The Voice UK's Judges Pose In Panel Pictured With New Coaches Kylie Minogue And Ricky Wilson
Kylie Minogue Joins The Voice UK With Will.i.am And Sir Tom Jones
Britney Spears Confirms Release Date For New Song 'Work B***h'
Will.i.am Says Leah McFall Has The Potential To Be As Big As Adele
Dizzee Rascal Unveils Lyric Video To Will.i.am Featuring Song 'Something Really Bad'
Will.i.am Says Katy Perry's New Song 'Roar' Is "Freaking Awesome"
Britney Spears Promises New Music "Soon" As Will.i.am Teases "Out Of This World" Sound
Fergie Reunites With Black Eyed Peas Stars Will.i.am And Apl.de.ap Ahead Of Birth
Will.i.am To Quit The Voice UK To Join American Idol?
Will.i.am Wants "Willy Wonka" Style Factory Of Technology Enthusiasts In The Future
PSY Heads For Dinner With Will.i.am And Hangs Out With Scooter Braun
Will.i.am Announces New UK Arena Tour For December 2013
Miley Cyrus Confirms Will.i.am Collaboration On New Album – Video
Will.i.am Reveals His Mum Told Him Off For Donating The Voice UK Fee
Robin Thicke Compares "Super Crazy Genius" Will.i.am To Michael Jackson
Will.i.am Reveals He Wants To Work With Taylor Swift: "She's Dope!"
Will.i.am Moves His Record Label To The UK: "I Like This Place, It's Fresh!"
Will.i.am Confirms Leah McFall Team-Up: "We Just Made The Most Heart-Melting Song!"
Pharrell Williams To Take Will.i.am To Court Over "I AM" Trademark Controversy?
Will.i.am Teases Release Of Leah McFall Version Of 'Bang Bang'
Will.i.am Denies He's Suing Pharrell Williams Over Use Of "I Am"
Will.i.am Ready To "Create Magic" With Leah McFall: "I've Started Up The Spaceship"
Will.i.am To Start Work With The Voice Runner-Up Leah McFall In New York This Week
Will.i.am "So Sad" After Leah McFall Misses Out On The Voice UK 2013 Win To Andrea Begley
Will.i.am Believes Leah McFall Will Win The Voice UK: "I Have The Winner" - Audio
Will.i.am Suggests Dunking Contestants In Water On The Voice UK In Future Series'
Will.i.am Says The Voice Finalist Leah McFall Is Better Than Jessie J?
Dizzee Rascal Recruits Jessie J and Will.i.am For New Album 'The Fifth'
Will.i.am Reveals He And PSY Were Hanging Out Backstage At The Summertime Ball 2013 - Video
Will.i.am Plays Justin Bieber And Britney Spears Collaborations At Summertime Ball 2013
Robbie Williams And Taylor Swift To Play Capital FM Summertime Ball 2013 Today
Will.i.am Promises His Summertime Ball 2013 Set Will Be "The Bomb Dot Com" - Audio
Capital FM Summertime Ball 2013 Line-Up
Will.i.am Working On New Songs In London Ahead Of Summertime Ball 2013
Will.i.am Disagrees With Jessie J On Talent Show Age Limits: "It's Not An Issue For Me"
Will.i.am Wants The Voice UK Return In 2014: "I'd Be Up For Coming Back"
Ke$ha Talks Teaming Up With Will.i.am For New Song 'Crazy Kids': "We Just Vibed!"
Will.i.am Shooting Music Videos For Two New Songs From '#Willpower' This Week
Will.i.am Releases Music Video To New Song 'Bang Bang'
Britney Spears To Start Work On New Album With Will.i.am Next Week
Will.i.am Says Prince Harry Is Like Iron Man: "He's A Dude"
Will.i.am Vs PSY: Who Has The Best Dance Moves?
Will.i.am Made His Customised Car To Inspire Local Youth About Academic School Subjects
Will.i.am Admits It Was "Tough" Getting Justin Bieber In The Music Video For '#ThatPower'
Will.i.am Confirms He Will Tour New Album '#Willpower' From September This Year
Will.i.am Confirms He Is The Executive Producer On Britney Spears' New Album
Will.i.am Explains Why He Donated The Voice UK Fee: "It's The People's Money"
Will.i.am Added To Wireless Festival 2013 Line-Up
Will.i.am Admits To Suffering From ADHD: "It Works Well For Me"
Will.i.am Joins The Capital FM Summertime Ball 2013 Line-Up
Britney Spears Says Will.i.am "Gets" Our Generation: "His Energy Is Electric"
Will.i.am Music
See more Will.i.am Music
Will.i.am feat. Pia Mia
Will.i.am feat. Justin Bieber
Wolfgang Gartner feat. Will.i.am
Download 'Forever' on iTunes
IT'S MY BIRTHDAY FT. CODY WISE
Will.i.am News
See more Will.i.am News
Will.i.am Calls His Custom-Made Car The "Star" Of His Music Video For '#ThePower'
Will.i.am Videos
See more Will.i.am Videos
Will.i.am - DJ Set (Live At The Summertime Ball 2016)
Will.i.am Pictures
See more Will.i.am Pictures
The 34 Most Important Pop, EDM & RnB Albums Released In 2017
|
cc/2020-05/en_middle_0102.json.gz/line2253
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.